IOC Report
w4XFffGDz1.exe

loading gif

Files

File Path
Type
Category
Malicious
w4XFffGDz1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp61B0.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AJzHYZtQIb.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\RarSFX0\PO.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, progressive, precision 8, 390x552, components 3
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2fxchldq.gpv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c5dgxrmw.020.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jj5kt24d.bgw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ncpykx4c.cxo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ojbysllk.cf1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ucbzawq5.ay1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vvrkyg5q.p2h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vxmgtnbz.hkb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp10A5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp10C5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp10D6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp10F6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp1107.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp21E5.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp2BA8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp2BB9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp2BD9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp2BDA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp2BFA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp2F6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp306.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp327.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp337.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp348.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp358.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp369.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp3799.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp37AA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp37BB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp37CB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp37DC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp37FC.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp380D.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4825.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4836.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4856.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4876.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4887.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp621E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp623F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp624F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6270.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6280.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6291.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp7F38.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp7F58.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7F78.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7F89.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7F8A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7F9B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8574.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp9838.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9858.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9869.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9889.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp989A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp98BA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9F36.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9F46.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9F47.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9F58.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9F59.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9F5A.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA0AE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpA0BE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpB5DE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpB5EF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpB600.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpB610.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpB621.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpB631.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpB642.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpBA4F.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpBA60.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpBA61.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpBA71.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpBA72.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpBA73.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpCDE5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpCDF5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpCE06.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpCE16.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpCE27.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpCE38.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpCE48.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD8D7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD8D8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD8F8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD909.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD919.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEC18.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpEC29.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpEC3A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpEC4A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpEC5B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpEC6B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpEC7C.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
There are 95 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\w4XFffGDz1.exe
"C:\Users\user\Desktop\w4XFffGDz1.exe"
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
"C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp"
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
"C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
malicious
C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp8574.tmp"
malicious
C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
"C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://ipinfo.io/ip%appdata%
unknown
malicious
http://45.137.22.67:55615/
45.137.22.67
malicious
https://api.ipify.orgcookies//settinString.Removeg
unknown
malicious
45.137.22.67:55615
malicious
http://45.137.22.67:55615
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
https://api.ip.sb
unknown
https://api.ip.sb/geoip
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://www.w3.or
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://45.137.22.67:55615t-
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
http://www.aforgenet.com/framework/
unknown
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown
malicious

IPs

IP
Domain
Country
Malicious
45.137.22.67
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AJzHYZtQIb_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AJzHYZtQIb_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AJzHYZtQIb_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AJzHYZtQIb_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AJzHYZtQIb_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AJzHYZtQIb_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AJzHYZtQIb_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AJzHYZtQIb_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AJzHYZtQIb_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AJzHYZtQIb_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AJzHYZtQIb_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AJzHYZtQIb_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AJzHYZtQIb_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AJzHYZtQIb_RASMANCS
FileDirectory
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
2FF0000
trusted library allocation
page read and write
malicious
4AFD000
trusted library allocation
page read and write
malicious
453C000
trusted library allocation
page read and write
malicious
31D0000
trusted library allocation
page read and write
malicious
3C00000
trusted library allocation
page read and write
malicious
C03E000
stack
page read and write
4346000
trusted library allocation
page read and write
7126000
trusted library allocation
page read and write
5CCE000
stack
page read and write
316A000
trusted library allocation
page read and write
7EB000
heap
page read and write
586D000
trusted library allocation
page read and write
A79C000
stack
page read and write
5A3E000
trusted library allocation
page read and write
A240000
heap
page read and write
2BAA000
trusted library allocation
page read and write
519B000
stack
page read and write
3210000
heap
page read and write
2E00000
trusted library allocation
page read and write
73DF000
stack
page read and write
34F6000
trusted library allocation
page read and write
1AE000
unkown
page write copy
125A000
trusted library allocation
page execute and read and write
CA5000
trusted library allocation
page execute and read and write
BA7F000
stack
page read and write
690F000
trusted library allocation
page read and write
6940000
trusted library allocation
page read and write
5410000
trusted library allocation
page execute and read and write
7132000
trusted library allocation
page read and write
E3B000
stack
page read and write
4236000
trusted library allocation
page read and write
122D000
trusted library allocation
page execute and read and write
52F0000
heap
page read and write
1200000
heap
page read and write
7D96000
heap
page read and write
2F5E000
stack
page read and write
5780000
trusted library allocation
page read and write
10BE000
heap
page read and write
1240000
trusted library allocation
page read and write
39A9000
trusted library allocation
page read and write
4571000
trusted library allocation
page read and write
643F000
stack
page read and write
559B000
stack
page read and write
4F30000
heap
page read and write
7B10000
trusted library allocation
page read and write
6960000
trusted library allocation
page read and write
7D9A000
heap
page read and write
C9A000
trusted library allocation
page execute and read and write
5300000
heap
page read and write
30EC000
stack
page read and write
435E000
trusted library allocation
page read and write
1CC000
unkown
page readonly
A23D000
stack
page read and write
7770000
trusted library section
page read and write
2DFE000
stack
page read and write
316D000
stack
page read and write
1020000
heap
page read and write
431D000
trusted library allocation
page read and write
91E000
unkown
page read and write
1070000
trusted library allocation
page read and write
B83F000
stack
page read and write
B47E000
stack
page read and write
2CFE000
stack
page read and write
348E000
trusted library allocation
page read and write
70AE000
stack
page read and write
167E000
stack
page read and write
505C000
stack
page read and write
7106000
trusted library allocation
page read and write
13F5000
heap
page read and write
4364000
trusted library allocation
page read and write
5684000
trusted library allocation
page read and write
54D0000
heap
page read and write
332E000
unkown
page read and write
D98000
heap
page read and write
6AD0000
trusted library allocation
page read and write
6C30000
trusted library allocation
page read and write
5C1F000
stack
page read and write
421E000
trusted library allocation
page read and write
6E70000
heap
page read and write
4192000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
155B000
trusted library allocation
page execute and read and write
3208000
heap
page read and write
71AC000
stack
page read and write
5A5A000
trusted library allocation
page read and write
1CD000
unkown
page readonly
6B8D000
stack
page read and write
2D9E000
stack
page read and write
4219000
trusted library allocation
page read and write
BF3E000
stack
page read and write
2F61000
trusted library allocation
page read and write
71AE000
heap
page read and write
8EDE000
stack
page read and write
1080000
heap
page read and write
5950000
heap
page read and write
1A2000
unkown
page readonly
D2E000
heap
page read and write
7360000
trusted library allocation
page read and write
3370000
heap
page read and write
6E30000
trusted library allocation
page read and write
FD0000
heap
page read and write
F60000
trusted library allocation
page read and write
3588000
trusted library allocation
page read and write
3390000
heap
page read and write
428F000
trusted library allocation
page read and write
7800000
trusted library allocation
page read and write
1014000
trusted library allocation
page read and write
3281000
trusted library allocation
page read and write
6FD0000
heap
page read and write
1320000
trusted library allocation
page read and write
1082000
trusted library allocation
page read and write
9FFF000
stack
page read and write
A91E000
stack
page read and write
C73000
trusted library allocation
page execute and read and write
5C20000
trusted library allocation
page read and write
67D0000
trusted library allocation
page execute and read and write
85CE000
stack
page read and write
119E000
stack
page read and write
713F000
heap
page read and write
7860000
trusted library allocation
page execute and read and write
33B0000
heap
page read and write
56D0000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
3668000
heap
page read and write
5A6E000
stack
page read and write
4355000
trusted library allocation
page read and write
1AE000
unkown
page read and write
7128000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
40F6000
trusted library allocation
page read and write
11F0000
heap
page read and write
2BA6000
trusted library allocation
page read and write
4337000
trusted library allocation
page read and write
5A1E000
stack
page read and write
7308000
trusted library allocation
page read and write
1092000
trusted library allocation
page read and write
673E000
stack
page read and write
7D80000
heap
page read and write
5A5D000
trusted library allocation
page read and write
3A46000
trusted library allocation
page read and write
7D20000
trusted library allocation
page read and write
1127000
heap
page read and write
110F000
heap
page read and write
2FAC000
stack
page read and write
6F7D000
heap
page read and write
3031000
trusted library allocation
page read and write
68A9000
heap
page read and write
7322000
trusted library allocation
page read and write
5A00000
heap
page read and write
C8D000
trusted library allocation
page execute and read and write
4216000
trusted library allocation
page read and write
670C000
heap
page read and write
11FE000
heap
page read and write
6BA1000
heap
page read and write
171000
unkown
page execute read
6AA0000
trusted library allocation
page read and write
6920000
trusted library allocation
page read and write
A03D000
stack
page read and write
124D000
trusted library allocation
page execute and read and write
6670000
heap
page read and write
2DC0000
heap
page read and write
6F4E000
heap
page read and write
322A000
heap
page read and write
7FE000
stack
page read and write
2E20000
trusted library allocation
page read and write
33C1000
trusted library allocation
page read and write
2F84000
trusted library allocation
page read and write
2FE8000
trusted library allocation
page read and write
5140000
trusted library section
page readonly
7D70000
trusted library allocation
page read and write
3241000
heap
page read and write
68B1000
heap
page read and write
5916000
trusted library allocation
page read and write
7890000
trusted library allocation
page read and write
49DB000
stack
page read and write
6F77000
heap
page read and write
4ED0000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
78A0000
trusted library allocation
page read and write
137A000
heap
page read and write
6AD9000
trusted library allocation
page read and write
C92000
trusted library allocation
page read and write
56B0000
heap
page execute and read and write
5C2B000
trusted library allocation
page read and write
7B30000
trusted library allocation
page execute and read and write
CA2000
trusted library allocation
page read and write
D62000
heap
page read and write
323D000
heap
page read and write
3245000
heap
page read and write
36C4000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
109B000
trusted library allocation
page execute and read and write
5900000
trusted library allocation
page read and write
5304000
heap
page read and write
421C000
trusted library allocation
page read and write
1A2000
unkown
page readonly
D28000
heap
page read and write
AA1E000
stack
page read and write
719D000
heap
page read and write
2F6E000
stack
page read and write
10B6000
heap
page read and write
5740000
trusted library allocation
page read and write
3269000
heap
page read and write
335C000
trusted library allocation
page read and write
5870000
trusted library allocation
page read and write
5EBD000
stack
page read and write
4181000
trusted library allocation
page read and write
2FA1000
trusted library allocation
page read and write
538E000
stack
page read and write
126B000
trusted library allocation
page execute and read and write
4448000
trusted library allocation
page read and write
6EFE000
stack
page read and write
32B3000
trusted library allocation
page read and write
4586000
trusted library allocation
page read and write
323E000
heap
page read and write
3278000
heap
page read and write
6ACE000
stack
page read and write
4256000
trusted library allocation
page read and write
53D4000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
6B90000
heap
page read and write
133D000
trusted library allocation
page execute and read and write
3368000
trusted library allocation
page read and write
7114000
trusted library allocation
page read and write
1265000
trusted library allocation
page execute and read and write
1252000
trusted library allocation
page read and write
4294000
trusted library allocation
page read and write
6C90000
heap
page read and write
4EB1000
trusted library allocation
page read and write
6913000
heap
page read and write
2FFA000
trusted library allocation
page read and write
71F1000
heap
page read and write
5B10000
trusted library allocation
page execute and read and write
10C5000
heap
page read and write
7B20000
trusted library allocation
page read and write
4ADC000
stack
page read and write
7AA0000
trusted library allocation
page execute and read and write
5922000
trusted library allocation
page read and write
4254000
trusted library allocation
page read and write
6AFA000
trusted library allocation
page read and write
7890000
trusted library allocation
page read and write
361B000
trusted library allocation
page read and write
3227000
heap
page read and write
11EE000
stack
page read and write
731D000
trusted library allocation
page read and write
31EF000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
10C0000
trusted library allocation
page read and write
3362000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
7350000
trusted library allocation
page execute and read and write
4054000
trusted library allocation
page read and write
3397000
trusted library allocation
page read and write
2E0B000
trusted library allocation
page read and write
101D000
trusted library allocation
page execute and read and write
41B2000
trusted library allocation
page read and write
6AF5000
trusted library allocation
page read and write
725F000
heap
page read and write
325A000
heap
page read and write
C40000
heap
page read and write
1324000
trusted library allocation
page read and write
2E44000
trusted library allocation
page read and write
1090000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
5890000
trusted library allocation
page execute and read and write
170000
unkown
page readonly
5B0D000
stack
page read and write
5540000
trusted library allocation
page read and write
3FAE000
trusted library allocation
page read and write
7880000
trusted library allocation
page read and write
99E000
stack
page read and write
10F0000
heap
page read and write
2D00000
trusted library allocation
page read and write
4342000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
4246000
trusted library allocation
page read and write
1CC000
unkown
page write copy
2FB0000
trusted library allocation
page execute and read and write
710F000
trusted library allocation
page read and write
324E000
heap
page read and write
31D0000
heap
page read and write
54D0000
heap
page read and write
553E000
stack
page read and write
671F000
heap
page read and write
7340000
trusted library allocation
page read and write
A07E000
stack
page read and write
6FAB000
heap
page read and write
5716000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
42E5000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
413E000
trusted library allocation
page read and write
7EF10000
trusted library allocation
page execute and read and write
41A0000
trusted library allocation
page read and write
4548000
trusted library allocation
page read and write
52A0000
heap
page read and write
5D10000
trusted library allocation
page read and write
68E2000
trusted library allocation
page read and write
716E000
heap
page read and write
1570000
heap
page read and write
5390000
trusted library allocation
page execute and read and write
7BBE000
stack
page read and write
2FB9000
trusted library allocation
page read and write
2D36000
stack
page read and write
72F4000
trusted library allocation
page read and write
4259000
trusted library allocation
page read and write
6F84000
heap
page read and write
5850000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
30A3000
trusted library allocation
page read and write
FF0000
heap
page read and write
1230000
heap
page read and write
3A94000
trusted library allocation
page read and write
3436000
trusted library allocation
page read and write
59DE000
stack
page read and write
A43E000
stack
page read and write
72FF000
trusted library allocation
page read and write
368B000
trusted library allocation
page read and write
7CF0000
trusted library allocation
page read and write
D0E000
stack
page read and write
434C000
trusted library allocation
page read and write
CA7000
trusted library allocation
page execute and read and write
4240000
trusted library allocation
page read and write
4301000
trusted library allocation
page read and write
12B2000
heap
page read and write
39A1000
trusted library allocation
page read and write
42F1000
trusted library allocation
page read and write
69BE000
stack
page read and write
5890000
trusted library allocation
page execute and read and write
6925000
trusted library allocation
page read and write
458E000
trusted library allocation
page read and write
429E000
trusted library allocation
page read and write
2FC2000
trusted library allocation
page read and write
6AD5000
trusted library allocation
page read and write
6EBE000
stack
page read and write
34BF000
trusted library allocation
page read and write
1013000
trusted library allocation
page execute and read and write
52D1000
trusted library allocation
page read and write
127A000
heap
page read and write
3484000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
1086000
trusted library allocation
page execute and read and write
5B85000
heap
page read and write
69F0000
trusted library allocation
page execute and read and write
54E0000
heap
page read and write
6F66000
heap
page read and write
71FB000
heap
page read and write
3F61000
trusted library allocation
page read and write
1346000
trusted library allocation
page execute and read and write
5A3B000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
343F000
stack
page read and write
7BC0000
trusted library allocation
page execute and read and write
33FE000
stack
page read and write
7000000
heap
page read and write
5EFE000
stack
page read and write
7102000
trusted library allocation
page read and write
534E000
stack
page read and write
5940000
trusted library allocation
page execute and read and write
428B000
trusted library allocation
page read and write
86CE000
stack
page read and write
31F9000
trusted library allocation
page read and write
524F000
stack
page read and write
B97E000
stack
page read and write
68F8000
heap
page read and write
4229000
trusted library allocation
page read and write
4350000
trusted library allocation
page read and write
6933000
heap
page read and write
2DE0000
heap
page read and write
5930000
trusted library allocation
page read and write
56FC000
heap
page read and write
6F2E000
heap
page read and write
4E60000
trusted library allocation
page read and write
600000
unkown
page readonly
111A000
heap
page read and write
30FB000
stack
page read and write
C45000
heap
page read and write
5880000
trusted library allocation
page read and write
D10000
heap
page execute and read and write
32BC000
trusted library allocation
page read and write
2FAA000
stack
page read and write
2DF8000
trusted library allocation
page read and write
10D0000
trusted library allocation
page execute and read and write
59E0000
trusted library allocation
page execute and read and write
6780000
trusted library allocation
page execute and read and write
1220000
trusted library allocation
page read and write
3181000
trusted library allocation
page read and write
7F2E0000
trusted library allocation
page execute and read and write
6930000
trusted library allocation
page read and write
32AE000
heap
page read and write
776F000
stack
page read and write
3ED000
stack
page read and write
D20000
heap
page read and write
1223000
trusted library allocation
page execute and read and write
60E0000
heap
page read and write
7325000
trusted library allocation
page read and write
710B000
heap
page read and write
13B0000
heap
page read and write
66A2000
heap
page read and write
7107000
heap
page read and write
53DA000
trusted library allocation
page read and write
52F0000
heap
page read and write
3020000
trusted library allocation
page read and write
7A3E000
trusted library allocation
page read and write
56E0000
heap
page read and write
53CE000
stack
page read and write
1340000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
711E000
trusted library allocation
page read and write
663E000
stack
page read and write
6A86000
trusted library allocation
page read and write
1552000
trusted library allocation
page read and write
1095000
trusted library allocation
page execute and read and write
132D000
heap
page read and write
1260000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
C96000
trusted library allocation
page execute and read and write
325A000
heap
page read and write
110E000
stack
page read and write
34DB000
heap
page read and write
4580000
trusted library allocation
page read and write
42EE000
trusted library allocation
page read and write
3227000
heap
page read and write
F60000
heap
page read and write
574F000
heap
page read and write
2F6B000
trusted library allocation
page read and write
6923000
heap
page read and write
107D000
trusted library allocation
page execute and read and write
CAB000
trusted library allocation
page execute and read and write
6F92000
heap
page read and write
1305000
heap
page read and write
5A27000
heap
page read and write
54E4000
heap
page read and write
3200000
trusted library allocation
page read and write
4210000
trusted library allocation
page read and write
7B0000
heap
page read and write
324B000
trusted library allocation
page read and write
118F000
heap
page read and write
86D0000
trusted library allocation
page execute and read and write
6728000
heap
page read and write
427C000
trusted library allocation
page read and write
6C7E000
stack
page read and write
C80000
trusted library allocation
page read and write
420D000
trusted library allocation
page read and write
B63D000
stack
page read and write
12A4000
heap
page read and write
5120000
trusted library allocation
page read and write
33CA000
trusted library allocation
page read and write
42FC000
trusted library allocation
page read and write
7104000
trusted library allocation
page read and write
78BB000
trusted library allocation
page read and write
B640000
heap
page read and write
1250000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
4593000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
6B4000
unkown
page readonly
7870000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
710C000
trusted library allocation
page read and write
32B3000
heap
page read and write
2E50000
heap
page read and write
5A2E000
stack
page read and write
1387000
heap
page read and write
4254000
trusted library allocation
page read and write
3200000
heap
page read and write
4F60000
trusted library allocation
page execute and read and write
5A20000
trusted library allocation
page read and write
5700000
heap
page read and write
5751000
trusted library allocation
page read and write
7B8D000
stack
page read and write
766E000
stack
page read and write
132D000
trusted library allocation
page execute and read and write
5970000
trusted library allocation
page read and write
1358000
heap
page read and write
432A000
trusted library allocation
page read and write
59F0000
heap
page read and write
C70000
trusted library allocation
page read and write
4282000
trusted library allocation
page read and write
6AA4000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
41C0000
trusted library allocation
page read and write
858E000
stack
page read and write
10F8000
stack
page read and write
563E000
stack
page read and write
C2E000
stack
page read and write
1097000
trusted library allocation
page execute and read and write
5B70000
trusted library allocation
page execute and read and write
1267000
trusted library allocation
page execute and read and write
4F40000
trusted library allocation
page read and write
52EA000
trusted library allocation
page read and write
7BD0000
heap
page read and write
2F8D000
stack
page read and write
424C000
trusted library allocation
page read and write
6BCE000
stack
page read and write
60DD000
stack
page read and write
4EC0000
trusted library allocation
page read and write
4339000
trusted library allocation
page read and write
2A55000
trusted library allocation
page read and write
106E000
stack
page read and write
2E26000
trusted library allocation
page read and write
A7DD000
stack
page read and write
7D00000
trusted library allocation
page execute and read and write
2C9E000
stack
page read and write
70EE000
stack
page read and write
66F2000
heap
page read and write
2DBC000
stack
page read and write
57C0000
trusted library allocation
page execute and read and write
3250000
heap
page read and write
320D000
trusted library allocation
page read and write
5911000
trusted library allocation
page read and write
7370000
trusted library allocation
page read and write
13B7000
heap
page read and write
2DDC000
stack
page read and write
4E90000
trusted library allocation
page read and write
7BE0000
heap
page read and write
3506000
trusted library allocation
page read and write
5941000
trusted library allocation
page read and write
56F4000
heap
page read and write
4AB7000
trusted library allocation
page read and write
55E0000
heap
page read and write
6905000
heap
page read and write
5B2E000
stack
page read and write
68DE000
stack
page read and write
848E000
stack
page read and write
7304000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
9DED000
trusted library allocation
page read and write
1256000
trusted library allocation
page execute and read and write
791B000
stack
page read and write
32AE000
heap
page read and write
3118000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
6914000
trusted library allocation
page read and write
55B0000
heap
page read and write
DCC000
heap
page read and write
602000
unkown
page readonly
11A0000
heap
page read and write
5473000
heap
page read and write
7167000
heap
page read and write
3B7E000
trusted library allocation
page read and write
DFA000
heap
page read and write
4368000
trusted library allocation
page read and write
6908000
heap
page read and write
32B3000
heap
page read and write
776F000
stack
page read and write
3260000
heap
page read and write
6A80000
trusted library allocation
page read and write
69DE000
stack
page read and write
6FD0000
heap
page read and write
3019000
trusted library allocation
page read and write
855E000
stack
page read and write
6F29000
heap
page read and write
7BEA000
heap
page read and write
7D10000
trusted library allocation
page execute and read and write
7B5E000
stack
page read and write
10C0000
heap
page read and write
32F4000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
3231000
heap
page read and write
171000
unkown
page execute read
3FB2000
trusted library allocation
page read and write
5450000
heap
page execute and read and write
4333000
trusted library allocation
page read and write
40D6000
trusted library allocation
page read and write
1323000
trusted library allocation
page execute and read and write
4249000
trusted library allocation
page read and write
5B80000
heap
page read and write
135D000
heap
page read and write
134F000
heap
page read and write
323D000
heap
page read and write
7D60000
heap
page read and write
7D30000
heap
page read and write
2FD8000
trusted library allocation
page read and write
BCFC000
stack
page read and write
3015000
trusted library allocation
page read and write
568A000
trusted library allocation
page read and write
32F3000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
567E000
stack
page read and write
7318000
trusted library allocation
page read and write
6919000
heap
page read and write
5420000
heap
page read and write
7192000
heap
page read and write
529D000
stack
page read and write
1297000
heap
page read and write
712D000
trusted library allocation
page read and write
7D40000
trusted library allocation
page execute and read and write
599E000
stack
page read and write
424E000
trusted library allocation
page read and write
592E000
trusted library allocation
page read and write
4E9B000
trusted library allocation
page read and write
FAE000
stack
page read and write
4364000
trusted library allocation
page read and write
7872000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
54FF000
stack
page read and write
CC0000
trusted library allocation
page read and write
6660000
heap
page read and write
6910000
trusted library allocation
page read and write
6C20000
heap
page read and write
55C0000
heap
page read and write
42F6000
trusted library allocation
page read and write
7125000
heap
page read and write
435B000
trusted library allocation
page read and write
5460000
trusted library allocation
page execute and read and write
71C6000
heap
page read and write
4359000
trusted library allocation
page read and write
1224000
trusted library allocation
page read and write
6970000
trusted library allocation
page execute and read and write
2FFB000
trusted library allocation
page read and write
42F4000
trusted library allocation
page read and write
3005000
trusted library allocation
page read and write
67CE000
stack
page read and write
6F95000
heap
page read and write
7889000
trusted library allocation
page read and write
4206000
trusted library allocation
page read and write
55D0000
trusted library allocation
page execute and read and write
672E000
heap
page read and write
127E000
heap
page read and write
4015000
trusted library allocation
page read and write
2F90000
heap
page execute and read and write
2BFE000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
586A000
trusted library allocation
page read and write
170000
unkown
page readonly
6B15000
trusted library allocation
page read and write
5AAE000
stack
page read and write
1150000
heap
page read and write
1557000
trusted library allocation
page execute and read and write
6962000
trusted library allocation
page read and write
7061000
heap
page read and write
DDC000
heap
page read and write
6739000
heap
page read and write
6F00000
heap
page read and write
9DF000
stack
page read and write
6FE5000
heap
page read and write
7161000
heap
page read and write
5150000
heap
page execute and read and write
7FD30000
trusted library allocation
page execute and read and write
6A0000
heap
page read and write
596E000
stack
page read and write
7F5F0000
trusted library allocation
page execute and read and write
10E0000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
7BD0000
trusted library allocation
page read and write
5722000
trusted library allocation
page read and write
11F7000
heap
page read and write
2DE0000
trusted library allocation
page read and write
5BAE000
stack
page read and write
68FE000
heap
page read and write
3356000
trusted library allocation
page read and write
41F8000
trusted library allocation
page read and write
5955000
heap
page read and write
31F5000
heap
page read and write
4E20000
heap
page read and write
7E0000
heap
page read and write
2DB0000
heap
page readonly
749000
stack
page read and write
120E000
stack
page read and write
DD4000
heap
page read and write
3325000
trusted library allocation
page read and write
717E000
stack
page read and write
4374000
trusted library allocation
page read and write
572E000
trusted library allocation
page read and write
1B7000
unkown
page read and write
5722000
heap
page read and write
3250000
heap
page read and write
692C000
heap
page read and write
699D000
stack
page read and write
3630000
trusted library allocation
page read and write
86E0000
trusted library allocation
page read and write
32FD000
trusted library allocation
page read and write
32AE000
heap
page read and write
653E000
stack
page read and write
A69C000
stack
page read and write
543D000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
6C90000
trusted library allocation
page read and write
2E6E000
stack
page read and write
3219000
trusted library allocation
page read and write
7A50000
trusted library allocation
page execute and read and write
6BE0000
trusted library allocation
page execute and read and write
52B0000
heap
page read and write
B93E000
stack
page read and write
FAD000
stack
page read and write
7CE0000
trusted library allocation
page read and write
425D000
trusted library allocation
page read and write
78E0000
heap
page read and write
57BE000
stack
page read and write
299E000
stack
page read and write
4EBD000
trusted library allocation
page read and write
5758000
heap
page read and write
3250000
heap
page read and write
58FE000
stack
page read and write
A53E000
stack
page read and write
C90000
trusted library allocation
page read and write
BD00000
heap
page read and write
29A1000
trusted library allocation
page read and write
4275000
trusted library allocation
page read and write
6B9E000
heap
page read and write
4EAE000
trusted library allocation
page read and write
456A000
trusted library allocation
page read and write
3620000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
328F000
trusted library allocation
page read and write
55FE000
stack
page read and write
70F0000
heap
page read and write
42CC000
trusted library allocation
page read and write
6772000
trusted library allocation
page read and write
667C000
heap
page read and write
33DD000
trusted library allocation
page read and write
7D2E000
stack
page read and write
788E000
trusted library allocation
page read and write
323E000
heap
page read and write
8DDE000
stack
page read and write
7180000
trusted library section
page read and write
4577000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
42BC000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
DFB000
stack
page read and write
AF7000
stack
page read and write
4E40000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
6756000
heap
page read and write
31F0000
heap
page read and write
BE7000
heap
page read and write
5460000
heap
page read and write
3500000
trusted library allocation
page read and write
7A30000
trusted library allocation
page read and write
33D7000
trusted library allocation
page read and write
7B00000
trusted library allocation
page read and write
F5E000
stack
page read and write
C60000
trusted library allocation
page read and write
2F69000
trusted library allocation
page read and write
4E80000
heap
page read and write
5110000
trusted library allocation
page read and write
4589000
trusted library allocation
page read and write
6F08000
heap
page read and write
6AE8000
trusted library allocation
page read and write
6E8E000
stack
page read and write
52D0000
trusted library allocation
page read and write
347E000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
7BE6000
heap
page read and write
5776000
trusted library allocation
page read and write
78D0000
trusted library allocation
page execute and read and write
5A30000
trusted library allocation
page read and write
6844000
heap
page read and write
C74000
trusted library allocation
page read and write
33FF000
trusted library allocation
page read and write
3F69000
trusted library allocation
page read and write
7044000
heap
page read and write
7880000
trusted library allocation
page read and write
F37000
stack
page read and write
2D70000
heap
page execute and read and write
53A0000
trusted library allocation
page read and write
5ACD000
stack
page read and write
6B00000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
4224000
trusted library allocation
page read and write
6717000
heap
page read and write
690000
heap
page read and write
52E0000
heap
page read and write
5B6E000
stack
page read and write
5A80000
trusted library allocation
page execute and read and write
357E000
stack
page read and write
3365000
trusted library allocation
page read and write
4291000
trusted library allocation
page read and write
7B90000
trusted library allocation
page execute and read and write
55A0000
trusted library section
page readonly
5A70000
trusted library allocation
page read and write
69C0000
trusted library allocation
page execute and read and write
1262000
trusted library allocation
page read and write
13AE000
stack
page read and write
7121000
trusted library allocation
page read and write
2D4D000
stack
page read and write
FA0000
heap
page read and write
323A000
heap
page read and write
79ED000
stack
page read and write
68C4000
heap
page read and write
2E2D000
trusted library allocation
page read and write
5470000
heap
page read and write
5420000
trusted library allocation
page read and write
A8DE000
stack
page read and write
591D000
stack
page read and write
10B0000
heap
page read and write
59C0000
trusted library allocation
page read and write
79D0000
trusted library section
page read and write
3234000
heap
page read and write
66DC000
heap
page read and write
4286000
trusted library allocation
page read and write
418E000
trusted library allocation
page read and write
75DF000
stack
page read and write
336F000
unkown
page read and write
3170000
heap
page execute and read and write
7D50000
trusted library allocation
page execute and read and write
33CF000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
14BF000
stack
page read and write
70E0000
trusted library allocation
page execute and read and write
8D40000
trusted library allocation
page execute and read and write
12FF000
stack
page read and write
57F0000
trusted library allocation
page execute and read and write
3291000
trusted library allocation
page read and write
2E46000
trusted library allocation
page read and write
3274000
heap
page read and write
2A3B000
trusted library allocation
page read and write
7292000
trusted library allocation
page read and write
5910000
trusted library allocation
page execute and read and write
5D0E000
stack
page read and write
1270000
heap
page read and write
BBFC000
stack
page read and write
6A00000
trusted library allocation
page read and write
4584000
trusted library allocation
page read and write
3660000
heap
page read and write
328B000
trusted library allocation
page read and write
3222000
heap
page read and write
714F000
heap
page read and write
4314000
trusted library allocation
page read and write
706E000
stack
page read and write
3331000
trusted library allocation
page read and write
711D000
heap
page read and write
4200000
trusted library allocation
page read and write
D60000
heap
page read and write
2FAE000
trusted library allocation
page read and write
1205000
heap
page read and write
78AC000
stack
page read and write
5A40000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
457B000
trusted library allocation
page read and write
FE0000
heap
page read and write
334C000
trusted library allocation
page read and write
52C0000
trusted library allocation
page execute and read and write
6BFD000
trusted library allocation
page read and write
BE0000
heap
page read and write
44F7000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
6C96000
trusted library allocation
page read and write
2F6D000
stack
page read and write
7B50000
trusted library allocation
page read and write
FC0000
trusted library allocation
page execute and read and write
71E0000
heap
page read and write
6E7E000
stack
page read and write
432E000
trusted library allocation
page read and write
3FA1000
trusted library allocation
page read and write
60F0000
heap
page read and write
590B000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
14BF000
stack
page read and write
570B000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
33D8000
trusted library allocation
page read and write
6C80000
heap
page read and write
55A2000
trusted library section
page readonly
6AD2000
trusted library allocation
page read and write
3250000
heap
page read and write
2E40000
trusted library allocation
page read and write
1342000
trusted library allocation
page read and write
328B000
trusted library allocation
page read and write
693B000
heap
page read and write
C7D000
trusted library allocation
page execute and read and write
1000000
trusted library allocation
page read and write
70F9000
heap
page read and write
5430000
trusted library allocation
page read and write
2E1E000
trusted library allocation
page read and write
B43E000
stack
page read and write
F57000
stack
page read and write
154E000
stack
page read and write
730E000
trusted library allocation
page read and write
323D000
heap
page read and write
2DF0000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
1350000
heap
page read and write
12B0000
heap
page read and write
3232000
heap
page read and write
6B04000
trusted library allocation
page read and write
5931000
trusted library allocation
page read and write
6BAB000
heap
page read and write
4324000
trusted library allocation
page read and write
35F0000
heap
page read and write
6ECE000
stack
page read and write
6B12000
trusted library allocation
page read and write
7311000
trusted library allocation
page read and write
3211000
trusted library allocation
page read and write
323D000
heap
page read and write
72F6000
trusted library allocation
page read and write
13C7000
heap
page read and write
6AEF000
trusted library allocation
page read and write
34D0000
heap
page read and write
663E000
stack
page read and write
683E000
stack
page read and write
5700000
trusted library allocation
page read and write
343E000
stack
page read and write
3018000
trusted library allocation
page read and write
6A7E000
stack
page read and write
41F0000
trusted library allocation
page read and write
2FC0000
heap
page read and write
6E80000
heap
page read and write
F1F000
stack
page read and write
6840000
heap
page read and write
6AFF000
trusted library allocation
page read and write
2CBE000
stack
page read and write
674A000
heap
page read and write
4299000
trusted library allocation
page read and write
39F8000
trusted library allocation
page read and write
4EB6000
trusted library allocation
page read and write
6D0000
heap
page read and write
7316000
trusted library allocation
page read and write
71DB000
heap
page read and write
6F41000
heap
page read and write
32B3000
heap
page read and write
423D000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page execute and read and write
7135000
trusted library allocation
page read and write
13BE000
stack
page read and write
1555000
trusted library allocation
page execute and read and write
AC0000
heap
page read and write
2D60000
trusted library allocation
page execute and read and write
433F000
trusted library allocation
page read and write
42E8000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
7A0000
heap
page read and write
7BA0000
trusted library allocation
page read and write
42D9000
trusted library allocation
page read and write
6A30000
heap
page read and write
1330000
trusted library allocation
page read and write
7850000
heap
page read and write
56E8000
heap
page read and write
77AC000
stack
page read and write
6FBA000
heap
page read and write
74DF000
stack
page read and write
691F000
heap
page read and write
353D000
stack
page read and write
4346000
trusted library allocation
page read and write
7118000
trusted library allocation
page read and write
13CE000
heap
page read and write
673E000
heap
page read and write
1310000
trusted library allocation
page read and write
10F8000
heap
page read and write
41FA000
trusted library allocation
page read and write
FB0000
heap
page read and write
302D000
trusted library allocation
page read and write
72FC000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
33FE000
stack
page read and write
63A000
stack
page read and write
57E0000
trusted library allocation
page read and write
41D8000
trusted library allocation
page read and write
5920000
trusted library allocation
page execute and read and write
300B000
trusted library allocation
page read and write
95F000
unkown
page read and write
53F0000
heap
page execute and read and write
433C000
trusted library allocation
page read and write
2FEB000
trusted library allocation
page read and write
70D0000
trusted library allocation
page read and write
32EA000
trusted library allocation
page read and write
6882000
heap
page read and write
6AEA000
trusted library allocation
page read and write
3262000
heap
page read and write
1317000
heap
page read and write
59B0000
trusted library allocation
page execute and read and write
7A40000
trusted library allocation
page read and write
E5A000
stack
page read and write
7960000
heap
page read and write
6FCE000
stack
page read and write
1025000
heap
page read and write
5430000
trusted library allocation
page read and write
2E21000
trusted library allocation
page read and write
845E000
stack
page read and write
57FE000
stack
page read and write
338A000
trusted library allocation
page read and write
6D8F000
stack
page read and write
4230000
trusted library allocation
page read and write
2DA0000
heap
page read and write
4E83000
heap
page read and write
58DE000
stack
page read and write
56FE000
stack
page read and write
There are 976 hidden memdumps, click here to show them.