IOC Report
tfF3UBTdr8.exe

loading gif

Files

File Path
Type
Category
Malicious
tfF3UBTdr8.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tfF3UBTdr8.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp8652.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\WltfeVzR.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\WltfeVzR.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\WltfeVzR.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1aeapb0a.a5q.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3sobvf4z.tqi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cvq4hca0.xg0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_enyuk2dz.u5d.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i33hyvbn.can.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nlsevo1o.ogg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_peger2w2.fer.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y1qsnw13.na0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp100C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp102C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp102D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp19D7.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp2052.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp35F9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp360A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp361A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp363B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp363C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp365C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp365D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp366E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp366F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp472C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp472D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp474E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp475E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp478E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp478F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp5338.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5339.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp534A.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp534B.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp534C.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp6D9D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6D9E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6DAE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp6DBF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp6DCF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp6DE0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp6DF1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp6DF2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp6E02.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp7E21.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp7E32.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp7E42.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7E53.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7E54.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7E64.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7E65.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7EFF.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp7F0F.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp7F10.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp7F11.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp7F12.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp7F23.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8CCB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8CDC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8CED.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8CEE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpA4D3.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpA541.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpAD91.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmpB48A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpB49A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpB4AB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpB4BC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpB4CC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpB4DD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpB4EE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpC583.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpC584.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpC5A4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC5B5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC5D5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD7FD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD80E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD83E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD84E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD86F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD870.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpDB94.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpDBA5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpDBB5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpDBC6.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpDBD7.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEA95.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpEAA6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpEAB6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpEAC7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpEAD7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpEAE8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpEAF9.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFE0D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFE1D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFE2E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFE4E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFEC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
There are 94 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\tfF3UBTdr8.exe
"C:\Users\user\Desktop\tfF3UBTdr8.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\tfF3UBTdr8.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\WltfeVzR.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WltfeVzR" /XML "C:\Users\user\AppData\Local\Temp\tmp8652.tmp"
malicious
C:\Users\user\Desktop\tfF3UBTdr8.exe
"C:\Users\user\Desktop\tfF3UBTdr8.exe"
malicious
C:\Users\user\AppData\Roaming\WltfeVzR.exe
C:\Users\user\AppData\Roaming\WltfeVzR.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WltfeVzR" /XML "C:\Users\user\AppData\Local\Temp\tmpAD91.tmp"
malicious
C:\Users\user\AppData\Roaming\WltfeVzR.exe
"C:\Users\user\AppData\Roaming\WltfeVzR.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://ipinfo.io/ip%appdata%
unknown
malicious
http://185.222.57.91:55615/
185.222.57.91
malicious
185.222.57.91:55615
malicious
https://api.ipify.orgcookies//settinString.Removeg
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://185.222.57.91:55615
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
http://ns.adobe.0/xmp
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.222.57.91:55615t-sq
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.222.57.91
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tfF3UBTdr8_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tfF3UBTdr8_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tfF3UBTdr8_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tfF3UBTdr8_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tfF3UBTdr8_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tfF3UBTdr8_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tfF3UBTdr8_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tfF3UBTdr8_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tfF3UBTdr8_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tfF3UBTdr8_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tfF3UBTdr8_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tfF3UBTdr8_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tfF3UBTdr8_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\tfF3UBTdr8_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WltfeVzR_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WltfeVzR_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WltfeVzR_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WltfeVzR_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WltfeVzR_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WltfeVzR_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WltfeVzR_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WltfeVzR_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WltfeVzR_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WltfeVzR_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WltfeVzR_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WltfeVzR_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WltfeVzR_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WltfeVzR_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
4210000
trusted library allocation
page read and write
malicious
4141000
trusted library allocation
page read and write
malicious
5270000
trusted library allocation
page read and write
1340000
heap
page read and write
86EF000
stack
page read and write
4411000
trusted library allocation
page read and write
5C50000
trusted library section
page read and write
5B40000
trusted library allocation
page execute and read and write
178D000
trusted library allocation
page execute and read and write
82CE000
stack
page read and write
1694000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
1800000
trusted library allocation
page read and write
55C0000
trusted library allocation
page execute and read and write
355E000
trusted library allocation
page read and write
659E000
stack
page read and write
5520000
heap
page read and write
1918000
heap
page read and write
6C5A000
trusted library allocation
page read and write
1693000
trusted library allocation
page execute and read and write
585D000
stack
page read and write
732E000
stack
page read and write
7960000
trusted library allocation
page execute and read and write
6B20000
trusted library allocation
page execute and read and write
54F2000
trusted library allocation
page read and write
3F6F000
trusted library allocation
page read and write
3D2E000
trusted library allocation
page read and write
6F2D000
trusted library allocation
page read and write
D9A000
stack
page read and write
4043000
trusted library allocation
page read and write
45A0000
trusted library allocation
page read and write
5D8B000
trusted library allocation
page read and write
45AC000
trusted library allocation
page read and write
7B70000
trusted library allocation
page execute and read and write
169D000
trusted library allocation
page execute and read and write
150B000
trusted library allocation
page execute and read and write
14E3000
trusted library allocation
page read and write
6A02000
heap
page read and write
6F04000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
2ECF000
trusted library allocation
page read and write
54DF000
stack
page read and write
9CB000
stack
page read and write
1360000
heap
page read and write
6C48000
trusted library allocation
page read and write
402C000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
5C6D000
stack
page read and write
59E0000
heap
page read and write
5523000
heap
page read and write
2F14000
trusted library allocation
page read and write
14D0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
A153000
heap
page read and write
8700000
trusted library allocation
page execute and read and write
1224000
trusted library allocation
page read and write
14B4000
heap
page read and write
A5FD000
stack
page read and write
7F270000
trusted library allocation
page execute and read and write
42AC000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
6F1E000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
563A000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
712B000
stack
page read and write
7B50000
trusted library allocation
page read and write
5B10000
trusted library allocation
page execute and read and write
1290000
heap
page read and write
1270000
trusted library allocation
page read and write
6A60000
heap
page read and write
67C0000
trusted library allocation
page execute and read and write
16BA000
trusted library allocation
page execute and read and write
54E6000
trusted library allocation
page read and write
1595000
heap
page read and write
1507000
trusted library allocation
page execute and read and write
56B0000
heap
page read and write
14D3000
trusted library allocation
page execute and read and write
2FE4000
trusted library allocation
page read and write
7DD5000
heap
page read and write
14FA000
trusted library allocation
page execute and read and write
5C30000
trusted library allocation
page read and write
6DAF000
trusted library allocation
page read and write
146E000
stack
page read and write
40E3000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
601E000
stack
page read and write
580E000
trusted library allocation
page read and write
9C8D000
stack
page read and write
1502000
heap
page read and write
3214000
trusted library allocation
page read and write
5670000
heap
page read and write
1730000
heap
page read and write
684E000
stack
page read and write
7800000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
5A90000
trusted library allocation
page execute and read and write
748E000
stack
page read and write
31FC000
stack
page read and write
1230000
trusted library allocation
page read and write
605E000
stack
page read and write
6550000
trusted library allocation
page execute and read and write
2DCE000
stack
page read and write
5B20000
trusted library allocation
page read and write
526A000
trusted library allocation
page read and write
6C75000
trusted library allocation
page read and write
7FD0000
trusted library allocation
page read and write
14C1000
heap
page read and write
517D000
stack
page read and write
5C00000
trusted library allocation
page read and write
372F000
trusted library allocation
page read and write
6F35000
trusted library allocation
page read and write
32FF000
stack
page read and write
6D46000
heap
page read and write
2E3B000
trusted library allocation
page read and write
69BE000
stack
page read and write
A4FE000
stack
page read and write
12BE000
stack
page read and write
7DFB000
heap
page read and write
12C0000
trusted library allocation
page read and write
A3CD000
stack
page read and write
5500000
trusted library allocation
page read and write
3111000
trusted library allocation
page read and write
330A000
trusted library allocation
page read and write
125B000
trusted library allocation
page execute and read and write
3074000
trusted library allocation
page read and write
6F18000
trusted library allocation
page read and write
557D000
trusted library allocation
page read and write
5650000
heap
page read and write
67D0000
trusted library allocation
page read and write
AF4F000
stack
page read and write
6F14000
trusted library allocation
page read and write
78EE000
stack
page read and write
2DB2000
trusted library allocation
page read and write
1690000
trusted library allocation
page read and write
3322000
trusted library allocation
page read and write
5A8B000
trusted library allocation
page read and write
32B0000
heap
page read and write
17C0000
trusted library allocation
page read and write
1520000
heap
page read and write
2B60000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
5894000
heap
page read and write
301B000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
8FCE000
stack
page read and write
5BE0000
trusted library allocation
page execute and read and write
54F6000
trusted library allocation
page read and write
6D3E000
heap
page read and write
5C2D000
stack
page read and write
41F9000
trusted library allocation
page read and write
6AB6000
heap
page read and write
177D000
trusted library allocation
page execute and read and write
77B0000
trusted library allocation
page read and write
649A000
heap
page read and write
64CB000
heap
page read and write
555B000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
5910000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6A97000
heap
page read and write
5502000
trusted library allocation
page read and write
6CCF000
stack
page read and write
6A81000
heap
page read and write
5BC0000
trusted library allocation
page read and write
2FE0000
heap
page read and write
343F000
trusted library allocation
page read and write
2B4C000
stack
page read and write
4119000
trusted library allocation
page read and write
121F000
stack
page read and write
30E0000
trusted library allocation
page read and write
744E000
stack
page read and write
A14D000
stack
page read and write
6B1E000
stack
page read and write
9C4E000
stack
page read and write
2E68000
trusted library allocation
page read and write
7DD9000
heap
page read and write
FE8000
heap
page read and write
17AB000
trusted library allocation
page execute and read and write
4049000
trusted library allocation
page read and write
2DE0000
heap
page read and write
7200000
trusted library allocation
page execute and read and write
5670000
heap
page read and write
6DA6000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
7EFB0000
trusted library allocation
page execute and read and write
136B000
heap
page read and write
2DD0000
trusted library allocation
page read and write
7790000
trusted library allocation
page execute and read and write
774E000
stack
page read and write
6A43000
heap
page read and write
64E8000
heap
page read and write
12ED000
heap
page read and write
1820000
heap
page read and write
5560000
trusted library allocation
page read and write
2F90000
heap
page read and write
E90000
heap
page read and write
6520000
trusted library allocation
page read and write
A18B000
heap
page read and write
5610000
trusted library allocation
page read and write
14F8000
heap
page read and write
2E8F000
trusted library allocation
page read and write
A97E000
stack
page read and write
5AA2000
trusted library allocation
page read and write
1252000
trusted library allocation
page read and write
12CE000
stack
page read and write
6C64000
trusted library allocation
page read and write
1910000
heap
page read and write
A3FF000
stack
page read and write
5860000
heap
page read and write
7400000
trusted library allocation
page read and write
12F8000
stack
page read and write
A97E000
stack
page read and write
43C0000
trusted library allocation
page read and write
87E000
unkown
page read and write
6C2F000
stack
page read and write
3340000
heap
page read and write
7190000
trusted library allocation
page read and write
2EED000
stack
page read and write
42A2000
trusted library allocation
page read and write
6A5F000
heap
page read and write
6A6B000
heap
page read and write
7105000
heap
page read and write
34B1000
trusted library allocation
page read and write
651B000
heap
page read and write
6DA4000
trusted library allocation
page read and write
6C5F000
trusted library allocation
page read and write
5BF0000
trusted library allocation
page execute and read and write
4589000
trusted library allocation
page read and write
6C4F000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
1250000
heap
page read and write
7220000
heap
page read and write
1870000
trusted library allocation
page read and write
31BE000
stack
page read and write
1280000
heap
page read and write
111E000
stack
page read and write
16C2000
trusted library allocation
page read and write
507B000
stack
page read and write
5A00000
heap
page read and write
E8E000
stack
page read and write
1284000
heap
page read and write
5C10000
trusted library allocation
page execute and read and write
73BE000
stack
page read and write
78FF000
stack
page read and write
73AE000
stack
page read and write
580B000
trusted library allocation
page read and write
6480000
heap
page read and write
33A5000
trusted library allocation
page read and write
4417000
trusted library allocation
page read and write
3280000
heap
page read and write
6F32000
trusted library allocation
page read and write
459D000
trusted library allocation
page read and write
32E0000
trusted library allocation
page read and write
7090000
heap
page read and write
1773000
trusted library allocation
page execute and read and write
7BAE000
stack
page read and write
6CFE000
heap
page read and write
3D52000
trusted library allocation
page read and write
29F0000
heap
page read and write
6C55000
trusted library allocation
page read and write
1246000
trusted library allocation
page execute and read and write
43BB000
trusted library allocation
page read and write
16AD000
trusted library allocation
page execute and read and write
123E000
stack
page read and write
5290000
heap
page execute and read and write
A713000
heap
page read and write
AE4D000
stack
page read and write
2C4A000
heap
page read and write
7DD1000
heap
page read and write
563D000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
4025000
trusted library allocation
page read and write
66DF000
trusted library allocation
page read and write
64D3000
heap
page read and write
6C30000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
A83E000
stack
page read and write
6F00000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
59EE000
heap
page read and write
6DB8000
trusted library allocation
page read and write
34BA000
trusted library allocation
page read and write
1536000
heap
page read and write
5620000
trusted library allocation
page read and write
2F72000
trusted library allocation
page read and write
2DA2000
trusted library allocation
page read and write
AA7E000
stack
page read and write
14CE000
stack
page read and write
17A5000
trusted library allocation
page execute and read and write
45A6000
trusted library allocation
page read and write
175F000
stack
page read and write
339D000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
D02000
unkown
page readonly
7820000
heap
page read and write
5660000
trusted library section
page readonly
45B4000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
E40000
heap
page read and write
73F0000
heap
page read and write
3024000
trusted library allocation
page read and write
45D1000
trusted library allocation
page read and write
2D8F000
trusted library allocation
page read and write
11F0000
heap
page read and write
126F000
heap
page read and write
55A5000
trusted library allocation
page read and write
34EC000
trusted library allocation
page read and write
2D9A000
trusted library allocation
page read and write
6DA2000
trusted library allocation
page read and write
2C40000
heap
page read and write
419F000
trusted library allocation
page read and write
AE0C000
stack
page read and write
6F70000
trusted library allocation
page read and write
2E00000
trusted library allocation
page execute and read and write
6C8E000
stack
page read and write
4111000
trusted library allocation
page read and write
770E000
stack
page read and write
6D4C000
heap
page read and write
4035000
trusted library allocation
page read and write
57FF000
stack
page read and write
7BA0000
heap
page read and write
D00000
unkown
page readonly
6516000
heap
page read and write
3260000
trusted library allocation
page read and write
7CA000
stack
page read and write
5511000
trusted library allocation
page read and write
30CB000
stack
page read and write
69C4000
heap
page read and write
54E0000
trusted library allocation
page read and write
14ED000
trusted library allocation
page execute and read and write
71A0000
trusted library allocation
page read and write
6488000
heap
page read and write
650E000
heap
page read and write
6DC6000
trusted library allocation
page read and write
597E000
stack
page read and write
43C4000
trusted library allocation
page read and write
AABE000
stack
page read and write
6C39000
trusted library allocation
page read and write
6DC1000
trusted library allocation
page read and write
6AB1000
heap
page read and write
3200000
heap
page read and write
1500000
trusted library allocation
page read and write
323F000
unkown
page read and write
2F37000
trusted library allocation
page read and write
6CEE000
stack
page read and write
54EB000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
7E0C000
heap
page read and write
29CF000
unkown
page read and write
1015000
heap
page read and write
7130000
trusted library allocation
page read and write
64D9000
heap
page read and write
73E0000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
D30000
heap
page read and write
16E0000
trusted library allocation
page read and write
1470000
heap
page read and write
2B70000
trusted library allocation
page read and write
125E000
heap
page read and write
2D7F000
stack
page read and write
6CD0000
heap
page read and write
75FE000
stack
page read and write
17A0000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
A38E000
stack
page read and write
3291000
trusted library allocation
page read and write
14D4000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
3312000
trusted library allocation
page read and write
2FA9000
trusted library allocation
page read and write
31A3000
trusted library allocation
page read and write
A700000
heap
page read and write
1292000
heap
page read and write
5A80000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
16C7000
trusted library allocation
page execute and read and write
E10000
heap
page read and write
43B1000
trusted library allocation
page read and write
43D3000
trusted library allocation
page read and write
32AE000
stack
page read and write
64ED000
heap
page read and write
9E4F000
stack
page read and write
6AC2000
trusted library allocation
page read and write
1792000
trusted library allocation
page read and write
6F21000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
1255000
trusted library allocation
page execute and read and write
768A000
trusted library allocation
page read and write
A600000
heap
page read and write
64DD000
heap
page read and write
6860000
trusted library allocation
page read and write
2BFE000
stack
page read and write
172E000
stack
page read and write
6F40000
trusted library allocation
page read and write
3341000
trusted library allocation
page read and write
54F1000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
1737000
heap
page read and write
A5FB000
stack
page read and write
1137000
stack
page read and write
69C0000
heap
page read and write
5A10000
heap
page read and write
5550000
trusted library allocation
page read and write
2E52000
trusted library allocation
page read and write
5900000
heap
page read and write
7210000
trusted library allocation
page execute and read and write
6540000
trusted library allocation
page read and write
7DF6000
heap
page read and write
5A40000
heap
page read and write
AD0B000
stack
page read and write
1009000
heap
page read and write
1796000
trusted library allocation
page execute and read and write
A150000
heap
page read and write
384B000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
3409000
trusted library allocation
page read and write
A28E000
stack
page read and write
17F0000
trusted library allocation
page read and write
7C10000
trusted library allocation
page execute and read and write
15FC000
heap
page read and write
71FE000
stack
page read and write
14F0000
trusted library allocation
page read and write
6870000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
17A2000
trusted library allocation
page read and write
3523000
trusted library allocation
page read and write
45AE000
trusted library allocation
page read and write
2D10000
heap
page execute and read and write
5BD0000
trusted library allocation
page read and write
A70B000
heap
page read and write
6D46000
trusted library allocation
page read and write
2E5E000
stack
page read and write
5A91000
trusted library allocation
page read and write
429E000
trusted library allocation
page read and write
75C0000
trusted library allocation
page execute and read and write
5655000
heap
page read and write
66E0000
trusted library allocation
page read and write
56B3000
heap
page read and write
6DAC000
trusted library allocation
page read and write
440A000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
1242000
trusted library allocation
page read and write
157E000
heap
page read and write
12C8000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page execute and read and write
676E000
stack
page read and write
5AE0000
trusted library allocation
page read and write
4038000
trusted library allocation
page read and write
2BBE000
stack
page read and write
14F2000
trusted library allocation
page read and write
6ABC000
heap
page read and write
2FB2000
trusted library allocation
page read and write
78D000
stack
page read and write
7E11000
heap
page read and write
7680000
trusted library allocation
page read and write
2FDE000
unkown
page read and write
33CB000
trusted library allocation
page read and write
77A0000
trusted library allocation
page read and write
17E0000
heap
page execute and read and write
7E17000
heap
page read and write
4103000
trusted library allocation
page read and write
54DE000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
14E0000
trusted library allocation
page read and write
1878000
trusted library allocation
page read and write
6AC0000
trusted library allocation
page read and write
43B7000
trusted library allocation
page read and write
2DAE000
trusted library allocation
page read and write
2FE0000
heap
page read and write
12E0000
heap
page read and write
5800000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
3D32000
trusted library allocation
page read and write
186E000
stack
page read and write
56F0000
trusted library allocation
page execute and read and write
6AD0000
trusted library allocation
page execute and read and write
756B000
stack
page read and write
5B30000
trusted library allocation
page read and write
5ADE000
stack
page read and write
A6FC000
stack
page read and write
4061000
trusted library allocation
page read and write
7DB8000
heap
page read and write
2DA0000
trusted library allocation
page read and write
3594000
trusted library allocation
page read and write
6D23000
heap
page read and write
5BD0000
heap
page read and write
5590000
trusted library allocation
page read and write
16B6000
trusted library allocation
page execute and read and write
2C00000
heap
page read and write
5640000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
E45000
heap
page read and write
43AA000
trusted library allocation
page read and write
7C00000
heap
page read and write
798A000
heap
page read and write
6D33000
heap
page read and write
5590000
trusted library allocation
page execute and read and write
7C90000
heap
page read and write
6C70000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
6512000
heap
page read and write
90CF000
stack
page read and write
12F0000
heap
page read and write
7970000
heap
page read and write
6AA4000
heap
page read and write
760D000
stack
page read and write
1250000
trusted library allocation
page read and write
14F6000
trusted library allocation
page execute and read and write
125A000
heap
page read and write
520D000
stack
page read and write
86F0000
heap
page read and write
4041000
trusted library allocation
page read and write
7BA5000
heap
page read and write
45C1000
trusted library allocation
page read and write
1349000
heap
page read and write
6DC8000
trusted library allocation
page read and write
17A7000
trusted library allocation
page execute and read and write
7F6F0000
trusted library allocation
page execute and read and write
5AB1000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
5870000
heap
page execute and read and write
29D0000
heap
page read and write
5560000
heap
page execute and read and write
5870000
heap
page read and write
150E000
heap
page read and write
ABBE000
stack
page read and write
538D000
stack
page read and write
757E000
stack
page read and write
2E5B000
trusted library allocation
page read and write
687A000
trusted library allocation
page read and write
46B1000
trusted library allocation
page read and write
5A96000
trusted library allocation
page read and write
9F4E000
stack
page read and write
11E0000
heap
page read and write
3D21000
trusted library allocation
page read and write
1039000
stack
page read and write
2F20000
trusted library allocation
page read and write
A73D000
stack
page read and write
16A3000
trusted library allocation
page read and write
55C0000
trusted library section
page readonly
7DF2000
heap
page read and write
A04E000
stack
page read and write
2D0E000
stack
page read and write
1100000
heap
page read and write
6420000
heap
page read and write
5BBA000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
148E000
heap
page read and write
77FF000
stack
page read and write
586E000
stack
page read and write
157D000
heap
page read and write
1502000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
580E000
stack
page read and write
438E000
trusted library allocation
page read and write
A192000
heap
page read and write
29E0000
heap
page read and write
33D5000
trusted library allocation
page read and write
1770000
trusted library allocation
page read and write
7DE4000
heap
page read and write
1320000
heap
page read and write
55B0000
trusted library allocation
page read and write
5A80000
heap
page read and write
6D1A000
heap
page read and write
1814000
trusted library allocation
page read and write
66E4000
trusted library allocation
page read and write
67DE000
trusted library allocation
page read and write
43CF000
trusted library allocation
page read and write
6DBE000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
401F000
trusted library allocation
page read and write
539E000
stack
page read and write
6F06000
trusted library allocation
page read and write
6CE7000
heap
page read and write
6DCD000
trusted library allocation
page read and write
2E10000
heap
page read and write
7B90000
heap
page read and write
1810000
trusted library allocation
page read and write
67AE000
stack
page read and write
58F0000
heap
page read and write
1780000
trusted library allocation
page read and write
2FF8000
trusted library allocation
page read and write
5BE0000
trusted library allocation
page read and write
641E000
stack
page read and write
5D7E000
stack
page read and write
3271000
trusted library allocation
page read and write
2D21000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page read and write
2F29000
stack
page read and write
65A0000
trusted library allocation
page execute and read and write
FD0000
trusted library allocation
page read and write
642C000
heap
page read and write
556E000
trusted library allocation
page read and write
1385000
heap
page read and write
6D58000
heap
page read and write
14C5000
heap
page read and write
6ED9000
trusted library allocation
page read and write
35CB000
trusted library allocation
page read and write
132B000
heap
page read and write
2FDE000
stack
page read and write
66F5000
trusted library allocation
page read and write
5680000
heap
page read and write
43C9000
trusted library allocation
page read and write
1568000
heap
page read and write
1760000
trusted library allocation
page read and write
6D90000
trusted library allocation
page execute and read and write
6C35000
trusted library allocation
page read and write
347A000
trusted library allocation
page read and write
4590000
trusted library allocation
page read and write
7B2E000
stack
page read and write
2E31000
trusted library allocation
page read and write
5554000
trusted library allocation
page read and write
7B40000
trusted library allocation
page execute and read and write
76C0000
trusted library allocation
page execute and read and write
6D70000
trusted library allocation
page read and write
181A000
trusted library allocation
page read and write
77F0000
trusted library allocation
page execute and read and write
4291000
trusted library allocation
page read and write
7922000
trusted library allocation
page read and write
1325000
heap
page read and write
67BE000
stack
page read and write
2EC6000
trusted library allocation
page read and write
6DB4000
trusted library allocation
page read and write
6A9B000
heap
page read and write
A87E000
stack
page read and write
3449000
trusted library allocation
page read and write
621E000
stack
page read and write
7850000
heap
page read and write
FE0000
heap
page read and write
FFE000
stack
page read and write
5BBD000
trusted library allocation
page read and write
6D2E000
stack
page read and write
709E000
heap
page read and write
56ED000
stack
page read and write
A93F000
stack
page read and write
7DBC000
heap
page read and write
6700000
trusted library allocation
page read and write
1223000
trusted library allocation
page execute and read and write
41D3000
trusted library allocation
page read and write
6F26000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
7E37000
heap
page read and write
FBF000
stack
page read and write
6F28000
trusted library allocation
page read and write
5D8E000
trusted library allocation
page read and write
4252000
trusted library allocation
page read and write
5BA0000
trusted library allocation
page read and write
76FE000
stack
page read and write
3310000
trusted library allocation
page read and write
142F000
stack
page read and write
5A7E000
stack
page read and write
F4B000
stack
page read and write
45A9000
trusted library allocation
page read and write
325E000
stack
page read and write
7B30000
heap
page read and write
10F7000
stack
page read and write
54C4000
trusted library allocation
page read and write
47B1000
trusted library allocation
page read and write
58F5000
heap
page read and write
1643000
heap
page read and write
144F000
stack
page read and write
402F000
trusted library allocation
page read and write
3398000
trusted library allocation
page read and write
57CF000
stack
page read and write
6A50000
heap
page read and write
CF7000
stack
page read and write
4128000
trusted library allocation
page read and write
66AE000
stack
page read and write
5521000
trusted library allocation
page read and write
16C0000
trusted library allocation
page read and write
A83E000
stack
page read and write
85EE000
stack
page read and write
830000
heap
page read and write
55BB000
stack
page read and write
5AC0000
trusted library allocation
page read and write
123D000
trusted library allocation
page execute and read and write
4E1D000
stack
page read and write
74E0000
trusted library allocation
page read and write
11E5000
heap
page read and write
7B60000
trusted library allocation
page execute and read and write
2F16000
trusted library allocation
page read and write
6D74000
trusted library allocation
page read and write
6DD2000
trusted library allocation
page read and write
2C3E000
stack
page read and write
5660000
trusted library allocation
page execute and read and write
122D000
trusted library allocation
page execute and read and write
7BFE000
stack
page read and write
54ED000
trusted library allocation
page read and write
53DE000
stack
page read and write
6462000
heap
page read and write
31AD000
trusted library allocation
page read and write
1790000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
6A2B000
heap
page read and write
55D0000
heap
page execute and read and write
2EF8000
trusted library allocation
page read and write
66B2000
trusted library allocation
page read and write
1560000
heap
page read and write
5A50000
trusted library allocation
page read and write
525E000
stack
page read and write
5540000
trusted library allocation
page read and write
1366000
heap
page read and write
16CB000
trusted library allocation
page execute and read and write
72BE000
stack
page read and write
5571000
trusted library allocation
page read and write
403D000
trusted library allocation
page read and write
EB0000
heap
page read and write
1257000
trusted library allocation
page execute and read and write
17D0000
trusted library allocation
page execute and read and write
71B0000
heap
page read and write
6A93000
heap
page read and write
352C000
trusted library allocation
page read and write
107F000
heap
page read and write
2B50000
trusted library allocation
page execute and read and write
4152000
trusted library allocation
page read and write
191E000
heap
page read and write
3350000
heap
page read and write
14DD000
trusted library allocation
page execute and read and write
6C72000
trusted library allocation
page read and write
64E5000
heap
page read and write
74D0000
trusted library allocation
page read and write
16B2000
trusted library allocation
page read and write
6C32000
trusted library allocation
page read and write
133E000
stack
page read and write
359E000
trusted library allocation
page read and write
30D0000
trusted library allocation
page execute and read and write
5264000
trusted library allocation
page read and write
73B1000
trusted library allocation
page read and write
7FD40000
trusted library allocation
page execute and read and write
331E000
trusted library allocation
page read and write
3D8E000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
6F0C000
trusted library allocation
page read and write
403B000
trusted library allocation
page read and write
4483000
trusted library allocation
page read and write
A4CE000
stack
page read and write
2F10000
trusted library allocation
page read and write
11A0000
heap
page read and write
3041000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
54E1000
trusted library allocation
page read and write
2E39000
trusted library allocation
page read and write
3300000
trusted library allocation
page read and write
5A60000
trusted library allocation
page execute and read and write
1220000
trusted library allocation
page read and write
5505000
trusted library allocation
page read and write
564C000
stack
page read and write
1527000
heap
page read and write
631E000
stack
page read and write
74F0000
trusted library allocation
page read and write
43C6000
trusted library allocation
page read and write
6C4E000
stack
page read and write
5510000
trusted library allocation
page read and write
7AAE000
stack
page read and write
56AD000
stack
page read and write
5AAE000
trusted library allocation
page read and write
167F000
stack
page read and write
6CDB000
heap
page read and write
5AD1000
trusted library allocation
page read and write
7182000
trusted library allocation
page read and write
68BF000
stack
page read and write
FB0000
heap
page read and write
4048000
trusted library allocation
page read and write
6C4A000
trusted library allocation
page read and write
155E000
stack
page read and write
FF4000
heap
page read and write
303F000
stack
page read and write
5C70000
trusted library allocation
page execute and read and write
6800000
heap
page read and write
55A0000
trusted library allocation
page read and write
2F30000
heap
page execute and read and write
1380000
heap
page read and write
5AD0000
trusted library allocation
page read and write
746E000
stack
page read and write
74AE000
stack
page read and write
5582000
trusted library allocation
page read and write
5A9E000
stack
page read and write
1680000
trusted library allocation
page read and write
6F0F000
trusted library allocation
page read and write
7986000
heap
page read and write
7630000
trusted library section
page read and write
7DFE000
stack
page read and write
55B0000
trusted library allocation
page read and write
335B000
heap
page read and write
64BD000
heap
page read and write
16B0000
trusted library allocation
page read and write
4596000
trusted library allocation
page read and write
550E000
trusted library allocation
page read and write
6A29000
heap
page read and write
3D4A000
trusted library allocation
page read and write
6542000
trusted library allocation
page read and write
7DB0000
heap
page read and write
584E000
stack
page read and write
776E000
stack
page read and write
4405000
trusted library allocation
page read and write
1774000
trusted library allocation
page read and write
3100000
heap
page execute and read and write
1480000
trusted library allocation
page read and write
1480000
heap
page read and write
5650000
trusted library allocation
page read and write
6DD5000
trusted library allocation
page read and write
76B0000
trusted library allocation
page execute and read and write
There are 798 hidden memdumps, click here to show them.