IOC Report
lZ8NRWShfC.exe

loading gif

Files

File Path
Type
Category
Malicious
lZ8NRWShfC.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\lZ8NRWShfC.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp51ED.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\TmfmVKU.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\TmfmVKU.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TmfmVKU.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_52msmxeb.01u.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5mmr1ppu.3wj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_adcjjee3.3pg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dzweimg5.oh3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ei23xkxp.33v.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g3n1e3u5.zyf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pp5q1iad.nxt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tft0euiy.3mh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp1651.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp1662.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp1673.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp1683.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp1694.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp16B4.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp1959.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp1979.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp19B9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp28C2.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp28D3.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp28E3.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp28F4.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp38B3.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp38B4.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp38B5.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp38B6.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3C64.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3C74.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3C85.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3CB5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4D1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp4E2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp4F2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp4F3.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp504.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5089.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp509A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp50BA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp50CB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp50DB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp515.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp516.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp526.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp7376.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp7386.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp73A6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp73B7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp73C8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp76F9.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp872E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp873F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp8750.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp8760.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp8781.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8791.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpAA2B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpAA4B.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpAA4C.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpAA5C.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpAA6D.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpAA7E.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpAA7F.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpAA8F.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpBD77.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpBD97.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpBD98.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpBDA9.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpBDBA.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpBDCA.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpBDDB.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpCD13.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpCD24.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpCD25.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpCD26.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpE094.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpE0A5.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpE0B6.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpE0C6.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpE0D7.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpE0E8.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpE0F8.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpE1D8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpE1F8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpE209.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpE20A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpE21A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpE22B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpF353.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpF364.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpF375.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpF385.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpF396.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpF3A6.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpF3B7.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
There are 90 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\lZ8NRWShfC.exe
"C:\Users\user\Desktop\lZ8NRWShfC.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\lZ8NRWShfC.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TmfmVKU.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TmfmVKU" /XML "C:\Users\user\AppData\Local\Temp\tmp51ED.tmp"
malicious
C:\Users\user\Desktop\lZ8NRWShfC.exe
"C:\Users\user\Desktop\lZ8NRWShfC.exe"
malicious
C:\Users\user\Desktop\lZ8NRWShfC.exe
"C:\Users\user\Desktop\lZ8NRWShfC.exe"
malicious
C:\Users\user\AppData\Roaming\TmfmVKU.exe
C:\Users\user\AppData\Roaming\TmfmVKU.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TmfmVKU" /XML "C:\Users\user\AppData\Local\Temp\tmp76F9.tmp"
malicious
C:\Users\user\AppData\Roaming\TmfmVKU.exe
"C:\Users\user\AppData\Roaming\TmfmVKU.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.222.58.91:55615/
185.222.58.91
malicious
185.222.58.91:55615
malicious
https://ipinfo.io/ip%appdata%
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://tempuri.org/Endpoint/SetEnvironmentme(
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
https://api.ip.sb
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Endpoint/GetUpdates(
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://tempuri.org/Endpoint/SetEnviron
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://185.222.58.91:55615
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://tempuri.org/Endpoint/SetEnvironmentde
unknown
https://api.ipify.orgcookies//settinString.Removeg
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://185.222.58.91:5
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 31 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.222.58.91
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lZ8NRWShfC_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lZ8NRWShfC_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lZ8NRWShfC_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lZ8NRWShfC_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lZ8NRWShfC_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lZ8NRWShfC_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lZ8NRWShfC_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lZ8NRWShfC_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lZ8NRWShfC_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lZ8NRWShfC_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lZ8NRWShfC_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lZ8NRWShfC_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lZ8NRWShfC_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\lZ8NRWShfC_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TmfmVKU_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TmfmVKU_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TmfmVKU_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TmfmVKU_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TmfmVKU_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TmfmVKU_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TmfmVKU_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TmfmVKU_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TmfmVKU_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TmfmVKU_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TmfmVKU_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TmfmVKU_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TmfmVKU_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\TmfmVKU_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3F18000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
4399000
trusted library allocation
page read and write
malicious
3200000
heap
page read and write
615F000
stack
page read and write
53BE000
stack
page read and write
7F9D000
stack
page read and write
6510000
trusted library allocation
page read and write
75A0000
trusted library allocation
page execute and read and write
58EE000
stack
page read and write
29DA000
trusted library allocation
page read and write
1A1D000
trusted library allocation
page execute and read and write
3DD3000
trusted library allocation
page read and write
3A82000
trusted library allocation
page read and write
6826000
trusted library allocation
page read and write
7EFD0000
trusted library allocation
page execute and read and write
3FFB000
trusted library allocation
page read and write
3E5C000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
2CAD000
trusted library allocation
page execute and read and write
6D4C000
trusted library allocation
page read and write
27EF000
unkown
page read and write
E3E000
stack
page read and write
3AD5000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
61FE000
stack
page read and write
5AE0000
heap
page execute and read and write
7620000
trusted library allocation
page execute and read and write
67C0000
trusted library allocation
page read and write
10A4000
heap
page read and write
3E85000
trusted library allocation
page read and write
3079000
trusted library allocation
page read and write
1A26000
trusted library allocation
page execute and read and write
50FE000
stack
page read and write
3BE4000
trusted library allocation
page read and write
124E000
stack
page read and write
E99000
heap
page read and write
7630000
trusted library allocation
page read and write
1A70000
heap
page read and write
ED1000
heap
page read and write
2A90000
heap
page execute and read and write
86BE000
stack
page read and write
3331000
trusted library allocation
page read and write
1A13000
trusted library allocation
page read and write
6442000
heap
page read and write
31E0000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
695E000
stack
page read and write
30DC000
trusted library allocation
page read and write
1290000
heap
page read and write
3C4A000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
63B0000
trusted library allocation
page execute and read and write
4331000
trusted library allocation
page read and write
2ED9000
trusted library allocation
page read and write
2D30000
heap
page read and write
296E000
stack
page read and write
66D0000
trusted library allocation
page read and write
2CA4000
trusted library allocation
page read and write
CE0000
trusted library allocation
page read and write
80DE000
stack
page read and write
6EE0000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
506F000
stack
page read and write
542C000
stack
page read and write
DF5000
heap
page read and write
26FA000
stack
page read and write
3FDF000
trusted library allocation
page read and write
8EBE000
stack
page read and write
29B3000
trusted library allocation
page execute and read and write
103B000
trusted library allocation
page execute and read and write
C5E000
stack
page read and write
F4E000
stack
page read and write
6D4F000
trusted library allocation
page read and write
2F2F000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
1050000
heap
page read and write
6C6F000
stack
page read and write
75E0000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
64D4000
heap
page read and write
5CC0000
heap
page read and write
2CC0000
trusted library allocation
page read and write
1256000
heap
page read and write
544D000
trusted library allocation
page read and write
13DE000
stack
page read and write
3C57000
trusted library allocation
page read and write
66D5000
trusted library allocation
page read and write
3ADC000
trusted library allocation
page read and write
29E2000
trusted library allocation
page read and write
2CBD000
trusted library allocation
page execute and read and write
527E000
stack
page read and write
3BF2000
trusted library allocation
page read and write
3130000
heap
page execute and read and write
64ED000
heap
page read and write
3BF1000
trusted library allocation
page read and write
657D000
stack
page read and write
738B000
stack
page read and write
408E000
trusted library allocation
page read and write
1018000
heap
page read and write
CAA000
stack
page read and write
311E000
stack
page read and write
2CCD000
stack
page read and write
CAE000
stack
page read and write
2BB0000
trusted library allocation
page read and write
2A31000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
537E000
stack
page read and write
2AE1000
trusted library allocation
page read and write
E26000
trusted library allocation
page execute and read and write
6D09000
trusted library allocation
page read and write
1037000
trusted library allocation
page execute and read and write
521E000
stack
page read and write
5320000
trusted library allocation
page read and write
5FB0000
heap
page read and write
8280000
heap
page read and write
13FE000
heap
page read and write
54A2000
trusted library allocation
page read and write
350E000
trusted library allocation
page read and write
776B000
heap
page read and write
5204000
trusted library allocation
page read and write
4029000
trusted library allocation
page read and write
6834000
trusted library allocation
page read and write
4000000
trusted library allocation
page read and write
1250000
heap
page read and write
2CD8000
trusted library allocation
page read and write
6332000
heap
page read and write
10E2000
heap
page read and write
7F6C0000
trusted library allocation
page execute and read and write
5AC0000
trusted library allocation
page read and write
9BB000
stack
page read and write
16FE000
stack
page read and write
7D1F000
stack
page read and write
4017000
trusted library allocation
page read and write
8AFE000
stack
page read and write
2CCA000
trusted library allocation
page execute and read and write
57A2000
trusted library allocation
page read and write
2F07000
trusted library allocation
page read and write
6019000
heap
page read and write
7956000
heap
page read and write
544A000
trusted library allocation
page read and write
6D9E000
stack
page read and write
6690000
trusted library allocation
page read and write
B40000
heap
page read and write
6D61000
trusted library allocation
page read and write
565C000
stack
page read and write
6500000
trusted library allocation
page read and write
EDA000
heap
page read and write
2BC0000
trusted library allocation
page read and write
187F000
stack
page read and write
1A3B000
trusted library allocation
page execute and read and write
2A00000
trusted library allocation
page read and write
3120000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
E62000
heap
page read and write
5812000
trusted library allocation
page read and write
401C000
trusted library allocation
page read and write
6D66000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
817E000
stack
page read and write
62EF000
heap
page read and write
6848000
trusted library allocation
page read and write
54FD000
stack
page read and write
3A7E000
trusted library allocation
page read and write
6D30000
trusted library allocation
page execute and read and write
53D0000
trusted library allocation
page read and write
3A51000
trusted library allocation
page read and write
E03000
trusted library allocation
page execute and read and write
5210000
trusted library allocation
page read and write
33CA000
heap
page read and write
654E000
stack
page read and write
832B000
stack
page read and write
6400000
heap
page read and write
520A000
trusted library allocation
page read and write
E40000
heap
page read and write
54EE000
trusted library allocation
page read and write
54E2000
trusted library allocation
page read and write
10AA000
heap
page read and write
1044000
heap
page read and write
53C0000
trusted library allocation
page read and write
59B1000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page execute and read and write
632E000
heap
page read and write
674E000
stack
page read and write
6D44000
trusted library allocation
page read and write
534E000
trusted library allocation
page read and write
F86000
heap
page read and write
659D000
heap
page read and write
2CD7000
trusted library allocation
page execute and read and write
2D90000
trusted library allocation
page read and write
6D46000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
ED6000
heap
page read and write
62FD000
heap
page read and write
3BE1000
trusted library allocation
page read and write
29C0000
trusted library allocation
page read and write
64DA000
trusted library allocation
page read and write
34C0000
trusted library allocation
page read and write
6B2D000
heap
page read and write
2AA1000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
2EB1000
trusted library allocation
page read and write
775C000
heap
page read and write
27AE000
unkown
page read and write
3A62000
trusted library allocation
page read and write
4A58000
trusted library allocation
page read and write
75F0000
trusted library allocation
page execute and read and write
29F0000
heap
page read and write
5520000
trusted library allocation
page read and write
C10000
unkown
page readonly
6B0E000
stack
page read and write
5200000
trusted library allocation
page read and write
776F000
heap
page read and write
5500000
trusted library allocation
page execute and read and write
5590000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
2A5B000
heap
page read and write
2CA0000
trusted library allocation
page read and write
5336000
trusted library allocation
page read and write
53F6000
trusted library allocation
page read and write
2D60000
heap
page read and write
5402000
trusted library allocation
page read and write
29CD000
trusted library allocation
page execute and read and write
5430000
trusted library allocation
page read and write
FF9000
heap
page read and write
56D0000
trusted library allocation
page execute and read and write
812E000
stack
page read and write
53F1000
trusted library allocation
page read and write
4D7D000
stack
page read and write
50AE000
stack
page read and write
29D2000
trusted library allocation
page read and write
579D000
trusted library allocation
page read and write
5870000
trusted library allocation
page execute and read and write
7660000
heap
page read and write
5CB0000
trusted library allocation
page execute and read and write
5490000
heap
page read and write
2A40000
heap
page read and write
6B40000
trusted library allocation
page read and write
791E000
stack
page read and write
7A10000
trusted library allocation
page execute and read and write
3E88000
trusted library allocation
page read and write
3D65000
trusted library allocation
page read and write
2DF7000
trusted library allocation
page read and write
5470000
trusted library allocation
page execute and read and write
29E5000
trusted library allocation
page execute and read and write
11C0000
heap
page read and write
B62000
unkown
page readonly
5220000
trusted library allocation
page read and write
64EF000
trusted library allocation
page read and write
3203000
heap
page read and write
3A74000
trusted library allocation
page read and write
508C000
stack
page read and write
64C9000
trusted library allocation
page read and write
8430000
heap
page read and write
6AEA000
heap
page read and write
3C0C000
trusted library allocation
page read and write
65EF000
trusted library allocation
page read and write
3CA2000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
5351000
trusted library allocation
page read and write
6AE0000
heap
page read and write
6530000
trusted library allocation
page execute and read and write
54D6000
trusted library allocation
page read and write
630C000
heap
page read and write
F50000
heap
page read and write
3BDF000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
5640000
trusted library allocation
page execute and read and write
79AE000
stack
page read and write
827E000
stack
page read and write
5AD0000
trusted library allocation
page execute and read and write
8C3F000
stack
page read and write
3E31000
trusted library allocation
page read and write
90FE000
stack
page read and write
64F4000
trusted library allocation
page read and write
936C000
stack
page read and write
53EE000
trusted library allocation
page read and write
64F8000
heap
page read and write
4014000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
62B0000
trusted library section
page read and write
3EA3000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
647C000
heap
page read and write
3E4D000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
3C05000
trusted library allocation
page read and write
125B000
heap
page read and write
6692000
trusted library allocation
page read and write
5932000
trusted library allocation
page read and write
7B1F000
stack
page read and write
5880000
heap
page read and write
3DCC000
trusted library allocation
page read and write
E4E000
heap
page read and write
4030000
trusted library allocation
page read and write
3ACF000
trusted library allocation
page read and write
62D0000
heap
page read and write
2D8F000
trusted library allocation
page read and write
5A7E000
stack
page read and write
3D73000
trusted library allocation
page read and write
7740000
heap
page read and write
2CDA000
trusted library allocation
page read and write
3FF8000
trusted library allocation
page read and write
631D000
heap
page read and write
605F000
stack
page read and write
5480000
heap
page read and write
560E000
stack
page read and write
2D7E000
stack
page read and write
E59000
heap
page read and write
6570000
heap
page read and write
847E000
stack
page read and write
6C90000
heap
page read and write
3C5E000
trusted library allocation
page read and write
64FE000
heap
page read and write
12D0000
heap
page read and write
6800000
trusted library allocation
page execute and read and write
57C0000
trusted library allocation
page read and write
2FFA000
trusted library allocation
page read and write
65D0000
trusted library allocation
page execute and read and write
7590000
trusted library allocation
page read and write
62EB000
heap
page read and write
94BE000
stack
page read and write
2BE1000
trusted library allocation
page read and write
8D7D000
stack
page read and write
795A000
heap
page read and write
5610000
trusted library allocation
page read and write
682F000
trusted library allocation
page read and write
5110000
heap
page execute and read and write
640E000
stack
page read and write
6489000
heap
page read and write
5370000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
13B0000
heap
page read and write
3E8D000
trusted library allocation
page read and write
87FE000
stack
page read and write
58AD000
stack
page read and write
2BD0000
heap
page read and write
13C0000
heap
page read and write
8C7D000
stack
page read and write
E30000
heap
page read and write
33C0000
heap
page read and write
2CB3000
trusted library allocation
page read and write
30A7000
trusted library allocation
page read and write
754E000
stack
page read and write
119E000
stack
page read and write
3210000
trusted library allocation
page read and write
3E6C000
trusted library allocation
page read and write
2F35000
trusted library allocation
page read and write
DFF000
stack
page read and write
65E0000
trusted library allocation
page read and write
E04000
trusted library allocation
page read and write
6500000
trusted library allocation
page read and write
2FD8000
trusted library allocation
page read and write
69E0000
heap
page read and write
2C75000
trusted library allocation
page read and write
57EB000
trusted library allocation
page read and write
1417000
heap
page read and write
3BEE000
trusted library allocation
page read and write
2CD2000
trusted library allocation
page read and write
3EB1000
trusted library allocation
page read and write
6810000
trusted library allocation
page execute and read and write
531E000
stack
page read and write
8B3E000
stack
page read and write
66E0000
trusted library allocation
page read and write
6852000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
7A20000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
2F01000
trusted library allocation
page read and write
3AF6000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
61AE000
stack
page read and write
13F0000
heap
page read and write
3180000
trusted library allocation
page read and write
6D75000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
15FE000
stack
page read and write
1710000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page read and write
64E5000
trusted library allocation
page read and write
53A0000
trusted library allocation
page execute and read and write
2EE6000
trusted library allocation
page read and write
102F000
stack
page read and write
79FD000
stack
page read and write
62A2000
heap
page read and write
7770000
heap
page read and write
3DD9000
trusted library allocation
page read and write
3E78000
trusted library allocation
page read and write
7E60000
heap
page read and write
3389000
trusted library allocation
page read and write
3AE6000
trusted library allocation
page read and write
53D0000
trusted library allocation
page execute and read and write
12CA000
heap
page read and write
67E4000
trusted library allocation
page read and write
54F1000
trusted library allocation
page read and write
7940000
heap
page read and write
3124000
trusted library allocation
page read and write
6D72000
trusted library allocation
page read and write
3E69000
trusted library allocation
page read and write
3A68000
trusted library allocation
page read and write
7590000
heap
page read and write
66BF000
trusted library allocation
page read and write
6D6D000
trusted library allocation
page read and write
777F000
heap
page read and write
127E000
stack
page read and write
29AC000
stack
page read and write
7E5D000
stack
page read and write
561D000
trusted library allocation
page read and write
86D0000
trusted library allocation
page read and write
2F42000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
3EB9000
trusted library allocation
page read and write
6F10000
heap
page read and write
85BE000
stack
page read and write
6522000
trusted library allocation
page read and write
109E000
stack
page read and write
3C38000
trusted library allocation
page read and write
51FF000
stack
page read and write
3C44000
trusted library allocation
page read and write
4F10000
trusted library allocation
page execute and read and write
3C6B000
trusted library allocation
page read and write
30D0000
heap
page read and write
57DF000
stack
page read and write
30A6000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
5796000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
2CC6000
trusted library allocation
page execute and read and write
2A51000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
1070000
heap
page read and write
1035000
trusted library allocation
page execute and read and write
64B3000
heap
page read and write
1730000
heap
page read and write
597E000
stack
page read and write
4339000
trusted library allocation
page read and write
3FF1000
trusted library allocation
page read and write
774D000
heap
page read and write
63FF000
stack
page read and write
CF5000
heap
page read and write
665E000
stack
page read and write
29D4000
trusted library allocation
page read and write
2A3E000
stack
page read and write
802E000
stack
page read and write
10AF000
heap
page read and write
2CD6000
trusted library allocation
page read and write
3C3D000
trusted library allocation
page read and write
5342000
trusted library allocation
page read and write
30AD000
trusted library allocation
page read and write
1A60000
trusted library allocation
page execute and read and write
8FFE000
stack
page read and write
6264000
heap
page read and write
10BE000
heap
page read and write
7EB000
stack
page read and write
172D000
trusted library allocation
page execute and read and write
E0D000
trusted library allocation
page execute and read and write
53B0000
trusted library allocation
page read and write
5800000
heap
page read and write
7778000
heap
page read and write
55A0000
trusted library allocation
page execute and read and write
AF7000
stack
page read and write
1357000
stack
page read and write
644E000
stack
page read and write
2E53000
trusted library allocation
page read and write
2C71000
trusted library allocation
page read and write
682C000
trusted library allocation
page read and write
64DF000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
1037000
heap
page read and write
923E000
stack
page read and write
2CA3000
trusted library allocation
page execute and read and write
5331000
trusted library allocation
page read and write
913D000
stack
page read and write
2760000
heap
page read and write
946C000
stack
page read and write
5FEB000
heap
page read and write
62FE000
stack
page read and write
6838000
trusted library allocation
page read and write
3EA1000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
E22000
trusted library allocation
page read and write
4032000
trusted library allocation
page read and write
77B3000
heap
page read and write
842C000
stack
page read and write
7321000
trusted library allocation
page read and write
2D9B000
trusted library allocation
page read and write
1724000
trusted library allocation
page read and write
3220000
heap
page read and write
2A20000
trusted library allocation
page read and write
7640000
heap
page read and write
2C63000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
684D000
trusted library allocation
page read and write
75F0000
trusted library allocation
page execute and read and write
64D8000
trusted library allocation
page read and write
5810000
trusted library allocation
page read and write
8FBE000
stack
page read and write
2D70000
heap
page read and write
1051000
heap
page read and write
3BF9000
trusted library allocation
page read and write
13A0000
heap
page read and write
13C5000
heap
page read and write
5580000
trusted library allocation
page read and write
64DD000
heap
page read and write
6DDB000
stack
page read and write
6325000
heap
page read and write
29E7000
trusted library allocation
page execute and read and write
29D6000
trusted library allocation
page execute and read and write
54BD000
stack
page read and write
11E5000
heap
page read and write
310C000
stack
page read and write
1259000
stack
page read and write
31F5000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
3BEB000
trusted library allocation
page read and write
857F000
stack
page read and write
57EE000
trusted library allocation
page read and write
DF0000
heap
page read and write
30CE000
stack
page read and write
1723000
trusted library allocation
page execute and read and write
3DC7000
trusted library allocation
page read and write
1A2A000
trusted library allocation
page execute and read and write
5410000
trusted library allocation
page read and write
11E0000
heap
page read and write
29C0000
trusted library allocation
page read and write
2CE5000
trusted library allocation
page read and write
3FEB000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
177E000
stack
page read and write
4BED000
stack
page read and write
7A00000
heap
page read and write
779D000
heap
page read and write
81DE000
stack
page read and write
2AD5000
trusted library allocation
page read and write
53DB000
trusted library allocation
page read and write
3C13000
trusted library allocation
page read and write
3C64000
trusted library allocation
page read and write
5443000
heap
page read and write
5D00000
trusted library allocation
page read and write
5CF1000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
757E000
stack
page read and write
678E000
stack
page read and write
26BD000
stack
page read and write
308E000
trusted library allocation
page read and write
F84000
heap
page read and write
561E000
trusted library allocation
page read and write
400D000
trusted library allocation
page read and write
778A000
heap
page read and write
1A37000
trusted library allocation
page execute and read and write
1032000
trusted library allocation
page read and write
53FD000
trusted library allocation
page read and write
6D5E000
trusted library allocation
page read and write
3E9A000
trusted library allocation
page read and write
95BE000
stack
page read and write
8130000
trusted library allocation
page read and write
67DA000
trusted library allocation
page read and write
2CDB000
trusted library allocation
page execute and read and write
29B0000
trusted library allocation
page read and write
7580000
trusted library allocation
page execute and read and write
2ACB000
trusted library allocation
page read and write
31D0000
heap
page read and write
2F09000
trusted library allocation
page read and write
3A6F000
trusted library allocation
page read and write
3C75000
trusted library allocation
page read and write
64F2000
heap
page read and write
6580000
trusted library allocation
page execute and read and write
5430000
trusted library allocation
page read and write
11F0000
heap
page read and write
561A000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
2B8E000
trusted library allocation
page read and write
54B0000
trusted library allocation
page execute and read and write
2F9E000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
1060000
trusted library allocation
page execute and read and write
5980000
trusted library section
page read and write
3FDC000
trusted library allocation
page read and write
5774000
trusted library allocation
page read and write
2C5A000
trusted library allocation
page read and write
6B30000
trusted library allocation
page execute and read and write
29D0000
trusted library allocation
page read and write
B60000
unkown
page readonly
316F000
stack
page read and write
6502000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
5440000
heap
page read and write
307F000
trusted library allocation
page read and write
7C1E000
stack
page read and write
2CB0000
trusted library allocation
page read and write
3C85000
trusted library allocation
page read and write
101E000
heap
page read and write
1010000
heap
page read and write
6D41000
trusted library allocation
page read and write
7EE10000
trusted library allocation
page execute and read and write
6EDD000
stack
page read and write
29EB000
trusted library allocation
page execute and read and write
2DA0000
heap
page execute and read and write
5570000
trusted library allocation
page execute and read and write
54C0000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
2D95000
trusted library allocation
page read and write
6404000
heap
page read and write
123D000
stack
page read and write
6550000
heap
page read and write
3C0F000
trusted library allocation
page read and write
6341000
heap
page read and write
6AB0000
trusted library allocation
page read and write
2AD3000
trusted library allocation
page read and write
3E62000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
75D0000
trusted library allocation
page execute and read and write
4007000
trusted library allocation
page read and write
64F0000
trusted library allocation
page read and write
E65000
heap
page read and write
59A0000
trusted library section
page read and write
1424000
heap
page read and write
6B20000
trusted library allocation
page read and write
1A7A000
heap
page read and write
6360000
trusted library allocation
page execute and read and write
6D58000
trusted library allocation
page read and write
1488000
heap
page read and write
2A8C000
stack
page read and write
2A50000
heap
page read and write
3E94000
trusted library allocation
page read and write
5820000
trusted library allocation
page execute and read and write
1000000
heap
page read and write
2DBE000
unkown
page read and write
3FA3000
trusted library allocation
page read and write
3476000
trusted library allocation
page read and write
54D1000
trusted library allocation
page read and write
3BD6000
trusted library allocation
page read and write
80DE000
stack
page read and write
577B000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
54BF000
stack
page read and write
D10000
heap
page read and write
2D40000
trusted library allocation
page read and write
6841000
trusted library allocation
page read and write
53D4000
trusted library allocation
page read and write
5230000
heap
page execute and read and write
64C5000
trusted library allocation
page read and write
FA3000
heap
page read and write
1A20000
trusted library allocation
page read and write
30D6000
trusted library allocation
page read and write
5BEE000
stack
page read and write
95D0000
trusted library allocation
page read and write
6D54000
trusted library allocation
page read and write
3A7B000
trusted library allocation
page read and write
1A10000
trusted library allocation
page read and write
2CC2000
trusted library allocation
page read and write
4BE8000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
7786000
heap
page read and write
E20000
trusted library allocation
page read and write
7D5E000
stack
page read and write
2ED3000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
6822000
trusted library allocation
page read and write
3AC8000
trusted library allocation
page read and write
6015000
heap
page read and write
332E000
stack
page read and write
5990000
trusted library allocation
page execute and read and write
11CB000
heap
page read and write
2C65000
trusted library allocation
page read and write
4023000
trusted library allocation
page read and write
4359000
trusted library allocation
page read and write
65BF000
stack
page read and write
2AE5000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
29E0000
heap
page execute and read and write
3ED9000
trusted library allocation
page read and write
75B0000
heap
page read and write
3E7E000
trusted library allocation
page read and write
5501000
trusted library allocation
page read and write
657E000
stack
page read and write
11C7000
heap
page read and write
64EA000
trusted library allocation
page read and write
14AF000
heap
page read and write
1A50000
trusted library allocation
page read and write
14DF000
stack
page read and write
64E9000
heap
page read and write
4EEE000
stack
page read and write
6610000
heap
page read and write
29A0000
trusted library allocation
page read and write
CF7000
stack
page read and write
6D68000
trusted library allocation
page read and write
6824000
trusted library allocation
page read and write
3A5E000
trusted library allocation
page read and write
89FF000
stack
page read and write
69DF000
stack
page read and write
5CE0000
heap
page read and write
12C0000
heap
page read and write
64C0000
trusted library allocation
page read and write
1053000
heap
page read and write
27F0000
heap
page read and write
66C4000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
2B9E000
stack
page read and write
2D95000
trusted library allocation
page read and write
627C000
heap
page read and write
2C7F000
stack
page read and write
64BF000
stack
page read and write
E10000
trusted library allocation
page read and write
3E55000
trusted library allocation
page read and write
585D000
stack
page read and write
4F6E000
stack
page read and write
568E000
stack
page read and write
62DB000
heap
page read and write
683E000
trusted library allocation
page read and write
64C2000
trusted library allocation
page read and write
6855000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
77BC000
heap
page read and write
2D0A000
stack
page read and write
8290000
trusted library allocation
page execute and read and write
E1D000
trusted library allocation
page execute and read and write
8D80000
heap
page read and write
2A4E000
stack
page read and write
2EAE000
stack
page read and write
6260000
heap
page read and write
31A0000
trusted library allocation
page execute and read and write
1430000
heap
page read and write
3D6E000
trusted library allocation
page read and write
63AE000
stack
page read and write
656C000
heap
page read and write
3120000
heap
page read and write
668E000
stack
page read and write
78DF000
stack
page read and write
5830000
trusted library allocation
page read and write
61B0000
heap
page read and write
795E000
stack
page read and write
CF0000
heap
page read and write
1A32000
trusted library allocation
page read and write
50EE000
stack
page read and write
31EF000
trusted library allocation
page read and write
4EF5000
trusted library allocation
page read and write
6C2E000
stack
page read and write
6505000
trusted library allocation
page read and write
3D80000
trusted library allocation
page read and write
F79000
heap
page read and write
67B0000
trusted library allocation
page read and write
561B000
trusted library allocation
page read and write
883E000
stack
page read and write
ECE000
heap
page read and write
78AE000
stack
page read and write
3D7A000
trusted library allocation
page read and write
2D00000
trusted library allocation
page execute and read and write
13FA000
heap
page read and write
2C31000
trusted library allocation
page read and write
1A22000
trusted library allocation
page read and write
1432000
heap
page read and write
3E50000
trusted library allocation
page read and write
29BD000
trusted library allocation
page execute and read and write
5930000
trusted library allocation
page read and write
56CD000
stack
page read and write
6846000
trusted library allocation
page read and write
3FE4000
trusted library allocation
page read and write
3185000
trusted library allocation
page read and write
2B60000
heap
page read and write
3C00000
trusted library allocation
page read and write
7630000
trusted library allocation
page execute and read and write
1A30000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
9470000
heap
page read and write
5ABB000
stack
page read and write
5FEE000
heap
page read and write
2DFF000
unkown
page read and write
5ABD000
stack
page read and write
2B8C000
trusted library allocation
page read and write
DA7000
stack
page read and write
54CB000
trusted library allocation
page read and write
699E000
stack
page read and write
29E0000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
29B0000
trusted library allocation
page read and write
7FBA0000
trusted library allocation
page execute and read and write
E92000
heap
page read and write
2BA4000
trusted library allocation
page read and write
82A0000
trusted library allocation
page read and write
317E000
stack
page read and write
77A2000
heap
page read and write
6680000
trusted library allocation
page read and write
4F8C000
stack
page read and write
5FE3000
heap
page read and write
625E000
stack
page read and write
3526000
trusted library allocation
page read and write
C60000
heap
page read and write
29B4000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
3126000
trusted library allocation
page read and write
64D9000
heap
page read and write
5660000
heap
page execute and read and write
809E000
stack
page read and write
2970000
heap
page read and write
1030000
trusted library allocation
page read and write
6520000
trusted library allocation
page read and write
There are 797 hidden memdumps, click here to show them.