IOC Report
RgIbrhxoEx.exe

loading gif

Files

File Path
Type
Category
Malicious
RgIbrhxoEx.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RgIbrhxoEx.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp3B03.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\LjGABleGAy.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\LjGABleGAy.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\LjGABleGAy.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1doh44bp.5xz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3cpeqnkc.pbx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cuqgxjxh.1xj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_deftesll.lie.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iipxnmmf.ezd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kz5ccsmr.ge3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oo1c4ah5.qh4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wowg51dl.0ls.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp1CC9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp1CF9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp1D28.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp2AD0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp2B00.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp30C0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp30D1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp30E1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp30F2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp3112.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3123.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp382E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp383F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp3850.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3860.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp465.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp486.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp4A6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp4B6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp4C7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp4D8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp4D9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp539B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp53CB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp53DB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp53FC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp5E88.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp5F40.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5F51.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5F61.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5F72.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5F73.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp5F83.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp5FA4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp665D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp666D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp66AD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp8A01.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp8A31.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp8A51.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9018.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9028.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9376.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp9387.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp9398.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp93A8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp93B9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp93C9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp93DA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp9B6A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9B8A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9B9B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9BAB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9BBC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA68E.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA69E.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA69F.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpC018.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC028.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC048.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC059.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC73F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpC750.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpC770.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC781.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC9F6.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpCA07.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpCA18.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpCA19.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD01B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD02C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD03D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD03E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD04E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD05F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD060.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD070.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD081.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpD082.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpD093.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpDFF0.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpDFF1.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpE002.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpF593.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpF5A4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpF5D4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpF5F4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFAE9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpFAF9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
There are 94 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RgIbrhxoEx.exe
"C:\Users\user\Desktop\RgIbrhxoEx.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RgIbrhxoEx.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\LjGABleGAy.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LjGABleGAy" /XML "C:\Users\user\AppData\Local\Temp\tmp3B03.tmp"
malicious
C:\Users\user\Desktop\RgIbrhxoEx.exe
"C:\Users\user\Desktop\RgIbrhxoEx.exe"
malicious
C:\Users\user\AppData\Roaming\LjGABleGAy.exe
C:\Users\user\AppData\Roaming\LjGABleGAy.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LjGABleGAy" /XML "C:\Users\user\AppData\Local\Temp\tmp5E88.tmp"
malicious
C:\Users\user\AppData\Roaming\LjGABleGAy.exe
"C:\Users\user\AppData\Roaming\LjGABleGAy.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.222.57.151:55615/
185.222.57.151
malicious
185.222.57.151:55615
malicious
https://ipinfo.io/ip%appdata%
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
https://api.ip.sb
unknown
https://api.ip.sb/geoip
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://185.222.57.151:55615t-
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://api.ipify.orgcookies//settinString.Removeg
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://185.222.57.151:55615
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 28 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.222.57.151
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RgIbrhxoEx_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RgIbrhxoEx_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RgIbrhxoEx_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RgIbrhxoEx_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RgIbrhxoEx_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RgIbrhxoEx_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RgIbrhxoEx_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RgIbrhxoEx_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RgIbrhxoEx_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RgIbrhxoEx_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RgIbrhxoEx_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RgIbrhxoEx_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RgIbrhxoEx_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RgIbrhxoEx_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LjGABleGAy_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LjGABleGAy_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LjGABleGAy_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LjGABleGAy_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LjGABleGAy_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LjGABleGAy_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LjGABleGAy_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LjGABleGAy_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LjGABleGAy_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LjGABleGAy_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LjGABleGAy_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LjGABleGAy_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LjGABleGAy_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LjGABleGAy_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
3E0A000
trusted library allocation
page read and write
malicious
424B000
trusted library allocation
page read and write
malicious
8DB0000
heap
page read and write
32A0000
heap
page read and write
34DB000
trusted library allocation
page read and write
5715000
trusted library allocation
page read and write
12ED000
trusted library allocation
page execute and read and write
FCC000
stack
page read and write
6820000
trusted library allocation
page read and write
7316000
trusted library allocation
page read and write
1347000
trusted library allocation
page execute and read and write
580E000
stack
page read and write
68C7000
trusted library allocation
page read and write
2E70000
heap
page read and write
5670000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
5926000
trusted library allocation
page read and write
6702000
trusted library allocation
page read and write
5820000
heap
page read and write
6590000
trusted library allocation
page read and write
6903000
heap
page read and write
1004000
heap
page read and write
6F62000
trusted library allocation
page read and write
715C000
heap
page read and write
6D34000
heap
page read and write
6D4D000
heap
page read and write
5A5D000
trusted library allocation
page read and write
E5E000
stack
page read and write
6AFA000
trusted library allocation
page read and write
325F000
trusted library allocation
page read and write
E10000
heap
page read and write
11CE000
stack
page read and write
8B2D000
stack
page read and write
1380000
heap
page read and write
1292000
trusted library allocation
page read and write
1426000
trusted library allocation
page read and write
694B000
heap
page read and write
1089000
heap
page read and write
6F56000
trusted library allocation
page read and write
963F000
stack
page read and write
2FAF000
trusted library allocation
page read and write
D60000
heap
page read and write
6D50000
heap
page read and write
7A40000
trusted library allocation
page read and write
6F74000
trusted library allocation
page read and write
6900000
heap
page read and write
6552000
heap
page read and write
D20000
heap
page read and write
2FF0000
heap
page read and write
720F000
stack
page read and write
6D20000
heap
page read and write
30AE000
stack
page read and write
1340000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
43CE000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
55B0000
heap
page read and write
5ACE000
stack
page read and write
55B0000
trusted library allocation
page read and write
689E000
stack
page read and write
66FE000
stack
page read and write
2D60000
heap
page read and write
953E000
stack
page read and write
6240000
heap
page read and write
56CE000
stack
page read and write
7119000
heap
page read and write
568E000
stack
page read and write
5590000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
874E000
stack
page read and write
6DC9000
heap
page read and write
124E000
stack
page read and write
6494000
heap
page read and write
F00000
trusted library allocation
page read and write
57CE000
stack
page read and write
1300000
trusted library allocation
page read and write
2CE6000
trusted library allocation
page read and write
3124000
trusted library allocation
page read and write
72FF000
trusted library allocation
page read and write
5571000
trusted library allocation
page read and write
132D000
trusted library allocation
page execute and read and write
647E000
stack
page read and write
111E000
stack
page read and write
77E0000
trusted library allocation
page read and write
143E000
heap
page read and write
6F34000
trusted library allocation
page read and write
33B2000
trusted library allocation
page read and write
3226000
trusted library allocation
page read and write
2F5A000
heap
page read and write
59D0000
trusted library allocation
page read and write
30C0000
heap
page read and write
315E000
stack
page read and write
6AD5000
trusted library allocation
page read and write
13F0000
trusted library allocation
page read and write
1270000
heap
page read and write
68CE000
heap
page read and write
2E89000
trusted library allocation
page read and write
2C99000
stack
page read and write
6B15000
trusted library allocation
page read and write
910C000
stack
page read and write
5E3D000
stack
page read and write
8C6F000
stack
page read and write
12D0000
heap
page read and write
2CF0000
trusted library allocation
page read and write
656C000
heap
page read and write
5690000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
6FC2000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
2EB0000
heap
page read and write
14C2000
heap
page read and write
128D000
trusted library allocation
page execute and read and write
72F4000
trusted library allocation
page read and write
33BB000
trusted library allocation
page read and write
2CF2000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
6740000
trusted library allocation
page read and write
31E4000
trusted library allocation
page read and write
837E000
stack
page read and write
1150000
heap
page read and write
65F0000
trusted library allocation
page execute and read and write
5A5A000
trusted library allocation
page read and write
42D3000
trusted library allocation
page read and write
2CE1000
trusted library allocation
page read and write
42C6000
trusted library allocation
page read and write
1760000
heap
page read and write
13C0000
trusted library allocation
page read and write
65EE000
stack
page read and write
5210000
trusted library allocation
page read and write
7106000
heap
page read and write
6556000
heap
page read and write
141C000
stack
page read and write
2FA6000
trusted library allocation
page read and write
13EF000
trusted library allocation
page read and write
691F000
heap
page read and write
5960000
trusted library allocation
page read and write
31AD000
trusted library allocation
page read and write
32D8000
trusted library allocation
page read and write
1370000
heap
page read and write
13C0000
trusted library allocation
page execute and read and write
912E000
stack
page read and write
EE0000
trusted library allocation
page read and write
7DB0000
trusted library allocation
page execute and read and write
585E000
trusted library allocation
page read and write
7F20000
heap
page read and write
6C70000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1273000
trusted library allocation
page execute and read and write
89F0000
heap
page read and write
554D000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
3050000
trusted library allocation
page execute and read and write
2D20000
heap
page execute and read and write
D37000
stack
page read and write
2FC2000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
7DDA000
heap
page read and write
D95000
heap
page read and write
5520000
trusted library allocation
page read and write
6850000
heap
page read and write
5941000
trusted library allocation
page read and write
1290000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
1345000
trusted library allocation
page execute and read and write
2B80000
heap
page read and write
3120000
trusted library allocation
page read and write
6B04000
trusted library allocation
page read and write
7870000
trusted library allocation
page read and write
1200000
heap
page read and write
553E000
trusted library allocation
page read and write
651E000
heap
page read and write
5710000
trusted library allocation
page read and write
900C000
stack
page read and write
14A2000
heap
page read and write
2E99000
trusted library allocation
page read and write
6F5D000
trusted library allocation
page read and write
43CB000
trusted library allocation
page read and write
32D1000
trusted library allocation
page read and write
7135000
heap
page read and write
317C000
trusted library allocation
page read and write
43BB000
trusted library allocation
page read and write
6E70000
heap
page read and write
6B9E000
stack
page read and write
10F7000
stack
page read and write
1410000
trusted library allocation
page read and write
134B000
trusted library allocation
page execute and read and write
6F3C000
trusted library allocation
page read and write
2F39000
trusted library allocation
page read and write
6892000
heap
page read and write
2AFA000
trusted library allocation
page read and write
2E9B000
trusted library allocation
page read and write
2C91000
trusted library allocation
page read and write
6F3F000
trusted library allocation
page read and write
2FCE000
stack
page read and write
5270000
trusted library section
page read and write
69C0000
trusted library allocation
page execute and read and write
43BE000
trusted library allocation
page read and write
14BE000
heap
page read and write
F05000
heap
page read and write
127D000
trusted library allocation
page execute and read and write
143A000
heap
page read and write
301B000
trusted library allocation
page read and write
162E000
stack
page read and write
8C2E000
stack
page read and write
EE3000
trusted library allocation
page execute and read and write
3090000
trusted library allocation
page read and write
5A0F000
heap
page read and write
6DDF000
heap
page read and write
3309000
trusted library allocation
page read and write
5F40000
trusted library section
page read and write
654D000
heap
page read and write
42B0000
trusted library allocation
page read and write
64C2000
heap
page read and write
423D000
trusted library allocation
page read and write
7171000
heap
page read and write
3F7E000
trusted library allocation
page read and write
6F58000
trusted library allocation
page read and write
2CC4000
trusted library allocation
page read and write
44D3000
trusted library allocation
page read and write
6850000
heap
page read and write
6BF0000
trusted library allocation
page read and write
3226000
trusted library allocation
page read and write
7325000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
5720000
heap
page read and write
2F6E000
stack
page read and write
7165000
heap
page read and write
2F91000
trusted library allocation
page read and write
2F2F000
trusted library allocation
page read and write
E05000
heap
page read and write
93FE000
stack
page read and write
EED000
trusted library allocation
page execute and read and write
43D1000
trusted library allocation
page read and write
526E000
stack
page read and write
2D90000
heap
page read and write
6DB9000
heap
page read and write
40DA000
trusted library allocation
page read and write
6734000
trusted library allocation
page read and write
8B2000
unkown
page readonly
1320000
trusted library allocation
page execute and read and write
2B00000
heap
page execute and read and write
12C0000
trusted library allocation
page read and write
556E000
trusted library allocation
page read and write
5E40000
heap
page read and write
6936000
heap
page read and write
3255000
trusted library allocation
page read and write
6C6E000
stack
page read and write
52FE000
stack
page read and write
557C000
trusted library allocation
page read and write
F0A000
trusted library allocation
page execute and read and write
12A7000
trusted library allocation
page execute and read and write
303E000
stack
page read and write
31A0000
trusted library allocation
page read and write
56D0000
heap
page read and write
7D9E000
stack
page read and write
1336000
trusted library allocation
page execute and read and write
6AD2000
trusted library allocation
page read and write
8A6E000
stack
page read and write
4535000
trusted library allocation
page read and write
2EF9000
trusted library allocation
page read and write
7820000
trusted library allocation
page execute and read and write
6ACF000
stack
page read and write
41E9000
trusted library allocation
page read and write
1465000
heap
page read and write
2E90000
heap
page read and write
6BDE000
stack
page read and write
42AA000
trusted library allocation
page read and write
56FD000
stack
page read and write
137E000
stack
page read and write
6BE0000
trusted library allocation
page execute and read and write
7F1D000
stack
page read and write
67FE000
stack
page read and write
31E9000
trusted library allocation
page read and write
2F1A000
trusted library allocation
page read and write
2D00000
heap
page read and write
43D3000
trusted library allocation
page read and write
F1B000
trusted library allocation
page execute and read and write
F02000
trusted library allocation
page read and write
8D6E000
stack
page read and write
F30000
heap
page read and write
7A90000
trusted library allocation
page read and write
5B2E000
stack
page read and write
59E0000
heap
page read and write
7A26000
heap
page read and write
337B000
trusted library allocation
page read and write
76D0000
heap
page read and write
68C0000
trusted library allocation
page read and write
32CE000
trusted library allocation
page read and write
1314000
trusted library allocation
page read and write
58B1000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
56C1000
trusted library allocation
page read and write
6B12000
trusted library allocation
page read and write
2F50000
heap
page read and write
573E000
stack
page read and write
42B7000
trusted library allocation
page read and write
7F9C0000
trusted library allocation
page execute and read and write
7304000
trusted library allocation
page read and write
2C8F000
stack
page read and write
75DE000
stack
page read and write
3172000
trusted library allocation
page read and write
E10000
heap
page read and write
F8E000
stack
page read and write
76C0000
trusted library allocation
page execute and read and write
5C2B000
trusted library allocation
page read and write
70F0000
heap
page read and write
924E000
stack
page read and write
64FC000
heap
page read and write
7AA0000
trusted library allocation
page execute and read and write
2F47000
trusted library allocation
page read and write
88ED000
stack
page read and write
2AF4000
trusted library allocation
page read and write
72FC000
trusted library allocation
page read and write
1472000
heap
page read and write
56B0000
trusted library allocation
page execute and read and write
6545000
heap
page read and write
84EE000
stack
page read and write
3366000
trusted library allocation
page read and write
44BE000
trusted library allocation
page read and write
14C4000
heap
page read and write
554B000
trusted library allocation
page read and write
C3B000
stack
page read and write
12AB000
trusted library allocation
page execute and read and write
65A0000
trusted library allocation
page execute and read and write
334A000
trusted library allocation
page read and write
5556000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
162F000
stack
page read and write
6C90000
trusted library allocation
page read and write
5AEE000
stack
page read and write
1295000
heap
page read and write
7A2A000
heap
page read and write
6488000
heap
page read and write
F17000
trusted library allocation
page execute and read and write
584E000
stack
page read and write
4124000
trusted library allocation
page read and write
40C2000
trusted library allocation
page read and write
3CC2000
trusted library allocation
page read and write
6D61000
heap
page read and write
555D000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
72F2000
trusted library allocation
page read and write
31D0000
heap
page execute and read and write
84AE000
stack
page read and write
77F0000
trusted library allocation
page execute and read and write
5921000
trusted library allocation
page read and write
7840000
trusted library allocation
page execute and read and write
13BE000
stack
page read and write
6F36000
trusted library allocation
page read and write
552B000
trusted library allocation
page read and write
1766000
heap
page read and write
3DC9000
trusted library allocation
page read and write
309E000
stack
page read and write
2B50000
trusted library allocation
page read and write
31E1000
trusted library allocation
page read and write
2AF0000
trusted library allocation
page read and write
2FCE000
stack
page read and write
76B0000
trusted library allocation
page read and write
5EBD000
stack
page read and write
3CC0000
trusted library allocation
page read and write
5C1E000
stack
page read and write
FD0000
heap
page read and write
5A70000
trusted library allocation
page read and write
5932000
trusted library allocation
page read and write
5490000
trusted library allocation
page execute and read and write
1464000
heap
page read and write
7F1C0000
trusted library allocation
page execute and read and write
6592000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
2B4C000
stack
page read and write
568A000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
6DBD000
heap
page read and write
72F6000
trusted library allocation
page read and write
706E000
stack
page read and write
12CE000
stack
page read and write
9CA000
stack
page read and write
2CBE000
stack
page read and write
902E000
stack
page read and write
14CA000
heap
page read and write
55F0000
trusted library allocation
page read and write
7AD0000
heap
page read and write
68FB000
heap
page read and write
128E000
stack
page read and write
73B0000
trusted library allocation
page read and write
3DA1000
trusted library allocation
page read and write
7DC0000
heap
page read and write
2BDD000
stack
page read and write
54A0000
heap
page read and write
12D5000
heap
page read and write
59DE000
stack
page read and write
13D0000
heap
page read and write
56B0000
trusted library section
page read and write
1317000
trusted library allocation
page execute and read and write
45BE000
trusted library allocation
page read and write
30B1000
trusted library allocation
page read and write
650E000
heap
page read and write
7D20000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
6F51000
trusted library allocation
page read and write
1430000
heap
page read and write
3024000
trusted library allocation
page read and write
6864000
heap
page read and write
300F000
stack
page read and write
8EED000
stack
page read and write
5563000
trusted library allocation
page read and write
87AF000
stack
page read and write
6D75000
heap
page read and write
7880000
trusted library allocation
page read and write
7830000
trusted library allocation
page read and write
5B2B000
stack
page read and write
3099000
trusted library allocation
page read and write
6D26000
heap
page read and write
319C000
stack
page read and write
3411000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
7D30000
trusted library allocation
page read and write
43D9000
trusted library allocation
page read and write
739B000
stack
page read and write
70AE000
stack
page read and write
827F000
stack
page read and write
1280000
trusted library allocation
page read and write
31F2000
trusted library allocation
page read and write
5552000
trusted library allocation
page read and write
79DE000
stack
page read and write
3030000
trusted library allocation
page read and write
765B000
stack
page read and write
2E80000
heap
page read and write
7D37000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
2F4D000
trusted library allocation
page read and write
56D0000
trusted library section
page read and write
5EFE000
stack
page read and write
3364000
trusted library allocation
page read and write
FDE000
heap
page read and write
7A00000
trusted library allocation
page execute and read and write
12A2000
trusted library allocation
page read and write
1120000
heap
page read and write
6750000
trusted library allocation
page read and write
5541000
trusted library allocation
page read and write
8500000
heap
page read and write
130A000
trusted library allocation
page execute and read and write
59C0000
trusted library allocation
page read and write
EFD000
trusted library allocation
page execute and read and write
51EE000
stack
page read and write
88AE000
stack
page read and write
6B10000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
55AF000
stack
page read and write
55D0000
heap
page read and write
1459000
heap
page read and write
2DA1000
trusted library allocation
page read and write
69BE000
stack
page read and write
6C20000
heap
page read and write
5A80000
trusted library allocation
page execute and read and write
9261000
trusted library allocation
page read and write
6745000
trusted library allocation
page read and write
1419000
heap
page read and write
12E4000
trusted library allocation
page read and write
8DAD000
stack
page read and write
4E9C000
stack
page read and write
346C000
trusted library allocation
page read and write
E9E000
stack
page read and write
E80000
heap
page read and write
4479000
trusted library allocation
page read and write
131D000
trusted library allocation
page execute and read and write
2D10000
trusted library allocation
page read and write
5B30000
trusted library allocation
page read and write
1302000
trusted library allocation
page read and write
6F65000
trusted library allocation
page read and write
4305000
trusted library allocation
page read and write
5B40000
heap
page read and write
6970000
trusted library allocation
page execute and read and write
2E91000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
6480000
heap
page read and write
5B10000
trusted library allocation
page execute and read and write
1290000
heap
page read and write
6C1E000
stack
page read and write
3100000
trusted library allocation
page read and write
124F000
stack
page read and write
89ED000
stack
page read and write
591B000
trusted library allocation
page read and write
42CE000
trusted library allocation
page read and write
2E1E000
unkown
page read and write
5FB0000
trusted library allocation
page read and write
580E000
stack
page read and write
2D80000
trusted library allocation
page execute and read and write
CF7000
stack
page read and write
12EB000
heap
page read and write
176B000
heap
page read and write
1274000
trusted library allocation
page read and write
7308000
trusted library allocation
page read and write
14F6000
heap
page read and write
6AE8000
trusted library allocation
page read and write
684E000
stack
page read and write
5566000
trusted library allocation
page read and write
6AEF000
trusted library allocation
page read and write
43C5000
trusted library allocation
page read and write
1390000
heap
page read and write
568D000
trusted library allocation
page read and write
12DE000
stack
page read and write
7311000
trusted library allocation
page read and write
3141000
trusted library allocation
page read and write
1380000
heap
page execute and read and write
105D000
heap
page read and write
86AE000
stack
page read and write
13B0000
trusted library allocation
page execute and read and write
131B000
trusted library allocation
page execute and read and write
914D000
stack
page read and write
74D5000
trusted library allocation
page read and write
3CBC000
trusted library allocation
page read and write
7F880000
trusted library allocation
page execute and read and write
13F5000
trusted library allocation
page read and write
325D000
trusted library allocation
page read and write
6D7F000
heap
page read and write
1140000
heap
page read and write
40B1000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
1457000
heap
page read and write
6700000
trusted library allocation
page read and write
31CE000
trusted library allocation
page read and write
4C98000
trusted library allocation
page read and write
1444000
heap
page read and write
3318000
trusted library allocation
page read and write
31D2000
trusted library allocation
page read and write
6568000
heap
page read and write
13E0000
trusted library allocation
page read and write
DCA000
stack
page read and write
5600000
trusted library allocation
page read and write
2F6F000
trusted library allocation
page read and write
3037000
trusted library allocation
page read and write
352F000
trusted library allocation
page read and write
13B0000
trusted library allocation
page read and write
5740000
trusted library allocation
page execute and read and write
DB3000
heap
page read and write
5C4D000
stack
page read and write
55B0000
trusted library allocation
page execute and read and write
42D3000
trusted library allocation
page read and write
674E000
stack
page read and write
4420000
trusted library allocation
page read and write
88AF000
stack
page read and write
77DE000
stack
page read and write
1342000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
172F000
stack
page read and write
12E6000
heap
page read and write
68F6000
heap
page read and write
10F8000
stack
page read and write
655D000
heap
page read and write
43C2000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
6578000
heap
page read and write
576C000
stack
page read and write
2F80000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
6909000
heap
page read and write
886E000
stack
page read and write
12F0000
trusted library allocation
page read and write
5590000
heap
page read and write
126E000
stack
page read and write
6D87000
heap
page read and write
731D000
trusted library allocation
page read and write
664E000
stack
page read and write
2FA0000
heap
page execute and read and write
1400000
trusted library allocation
page read and write
42C9000
trusted library allocation
page read and write
7A80000
heap
page read and write
8B6F000
stack
page read and write
40E2000
trusted library allocation
page read and write
6C94000
trusted library allocation
page read and write
7DD6000
heap
page read and write
7CF0000
trusted library allocation
page read and write
58D0000
heap
page execute and read and write
2CCB000
trusted library allocation
page read and write
6F48000
trusted library allocation
page read and write
685C000
heap
page read and write
6D67000
heap
page read and write
50B8000
trusted library allocation
page read and write
5546000
trusted library allocation
page read and write
3CBA000
trusted library allocation
page read and write
8B0000
unkown
page readonly
7D00000
trusted library allocation
page execute and read and write
8CAD000
stack
page read and write
3723000
trusted library allocation
page read and write
F12000
trusted library allocation
page read and write
7318000
trusted library allocation
page read and write
310A000
trusted library allocation
page read and write
7EF70000
trusted library allocation
page execute and read and write
12E0000
heap
page read and write
6F76000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
7322000
trusted library allocation
page read and write
6960000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
593E000
trusted library allocation
page read and write
2F28000
trusted library allocation
page read and write
13D3000
heap
page read and write
5C80000
trusted library allocation
page read and write
93BC000
stack
page read and write
5A40000
trusted library allocation
page read and write
6810000
trusted library allocation
page execute and read and write
3298000
trusted library allocation
page read and write
67BE000
stack
page read and write
9240000
heap
page read and write
4E2D000
stack
page read and write
2EFE000
unkown
page read and write
56F0000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
55E0000
trusted library allocation
page execute and read and write
140C000
stack
page read and write
42C0000
trusted library allocation
page read and write
2F3F000
unkown
page read and write
2FBC000
trusted library allocation
page read and write
313C000
trusted library allocation
page read and write
7BDE000
stack
page read and write
4225000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
2F14000
trusted library allocation
page read and write
14A0000
heap
page read and write
ECE000
stack
page read and write
6AD9000
trusted library allocation
page read and write
7F30000
trusted library allocation
page execute and read and write
6B8D000
stack
page read and write
1740000
heap
page read and write
76A0000
trusted library allocation
page read and write
321F000
trusted library allocation
page read and write
6939000
heap
page read and write
3CA9000
trusted library allocation
page read and write
7A70000
trusted library allocation
page execute and read and write
D88000
heap
page read and write
70EF000
stack
page read and write
422D000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
31C8000
trusted library allocation
page read and write
7142000
heap
page read and write
6BCF000
stack
page read and write
51AE000
stack
page read and write
524D000
stack
page read and write
2E90000
heap
page read and write
7860000
trusted library allocation
page read and write
1312000
trusted library allocation
page read and write
DAE000
heap
page read and write
3DA9000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
12E3000
trusted library allocation
page execute and read and write
10DF000
stack
page read and write
7CE0000
trusted library allocation
page execute and read and write
7330000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
5579000
trusted library allocation
page read and write
1332000
trusted library allocation
page read and write
FF7000
heap
page read and write
3E93000
trusted library allocation
page read and write
2E8E000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
2F20000
heap
page execute and read and write
13D0000
heap
page read and write
1438000
heap
page read and write
5810000
trusted library allocation
page execute and read and write
12A5000
trusted library allocation
page execute and read and write
6AEA000
trusted library allocation
page read and write
1410000
heap
page read and write
172F000
stack
page read and write
5C20000
trusted library allocation
page read and write
13C0000
heap
page read and write
2E6F000
unkown
page read and write
4260000
trusted library allocation
page read and write
692E000
heap
page read and write
55A0000
trusted library allocation
page read and write
7A10000
heap
page read and write
4254000
trusted library allocation
page read and write
5610000
trusted library allocation
page execute and read and write
864F000
stack
page read and write
3C91000
trusted library allocation
page read and write
DBC000
heap
page read and write
2E9F000
trusted library allocation
page read and write
3C9E000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
8FEE000
stack
page read and write
F06000
trusted library allocation
page execute and read and write
1730000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
1430000
heap
page read and write
EF0000
trusted library allocation
page read and write
7850000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
E00000
heap
page read and write
6F32000
trusted library allocation
page read and write
3EE4000
trusted library allocation
page read and write
7A60000
trusted library allocation
page read and write
EE4000
trusted library allocation
page read and write
8ECE000
stack
page read and write
8C6E000
stack
page read and write
7A42000
trusted library allocation
page read and write
2FDF000
trusted library allocation
page read and write
42C3000
trusted library allocation
page read and write
553F000
stack
page read and write
6962000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
42BA000
trusted library allocation
page read and write
1470000
heap
page read and write
627E000
stack
page read and write
2FE0000
trusted library allocation
page read and write
100F000
heap
page read and write
51F0000
heap
page execute and read and write
7168000
heap
page read and write
554E000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
53FE000
stack
page read and write
1120000
heap
page read and write
106C000
heap
page read and write
3267000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
2DE6000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
3DE3000
trusted library allocation
page read and write
6AF5000
trusted library allocation
page read and write
12D0000
trusted library allocation
page execute and read and write
5850000
trusted library allocation
page read and write
6C20000
heap
page read and write
3059000
trusted library allocation
page read and write
2ACE000
stack
page read and write
2CED000
trusted library allocation
page read and write
7B4E000
stack
page read and write
7128000
heap
page read and write
1370000
trusted library allocation
page execute and read and write
43DE000
trusted library allocation
page read and write
3D02000
trusted library allocation
page read and write
6B00000
trusted library allocation
page read and write
136E000
stack
page read and write
59E0000
trusted library allocation
page execute and read and write
7890000
heap
page read and write
ED0000
heap
page read and write
2B71000
trusted library allocation
page read and write
31ED000
trusted library allocation
page read and write
319F000
stack
page read and write
130E000
stack
page read and write
13A0000
heap
page read and write
12F3000
trusted library allocation
page read and write
43B5000
trusted library allocation
page read and write
41E1000
trusted library allocation
page read and write
1313000
trusted library allocation
page execute and read and write
6C30000
heap
page read and write
6F4E000
trusted library allocation
page read and write
32C7000
trusted library allocation
page read and write
1424000
trusted library allocation
page read and write
30CA000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
7A50000
trusted library allocation
page read and write
40BE000
trusted library allocation
page read and write
1306000
trusted library allocation
page execute and read and write
938000
unkown
page readonly
5B0E000
stack
page read and write
144E000
heap
page read and write
672F000
trusted library allocation
page read and write
6E80000
heap
page read and write
637E000
stack
page read and write
2E3A000
stack
page read and write
7B60000
trusted library allocation
page execute and read and write
5552000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
56D3000
heap
page read and write
92BC000
stack
page read and write
12FD000
trusted library allocation
page execute and read and write
2C5D000
stack
page read and write
68E2000
heap
page read and write
1011000
heap
page read and write
5524000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
1062000
heap
page read and write
3134000
trusted library allocation
page read and write
F00000
heap
page read and write
6F20000
trusted library allocation
page read and write
6F44000
trusted library allocation
page read and write
3101000
trusted library allocation
page read and write
1296000
trusted library allocation
page execute and read and write
3146000
trusted library allocation
page read and write
590E000
stack
page read and write
1310000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
EF3000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
4209000
trusted library allocation
page read and write
312E000
trusted library allocation
page read and write
DFB000
stack
page read and write
59B0000
trusted library allocation
page execute and read and write
2FE4000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
2FE5000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page read and write
34AA000
trusted library allocation
page read and write
8FCE000
stack
page read and write
730E000
trusted library allocation
page read and write
13A9000
heap
page read and write
2E9B000
heap
page read and write
346A000
trusted library allocation
page read and write
94FE000
stack
page read and write
543E000
stack
page read and write
7B50000
heap
page read and write
2CDE000
trusted library allocation
page read and write
6AFF000
trusted library allocation
page read and write
425B000
trusted library allocation
page read and write
2E20000
heap
page read and write
There are 806 hidden memdumps, click here to show them.