IOC Report
l2rMtmFkD6.exe

loading gif

Files

File Path
Type
Category
Malicious
l2rMtmFkD6.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\l2rMtmFkD6.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp5831.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\ECcZgk.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\ECcZgk.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ECcZgk.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dzb1rytn.tvw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hyvb4kol.0ns.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jvvypv1n.grr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_knrvkp0w.nt0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_phiy0ts2.u0b.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q3juixqg.tru.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qfw2n3t4.ks0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sfg4gawp.em0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp156F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp157F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp1590.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp1591.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp15A2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp15B2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp15B3.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp15D4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp1BF6.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp1C07.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp1C08.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp1C09.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp35BD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp35ED.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp35FD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3C0D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4ABF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp4AD0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp4AE1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp4AF1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp4B02.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp4B22.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp4C0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4ED2.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4ED3.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4ED4.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4EE5.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5971.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5972.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5973.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5984.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5985.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5986.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5987.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5998.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5BB6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6E74.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6E75.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6E95.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6E96.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6EA6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6EA7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6EB8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6EB9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6ECA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp6ECB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp6EDB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp72FD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp730D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp732E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp733E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp7D1E.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp7FA1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp7FB1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp7FC2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp7FD3.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp7FE3.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp7FF4.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp88A7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp88C7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8907.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8908.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8928.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8929.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp943C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp945C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp946D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp949D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpA6D4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpA6E5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpA6F6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpA6F7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpA707.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpA718.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpA729.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpA739.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpA73A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpA9A1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA9B2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA9C2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC2E7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC308.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC318.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC329.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC349.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpCC96.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpCCB6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpCCD6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpDEC6.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpDED7.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpDFB8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFC7B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFCAB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
There are 98 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\l2rMtmFkD6.exe
"C:\Users\user\Desktop\l2rMtmFkD6.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\l2rMtmFkD6.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ECcZgk.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ECcZgk" /XML "C:\Users\user\AppData\Local\Temp\tmp5831.tmp"
malicious
C:\Users\user\Desktop\l2rMtmFkD6.exe
"C:\Users\user\Desktop\l2rMtmFkD6.exe"
malicious
C:\Users\user\AppData\Roaming\ECcZgk.exe
C:\Users\user\AppData\Roaming\ECcZgk.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ECcZgk" /XML "C:\Users\user\AppData\Local\Temp\tmp7D1E.tmp"
malicious
C:\Users\user\AppData\Roaming\ECcZgk.exe
"C:\Users\user\AppData\Roaming\ECcZgk.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://ipinfo.io/ip%appdata%
unknown
malicious
185.222.58.233:55615
malicious
http://185.222.58.233:55615/
185.222.58.233
malicious
https://api.ipify.orgcookies//settinString.Removeg
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://185.222.58.233:
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
http://tempuri.org/DataSet1.xsd
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
http://185.222.58.233:55615
unknown
https://api.ip.sb
unknown
https://api.ip.sb/geoip
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://tempuri.org/Endpoint/SetEnviron
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://185.222.58.233:55615t-
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 31 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.222.58.233
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\l2rMtmFkD6_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\l2rMtmFkD6_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\l2rMtmFkD6_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\l2rMtmFkD6_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\l2rMtmFkD6_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\l2rMtmFkD6_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\l2rMtmFkD6_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\l2rMtmFkD6_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\l2rMtmFkD6_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\l2rMtmFkD6_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\l2rMtmFkD6_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\l2rMtmFkD6_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\l2rMtmFkD6_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\l2rMtmFkD6_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ECcZgk_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ECcZgk_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ECcZgk_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ECcZgk_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ECcZgk_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ECcZgk_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ECcZgk_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ECcZgk_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ECcZgk_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ECcZgk_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ECcZgk_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ECcZgk_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ECcZgk_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ECcZgk_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3A68000
trusted library allocation
page read and write
malicious
37D8000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
1470000
trusted library allocation
page read and write
5BF0000
trusted library allocation
page read and write
7A80000
trusted library allocation
page execute and read and write
3598000
trusted library allocation
page read and write
552E000
stack
page read and write
1050000
heap
page read and write
4EFA000
trusted library allocation
page read and write
6D60000
trusted library allocation
page execute and read and write
C50000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
6C30000
trusted library allocation
page read and write
5B30000
trusted library allocation
page execute and read and write
860F000
stack
page read and write
84AD000
heap
page read and write
7461000
trusted library allocation
page read and write
6936000
heap
page read and write
1460000
trusted library allocation
page read and write
1350000
heap
page read and write
5A90000
heap
page read and write
4199000
trusted library allocation
page read and write
3482000
trusted library allocation
page read and write
870F000
stack
page read and write
E70000
trusted library allocation
page read and write
7468000
trusted library allocation
page read and write
71C0000
trusted library allocation
page execute and read and write
5F30000
trusted library allocation
page read and write
41D1000
trusted library allocation
page read and write
79BE000
stack
page read and write
3FFE000
trusted library allocation
page read and write
697E000
stack
page read and write
72EA000
heap
page read and write
5D6E000
stack
page read and write
3594000
trusted library allocation
page read and write
7C10000
heap
page read and write
2990000
heap
page read and write
6C70000
trusted library allocation
page read and write
3565000
trusted library allocation
page read and write
4F00000
heap
page read and write
2966000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
3765000
trusted library allocation
page read and write
4232000
trusted library allocation
page read and write
6C54000
trusted library allocation
page read and write
8A4E000
stack
page read and write
4EA0000
trusted library allocation
page read and write
4175000
trusted library allocation
page read and write
5AFD000
stack
page read and write
5A80000
heap
page read and write
2972000
trusted library allocation
page read and write
38EA000
trusted library allocation
page read and write
405F000
trusted library allocation
page read and write
665F000
stack
page read and write
C40000
trusted library allocation
page read and write
33A8000
trusted library allocation
page read and write
8F1000
heap
page read and write
428E000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
8C2E000
stack
page read and write
FF0000
heap
page read and write
6C20000
trusted library allocation
page read and write
4C20000
trusted library allocation
page read and write
59A0000
trusted library allocation
page read and write
E74000
trusted library allocation
page read and write
685E000
stack
page read and write
5BC0000
trusted library allocation
page read and write
4CBA000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page read and write
6B00000
trusted library allocation
page read and write
333B000
heap
page read and write
5EAE000
stack
page read and write
5BD0000
trusted library allocation
page execute and read and write
6ADF000
trusted library allocation
page read and write
86AD000
stack
page read and write
727D000
heap
page read and write
E60000
trusted library allocation
page read and write
6C3F000
trusted library allocation
page read and write
438E000
trusted library allocation
page read and write
EBE000
stack
page read and write
6CDD000
stack
page read and write
7DA0000
trusted library allocation
page read and write
C82000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
41FC000
trusted library allocation
page read and write
359E000
trusted library allocation
page read and write
57FD000
stack
page read and write
321E000
stack
page read and write
5DCE000
stack
page read and write
12F7000
stack
page read and write
16EF000
stack
page read and write
7F80000
trusted library allocation
page execute and read and write
1484000
trusted library allocation
page read and write
3561000
trusted library allocation
page read and write
14F0000
heap
page read and write
69E2000
heap
page read and write
7EEE000
stack
page read and write
C9E000
stack
page read and write
5BAD000
trusted library allocation
page read and write
5D7E000
trusted library allocation
page read and write
30F0000
heap
page read and write
675E000
stack
page read and write
2570000
heap
page read and write
5C1B000
trusted library allocation
page read and write
4140000
trusted library allocation
page read and write
6905000
heap
page read and write
7454000
trusted library allocation
page read and write
5F10000
trusted library allocation
page read and write
3711000
trusted library allocation
page read and write
C72000
trusted library allocation
page read and write
3943000
trusted library allocation
page read and write
3410000
trusted library allocation
page read and write
25A0000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
843B000
heap
page read and write
1432000
trusted library allocation
page read and write
733B000
stack
page read and write
A1E000
stack
page read and write
724C000
heap
page read and write
17AF000
stack
page read and write
3200000
heap
page read and write
1220000
heap
page read and write
55FA000
trusted library allocation
page read and write
55E1000
trusted library allocation
page read and write
51EE000
stack
page read and write
1379000
heap
page read and write
591E000
stack
page read and write
5C1E000
stack
page read and write
8469000
heap
page read and write
4C10000
trusted library allocation
page read and write
4CDB000
trusted library allocation
page read and write
AE5000
heap
page read and write
4D33000
heap
page read and write
53E8000
heap
page read and write
7158000
trusted library allocation
page read and write
3104000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
5B00000
trusted library allocation
page execute and read and write
7294000
heap
page read and write
6A62000
heap
page read and write
6050000
trusted library allocation
page read and write
6874000
heap
page read and write
1470000
heap
page execute and read and write
CA0000
trusted library allocation
page read and write
1140000
heap
page read and write
CCE000
heap
page read and write
7C5E000
stack
page read and write
72D4000
heap
page read and write
414E000
trusted library allocation
page read and write
4159000
trusted library allocation
page read and write
55C6000
trusted library allocation
page read and write
13F2000
heap
page read and write
AA0000
heap
page read and write
7D70000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page execute and read and write
58FE000
stack
page read and write
6AC0000
trusted library allocation
page read and write
8452000
heap
page read and write
1410000
trusted library allocation
page read and write
39A8000
trusted library allocation
page read and write
7B50000
heap
page read and write
1387000
heap
page read and write
540E000
heap
page read and write
34BD000
trusted library allocation
page read and write
7F7000
stack
page read and write
6ADA000
trusted library allocation
page read and write
3368000
trusted library allocation
page read and write
820000
heap
page read and write
5A70000
trusted library section
page read and write
6AEF000
trusted library allocation
page read and write
69A4000
heap
page read and write
845A000
heap
page read and write
2940000
trusted library allocation
page read and write
141D000
trusted library allocation
page execute and read and write
8BE0000
heap
page read and write
7F60000
heap
page read and write
E90000
heap
page read and write
5C90000
heap
page read and write
1682000
trusted library allocation
page read and write
5A4A000
trusted library allocation
page read and write
6C3A000
trusted library allocation
page read and write
4149000
trusted library allocation
page read and write
24CB000
trusted library allocation
page execute and read and write
1447000
trusted library allocation
page execute and read and write
35A0000
trusted library allocation
page read and write
55BB000
trusted library allocation
page read and write
12F5000
heap
page read and write
295E000
trusted library allocation
page read and write
C5D000
trusted library allocation
page execute and read and write
5A3F000
stack
page read and write
7E10000
heap
page read and write
6AC9000
trusted library allocation
page read and write
7C00000
trusted library allocation
page execute and read and write
7A5E000
stack
page read and write
24B2000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
103E000
stack
page read and write
12DE000
stack
page read and write
33DA000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page read and write
579F000
stack
page read and write
7BFE000
stack
page read and write
82A000
heap
page read and write
53BE000
stack
page read and write
7B80000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
84B6000
heap
page read and write
5A91000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
70FE000
stack
page read and write
7DD0000
trusted library allocation
page execute and read and write
5ECE000
stack
page read and write
3890000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
70BE000
stack
page read and write
FF0000
heap
page execute and read and write
53E1000
heap
page read and write
6AF0000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
6AD8000
trusted library allocation
page read and write
6DCE000
stack
page read and write
5AEB000
stack
page read and write
A5F000
stack
page read and write
3682000
trusted library allocation
page read and write
726F000
heap
page read and write
333E000
trusted library allocation
page read and write
83AE000
stack
page read and write
FEF000
trusted library allocation
page read and write
8D2F000
stack
page read and write
335A000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page read and write
728F000
heap
page read and write
600D000
stack
page read and write
5C1E000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
8FBE000
stack
page read and write
4252000
trusted library allocation
page read and write
6AB2000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page execute and read and write
3110000
heap
page read and write
13FE000
stack
page read and write
1442000
trusted library allocation
page read and write
419E000
trusted library allocation
page read and write
677E000
stack
page read and write
89AF000
stack
page read and write
270E000
stack
page read and write
7142000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
344B000
trusted library allocation
page read and write
252E000
stack
page read and write
29A1000
trusted library allocation
page read and write
1414000
trusted library allocation
page read and write
5C1E000
stack
page read and write
4154000
trusted library allocation
page read and write
294B000
trusted library allocation
page read and write
149D000
trusted library allocation
page execute and read and write
4EE0000
heap
page execute and read and write
4C00000
trusted library allocation
page read and write
45FB000
trusted library allocation
page read and write
8474000
heap
page read and write
691C000
heap
page read and write
3336000
trusted library allocation
page read and write
5EEE000
stack
page read and write
85AE000
stack
page read and write
6C65000
trusted library allocation
page read and write
41C8000
trusted library allocation
page read and write
4022000
trusted library allocation
page read and write
CDF000
heap
page read and write
A70000
heap
page read and write
FD0000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page execute and read and write
6A0D000
heap
page read and write
59D0000
trusted library allocation
page execute and read and write
2BB2000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
1740000
heap
page read and write
A90000
heap
page read and write
6C26000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
25E6000
trusted library allocation
page read and write
5C0000
unkown
page readonly
8D0000
heap
page read and write
90BE000
stack
page read and write
6C7E000
stack
page read and write
8A8D000
stack
page read and write
79E0000
trusted library allocation
page read and write
309A000
stack
page read and write
745E000
trusted library allocation
page read and write
1445000
trusted library allocation
page execute and read and write
6A80000
heap
page read and write
59A0000
trusted library allocation
page execute and read and write
7EF0000
trusted library allocation
page read and write
6C38000
trusted library allocation
page read and write
16A0000
heap
page read and write
A4E000
stack
page read and write
6DD0000
heap
page read and write
1040000
trusted library allocation
page read and write
4146000
trusted library allocation
page read and write
86B0000
heap
page read and write
7475000
trusted library allocation
page read and write
C87000
trusted library allocation
page execute and read and write
5A71000
trusted library allocation
page read and write
862000
heap
page read and write
1697000
trusted library allocation
page execute and read and write
51F0000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
7146000
trusted library allocation
page read and write
37A5000
trusted library allocation
page read and write
CF4000
heap
page read and write
9596000
heap
page read and write
7466000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page execute and read and write
5056000
heap
page read and write
599D000
stack
page read and write
88AE000
stack
page read and write
4EE0000
heap
page read and write
34FD000
trusted library allocation
page read and write
5030000
heap
page read and write
810000
heap
page read and write
1045000
trusted library allocation
page read and write
6B7D000
stack
page read and write
8420000
heap
page read and write
6860000
heap
page read and write
6D30000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
5F32000
trusted library allocation
page read and write
36F3000
trusted library allocation
page read and write
CB0000
trusted library allocation
page execute and read and write
74E0000
trusted library allocation
page read and write
AE0000
heap
page read and write
333C000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
6AC2000
trusted library allocation
page read and write
41D9000
trusted library allocation
page read and write
15C8000
heap
page read and write
30C0000
heap
page read and write
9D0000
heap
page read and write
5C5D000
stack
page read and write
4F03000
heap
page read and write
6947000
heap
page read and write
6C28000
trusted library allocation
page read and write
3330000
heap
page read and write
14F8000
heap
page read and write
12F0000
heap
page read and write
439B000
trusted library allocation
page read and write
716D000
trusted library allocation
page read and write
25DE000
trusted library allocation
page read and write
5411000
heap
page read and write
B9F000
stack
page read and write
5ECE000
stack
page read and write
3221000
trusted library allocation
page read and write
7D10000
heap
page read and write
10F7000
stack
page read and write
352E000
trusted library allocation
page read and write
CC0000
heap
page read and write
293C000
stack
page read and write
2FFC000
stack
page read and write
25B0000
heap
page execute and read and write
8A0000
heap
page read and write
68A2000
heap
page read and write
54D0000
heap
page read and write
414C000
trusted library allocation
page read and write
6C22000
trusted library allocation
page read and write
86C0000
heap
page read and write
5F90000
trusted library section
page read and write
7190000
trusted library allocation
page read and write
5A6E000
stack
page read and write
5EA000
stack
page read and write
8CCF000
stack
page read and write
438E000
trusted library allocation
page read and write
55D2000
trusted library allocation
page read and write
5C10000
trusted library allocation
page read and write
256B000
stack
page read and write
1940000
heap
page read and write
6913000
heap
page read and write
5C5E000
stack
page read and write
7446000
trusted library allocation
page read and write
5C50000
trusted library allocation
page read and write
9C0000
heap
page read and write
FC0000
trusted library allocation
page read and write
3647000
trusted library allocation
page read and write
305D000
stack
page read and write
41D4000
trusted library allocation
page read and write
7B70000
trusted library allocation
page read and write
5CA0000
trusted library allocation
page read and write
2600000
heap
page read and write
687F000
stack
page read and write
3718000
trusted library allocation
page read and write
BFE000
stack
page read and write
3590000
trusted library allocation
page read and write
1483000
trusted library allocation
page execute and read and write
5ABD000
stack
page read and write
7172000
trusted library allocation
page read and write
330F000
stack
page read and write
714F000
trusted library allocation
page read and write
4191000
trusted library allocation
page read and write
6C1E000
stack
page read and write
7480000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
1230000
heap
page read and write
3651000
trusted library allocation
page read and write
7C26000
heap
page read and write
871F000
stack
page read and write
DDB000
stack
page read and write
7180000
trusted library allocation
page read and write
518D000
stack
page read and write
24BA000
trusted library allocation
page execute and read and write
43A1000
trusted library allocation
page read and write
2711000
trusted library allocation
page read and write
8440000
heap
page read and write
880D000
stack
page read and write
25ED000
trusted library allocation
page read and write
5C0E000
stack
page read and write
55B0000
trusted library allocation
page read and write
32CE000
stack
page read and write
5A90000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
6A65000
heap
page read and write
1059000
heap
page read and write
C70000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
3577000
trusted library allocation
page read and write
69B0000
heap
page read and write
133D000
stack
page read and write
5A7000
stack
page read and write
5290000
trusted library allocation
page read and write
CCA000
heap
page read and write
5BCD000
stack
page read and write
7175000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
744F000
trusted library allocation
page read and write
6AC5000
trusted library allocation
page read and write
6960000
trusted library allocation
page execute and read and write
2944000
trusted library allocation
page read and write
158C000
heap
page read and write
7458000
trusted library allocation
page read and write
7144000
trusted library allocation
page read and write
6C20000
trusted library allocation
page read and write
55DE000
trusted library allocation
page read and write
148D000
trusted library allocation
page execute and read and write
6C4A000
trusted library allocation
page read and write
55AE000
stack
page read and write
8E6C000
stack
page read and write
37E1000
trusted library allocation
page read and write
C8B000
trusted library allocation
page execute and read and write
6C89000
trusted library allocation
page read and write
5C60000
trusted library allocation
page execute and read and write
328C000
trusted library allocation
page read and write
6A78000
heap
page read and write
5A62000
trusted library allocation
page read and write
8ADC000
stack
page read and write
4CA0000
heap
page read and write
6AEA000
trusted library allocation
page read and write
2922000
trusted library allocation
page read and write
5059000
heap
page read and write
169B000
trusted library allocation
page execute and read and write
4EF2000
trusted library allocation
page read and write
D01000
heap
page read and write
174E000
heap
page read and write
79D0000
trusted library allocation
page execute and read and write
5F0E000
stack
page read and write
339F000
trusted library allocation
page read and write
1695000
trusted library allocation
page execute and read and write
E8D000
trusted library allocation
page execute and read and write
7472000
trusted library allocation
page read and write
695C000
heap
page read and write
744C000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
1519000
heap
page read and write
7F00000
trusted library allocation
page execute and read and write
4F10000
trusted library allocation
page execute and read and write
5A4D000
trusted library allocation
page read and write
854000
heap
page read and write
25CB000
trusted library allocation
page read and write
3364000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
422E000
trusted library allocation
page read and write
5210000
heap
page execute and read and write
5BEE000
stack
page read and write
6928000
heap
page read and write
69A0000
heap
page read and write
FA0000
heap
page read and write
4CF0000
trusted library allocation
page read and write
693C000
heap
page read and write
48AC000
stack
page read and write
8B8E000
stack
page read and write
84AE000
stack
page read and write
715E000
trusted library allocation
page read and write
14A0000
heap
page read and write
4B3C000
stack
page read and write
FEE000
stack
page read and write
4FF8000
trusted library allocation
page read and write
1480000
trusted library allocation
page read and write
3A2B000
trusted library allocation
page read and write
7F10000
trusted library allocation
page read and write
849B000
heap
page read and write
1400000
trusted library allocation
page read and write
C53000
trusted library allocation
page execute and read and write
4CB0000
trusted library allocation
page read and write
7168000
trusted library allocation
page read and write
41CB000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
37D7000
trusted library allocation
page read and write
612E000
stack
page read and write
6F9E000
stack
page read and write
8493000
heap
page read and write
42FD000
trusted library allocation
page read and write
1746000
heap
page read and write
505D000
heap
page read and write
5B80000
trusted library allocation
page read and write
72AA000
heap
page read and write
713E000
stack
page read and write
4718000
trusted library allocation
page read and write
5F4E000
stack
page read and write
6910000
heap
page read and write
84BA000
heap
page read and write
49A8000
trusted library allocation
page read and write
8E6E000
stack
page read and write
6B0E000
stack
page read and write
7A90000
trusted library allocation
page read and write
850000
heap
page read and write
6FDE000
stack
page read and write
6BBE000
stack
page read and write
6AB0000
trusted library allocation
page read and write
7491000
trusted library allocation
page read and write
53C0000
heap
page read and write
7B60000
trusted library allocation
page read and write
25C0000
trusted library allocation
page read and write
6AF4000
trusted library allocation
page read and write
7444000
trusted library allocation
page read and write
8E90000
trusted library allocation
page execute and read and write
35CD000
trusted library allocation
page read and write
877E000
stack
page read and write
569E000
stack
page read and write
3299000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
35D6000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
53D0000
heap
page read and write
A8E000
stack
page read and write
5A30000
trusted library allocation
page read and write
358C000
trusted library allocation
page read and write
74BF000
trusted library allocation
page read and write
4182000
trusted library allocation
page read and write
C00000
heap
page read and write
4221000
trusted library allocation
page read and write
89E000
unkown
page read and write
2980000
trusted library allocation
page read and write
3010000
heap
page execute and read and write
8810000
heap
page read and write
71D6000
trusted library allocation
page read and write
5A70000
trusted library allocation
page execute and read and write
C54000
trusted library allocation
page read and write
4CD0000
trusted library allocation
page read and write
41D7000
trusted library allocation
page read and write
24C7000
trusted library allocation
page execute and read and write
4BF0000
trusted library allocation
page read and write
72CA000
heap
page read and write
593E000
stack
page read and write
3611000
trusted library allocation
page read and write
5F8D000
stack
page read and write
6AC0000
trusted library allocation
page execute and read and write
7140000
heap
page read and write
9BF000
unkown
page read and write
5DCE000
stack
page read and write
7F5D000
stack
page read and write
53CA000
heap
page read and write
2961000
trusted library allocation
page read and write
14BE000
stack
page read and write
A00000
heap
page read and write
713F000
stack
page read and write
6FA000
stack
page read and write
6A29000
heap
page read and write
959A000
heap
page read and write
8BDC000
stack
page read and write
5A2E000
stack
page read and write
E7D000
trusted library allocation
page execute and read and write
296D000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
4AA000
stack
page read and write
417C000
trusted library allocation
page read and write
4C0F000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
5200000
heap
page read and write
5C40000
trusted library allocation
page execute and read and write
5970000
trusted library allocation
page read and write
2FEE000
stack
page read and write
1413000
trusted library allocation
page execute and read and write
7F890000
trusted library allocation
page execute and read and write
142D000
trusted library allocation
page execute and read and write
9580000
heap
page read and write
4186000
trusted library allocation
page read and write
602E000
stack
page read and write
5A51000
trusted library allocation
page read and write
571F000
stack
page read and write
68E9000
heap
page read and write
6B05000
trusted library allocation
page read and write
28FE000
stack
page read and write
8F70000
heap
page read and write
1436000
trusted library allocation
page execute and read and write
7F790000
trusted library allocation
page execute and read and write
52EB000
stack
page read and write
8D6E000
stack
page read and write
6F5F000
stack
page read and write
5AD0000
trusted library allocation
page read and write
35DB000
trusted library allocation
page read and write
5D10000
trusted library allocation
page execute and read and write
6B10000
trusted library allocation
page execute and read and write
25E1000
trusted library allocation
page read and write
194B000
heap
page read and write
8C3000
heap
page read and write
68DA000
heap
page read and write
9F0000
heap
page read and write
2F70000
trusted library allocation
page read and write
1692000
trusted library allocation
page read and write
36C2000
trusted library allocation
page read and write
1490000
trusted library allocation
page read and write
4D30000
heap
page read and write
AAA000
heap
page read and write
7F70000
heap
page read and write
127E000
stack
page read and write
6D1F000
stack
page read and write
7161000
trusted library allocation
page read and write
526E000
stack
page read and write
25F2000
trusted library allocation
page read and write
324E000
unkown
page read and write
6AE5000
trusted library allocation
page read and write
328F000
unkown
page read and write
1504000
heap
page read and write
F3B000
stack
page read and write
5D70000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
4BF6000
trusted library allocation
page read and write
35D2000
trusted library allocation
page read and write
1730000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
746D000
trusted library allocation
page read and write
83F000
heap
page read and write
516E000
stack
page read and write
72A4000
heap
page read and write
9F5000
heap
page read and write
44A2000
trusted library allocation
page read and write
A60000
heap
page read and write
7286000
heap
page read and write
6C10000
heap
page read and write
39A1000
trusted library allocation
page read and write
2FBE000
stack
page read and write
74B0000
trusted library allocation
page read and write
14D0000
trusted library allocation
page execute and read and write
847000
heap
page read and write
ABE000
stack
page read and write
3028000
trusted library allocation
page read and write
D88000
heap
page read and write
356B000
trusted library allocation
page read and write
41BB000
trusted library allocation
page read and write
14A5000
heap
page read and write
C7A000
trusted library allocation
page execute and read and write
7D60000
trusted library allocation
page read and write
5C80000
heap
page read and write
4EF0000
trusted library allocation
page read and write
357D000
trusted library allocation
page read and write
E73000
trusted library allocation
page execute and read and write
2FF1000
trusted library allocation
page read and write
418B000
trusted library allocation
page read and write
C6D000
trusted library allocation
page execute and read and write
79F0000
heap
page read and write
59EE000
stack
page read and write
418F000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
7240000
heap
page read and write
35B0000
heap
page read and write
1686000
trusted library allocation
page execute and read and write
5A50000
trusted library allocation
page read and write
3FF1000
trusted library allocation
page read and write
310A000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
172C000
stack
page read and write
604E000
stack
page read and write
714C000
trusted library allocation
page read and write
36B9000
trusted library allocation
page read and write
35E2000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
7A60000
trusted library allocation
page execute and read and write
7F960000
trusted library allocation
page execute and read and write
4194000
trusted library allocation
page read and write
7DB0000
trusted library allocation
page read and write
25C4000
trusted library allocation
page read and write
7F590000
trusted library allocation
page execute and read and write
5A4B000
trusted library allocation
page read and write
6A8F000
heap
page read and write
167E000
stack
page read and write
2590000
trusted library allocation
page execute and read and write
FE0000
trusted library allocation
page read and write
581E000
stack
page read and write
7DE0000
heap
page read and write
372A000
trusted library allocation
page read and write
41EC000
trusted library allocation
page read and write
1526000
heap
page read and write
842E000
heap
page read and write
2913000
trusted library allocation
page read and write
5D8A000
trusted library allocation
page read and write
5A6E000
trusted library allocation
page read and write
446E000
trusted library allocation
page read and write
7B20000
trusted library allocation
page execute and read and write
4C15000
trusted library allocation
page read and write
8F6C000
stack
page read and write
377B000
trusted library allocation
page read and write
41DF000
trusted library allocation
page read and write
379B000
trusted library allocation
page read and write
7442000
trusted library allocation
page read and write
531D000
stack
page read and write
5A40000
trusted library allocation
page read and write
356F000
trusted library allocation
page read and write
3295000
trusted library allocation
page read and write
348B000
trusted library allocation
page read and write
C76000
trusted library allocation
page execute and read and write
69AE000
stack
page read and write
4FA0000
trusted library allocation
page execute and read and write
5931000
trusted library allocation
page read and write
FBF000
stack
page read and write
8BCE000
stack
page read and write
6950000
heap
page read and write
341A000
trusted library allocation
page read and write
5BAA000
trusted library allocation
page read and write
6B02000
trusted library allocation
page read and write
7154000
trusted library allocation
page read and write
1358000
heap
page read and write
894D000
stack
page read and write
14E0000
trusted library allocation
page read and write
57B0000
heap
page execute and read and write
7166000
trusted library allocation
page read and write
5B00000
trusted library allocation
page execute and read and write
3291000
trusted library allocation
page read and write
844E000
heap
page read and write
5950000
trusted library allocation
page read and write
55F4000
trusted library allocation
page read and write
C30000
heap
page read and write
55C1000
trusted library allocation
page read and write
4CB2000
trusted library allocation
page read and write
24C2000
trusted library allocation
page read and write
3000000
trusted library allocation
page execute and read and write
6A17000
heap
page read and write
5610000
heap
page execute and read and write
1947000
heap
page read and write
14C0000
heap
page read and write
556E000
stack
page read and write
7B30000
trusted library allocation
page read and write
359C000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
4BF4000
trusted library allocation
page read and write
41C1000
trusted library allocation
page read and write
90E0000
trusted library allocation
page execute and read and write
6C4F000
trusted library allocation
page read and write
7B85000
trusted library allocation
page read and write
24B6000
trusted library allocation
page execute and read and write
7150000
heap
page read and write
7C9B000
stack
page read and write
144B000
trusted library allocation
page execute and read and write
3733000
trusted library allocation
page read and write
5A56000
trusted library allocation
page read and write
7264000
heap
page read and write
5C2000
unkown
page readonly
847D000
heap
page read and write
82E000
heap
page read and write
379C000
trusted library allocation
page read and write
7A70000
trusted library allocation
page read and write
69B0000
trusted library allocation
page execute and read and write
5A80000
trusted library allocation
page read and write
8460000
heap
page read and write
5AD000
stack
page read and write
59C0000
trusted library allocation
page read and write
35E0000
trusted library allocation
page read and write
3837000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
7E20000
trusted library allocation
page execute and read and write
31D0000
heap
page read and write
7B40000
trusted library allocation
page execute and read and write
13B6000
heap
page read and write
6ABF000
stack
page read and write
504D000
heap
page read and write
1690000
trusted library allocation
page read and write
4394000
trusted library allocation
page read and write
34F3000
trusted library allocation
page read and write
4C90000
heap
page read and write
703E000
stack
page read and write
2ACD000
trusted library allocation
page read and write
There are 785 hidden memdumps, click here to show them.