IOC Report
PzPxqbK89H.exe

loading gif

Files

File Path
Type
Category
Malicious
PzPxqbK89H.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PzPxqbK89H.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpBC1E.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\VzwumYUBCtHW.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1wrpdoub.nll.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a0bfyowc.0vf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_efrh4iw0.0ak.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ga2prn3k.olx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hs4kjisq.l1a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l4gdq5cb.qq5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n1pyr53f.cms.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wa5zpxgm.uly.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp314A.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp315B.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp315C.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp317C.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp318D.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp318E.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp319E.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp319F.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp31B0.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp31C1.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp31D1.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp45D0.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp45D1.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp45E2.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp45F3.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp4603.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp4604.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp4624.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4635.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4F27.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4F38.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4F39.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4F3A.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4F4A.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4F4B.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4F5C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp4F5D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp63A9.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp63AA.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp63AB.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp63AC.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp63AD.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp63AE.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp63FD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp68C1.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp8831.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8832.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8842.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8843.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8854.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp8855.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp8866.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp8876.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp8887.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp8888.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp8898.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp8899.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9CE1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp9D01.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp9D02.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp9D12.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp9D13.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp9D24.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9D35.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9D45.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9D56.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9D67.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9D77.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC100.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC111.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC121.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC132.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC162.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD5CE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD5CF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD5E0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD5F0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD5F1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD602.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD613.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD623.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD624.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpE0E.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpE0F.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpE10.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpE20.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpE31.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpE32.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpE43.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpE438.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmpE53.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpE64.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpF9A9.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpF9BA.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpF9BB.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpF9CB.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpF9CC.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpF9DD.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpF9DE.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
There are 94 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PzPxqbK89H.exe
"C:\Users\user\Desktop\PzPxqbK89H.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PzPxqbK89H.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VzwumYUBCtHW" /XML "C:\Users\user\AppData\Local\Temp\tmpBC1E.tmp"
malicious
C:\Users\user\Desktop\PzPxqbK89H.exe
"C:\Users\user\Desktop\PzPxqbK89H.exe"
malicious
C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe
C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VzwumYUBCtHW" /XML "C:\Users\user\AppData\Local\Temp\tmpE438.tmp"
malicious
C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe
"C:\Users\user\AppData\Roaming\VzwumYUBCtHW.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.orgcookies//settinString.Removeg
unknown
malicious
http://45.137.22.239:55615/
45.137.22.239
malicious
http://45.137.22.239:55615
unknown
malicious
https://ipinfo.io/ip%appdata%
unknown
malicious
45.137.22.239:55615
malicious
http://45.137.22.239:55615t-
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.fontbureau.com/designersG
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://www.fontbureau.com/designers?
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://api.ip.sb/geoip
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://www.tiro.com
unknown
http://tempuri.org/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://www.sajatypeworks.com
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
https://api.ip.sb
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://www.ecosia.org/newtab/
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://tempuri.org/Endpoint/SetEnviron
unknown
http://www.carterandcone.coml
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://45.137.22.239:5
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://www.fontbureau.com/designers8
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 55 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown
malicious

IPs

IP
Domain
Country
Malicious
45.137.22.239
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PzPxqbK89H_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PzPxqbK89H_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PzPxqbK89H_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PzPxqbK89H_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PzPxqbK89H_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PzPxqbK89H_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PzPxqbK89H_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PzPxqbK89H_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PzPxqbK89H_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PzPxqbK89H_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PzPxqbK89H_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PzPxqbK89H_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PzPxqbK89H_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PzPxqbK89H_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VzwumYUBCtHW_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VzwumYUBCtHW_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VzwumYUBCtHW_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VzwumYUBCtHW_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VzwumYUBCtHW_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VzwumYUBCtHW_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VzwumYUBCtHW_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VzwumYUBCtHW_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VzwumYUBCtHW_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VzwumYUBCtHW_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VzwumYUBCtHW_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VzwumYUBCtHW_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VzwumYUBCtHW_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VzwumYUBCtHW_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4429000
trusted library allocation
page read and write
malicious
358E000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
44FD000
trusted library allocation
page read and write
malicious
78F0000
trusted library allocation
page execute and read and write
9B0000
trusted library allocation
page read and write
6CE0000
heap
page read and write
661D000
heap
page read and write
4A50000
heap
page read and write
6A21000
heap
page read and write
5266000
trusted library allocation
page read and write
A50000
heap
page read and write
7090000
trusted library allocation
page read and write
551E000
stack
page read and write
48D4000
trusted library allocation
page read and write
7870000
trusted library allocation
page read and write
37A2000
trusted library allocation
page read and write
51EE000
stack
page read and write
FC8000
heap
page read and write
6840000
trusted library allocation
page read and write
7780000
trusted library allocation
page execute and read and write
70A0000
trusted library allocation
page execute and read and write
4E40000
heap
page read and write
6C26000
trusted library allocation
page read and write
5D20000
heap
page read and write
65B000
trusted library allocation
page execute and read and write
36E6000
trusted library allocation
page read and write
6190000
heap
page read and write
6C21000
trusted library allocation
page read and write
358B000
trusted library allocation
page read and write
187E000
stack
page read and write
62D000
trusted library allocation
page execute and read and write
247B000
stack
page read and write
303E000
unkown
page read and write
6C2D000
trusted library allocation
page read and write
32E0000
trusted library allocation
page read and write
7C30000
trusted library allocation
page execute and read and write
61D2000
heap
page read and write
62B5000
trusted library allocation
page read and write
7400000
heap
page read and write
B38E000
stack
page read and write
5880000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
73B0000
trusted library allocation
page execute and read and write
AAFD000
stack
page read and write
65C0000
trusted library allocation
page read and write
9D0C000
stack
page read and write
1A50000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
562B000
trusted library allocation
page read and write
1806000
trusted library allocation
page execute and read and write
92E000
stack
page read and write
5BED000
stack
page read and write
6D25000
trusted library allocation
page read and write
9620000
heap
page read and write
6C04000
trusted library allocation
page read and write
35ED000
trusted library allocation
page read and write
1A2D000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
6C18000
trusted library allocation
page read and write
6E03000
heap
page read and write
32C0000
trusted library allocation
page read and write
313F000
stack
page read and write
7370000
trusted library allocation
page read and write
5920000
trusted library section
page readonly
4FCE000
stack
page read and write
4D4D000
stack
page read and write
56A0000
trusted library allocation
page read and write
2480000
heap
page execute and read and write
7660000
trusted library allocation
page read and write
53E000
stack
page read and write
57A0000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
3240000
heap
page read and write
6410000
trusted library allocation
page read and write
2804000
trusted library allocation
page read and write
15D0000
heap
page read and write
4A53000
heap
page read and write
1612000
heap
page read and write
64FE000
trusted library allocation
page read and write
764B000
stack
page read and write
648D000
stack
page read and write
267A000
heap
page read and write
62AF000
trusted library allocation
page read and write
4BC0000
heap
page read and write
5C60000
trusted library allocation
page read and write
6299000
trusted library allocation
page read and write
9E4E000
stack
page read and write
660000
heap
page read and write
5940000
heap
page read and write
524F000
stack
page read and write
62BA000
trusted library allocation
page read and write
2710000
trusted library allocation
page read and write
3B44000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
7BB0000
trusted library section
page read and write
7AD4000
heap
page read and write
5864000
trusted library allocation
page read and write
6590000
heap
page read and write
646000
trusted library allocation
page execute and read and write
7660000
trusted library allocation
page execute and read and write
7900000
heap
page read and write
4BD0000
heap
page read and write
67C7000
heap
page read and write
6247000
heap
page read and write
5CE0000
heap
page read and write
5882000
trusted library allocation
page read and write
5C5E000
stack
page read and write
FA7000
trusted library allocation
page execute and read and write
7850000
trusted library allocation
page execute and read and write
4C00000
trusted library allocation
page read and write
3D32000
trusted library allocation
page read and write
33FE000
stack
page read and write
7650000
trusted library allocation
page execute and read and write
10E0000
heap
page read and write
2BA2000
trusted library allocation
page read and write
7690000
trusted library allocation
page execute and read and write
7AB0000
heap
page read and write
280A000
trusted library allocation
page read and write
2A0E000
stack
page read and write
4401000
trusted library allocation
page read and write
32B0000
trusted library allocation
page read and write
92DE000
stack
page read and write
5340000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
6228000
heap
page read and write
630000
trusted library allocation
page read and write
66A000
heap
page read and write
1605000
heap
page read and write
975E000
stack
page read and write
7F8F000
stack
page read and write
170000
heap
page read and write
BB0000
heap
page read and write
2BA0000
trusted library allocation
page execute and read and write
49A0000
trusted library allocation
page read and write
2820000
heap
page execute and read and write
5842000
trusted library allocation
page read and write
93DE000
stack
page read and write
E40000
heap
page read and write
5950000
trusted library allocation
page read and write
4BB0000
trusted library section
page readonly
1610000
heap
page read and write
6C14000
trusted library allocation
page read and write
7F9C0000
trusted library allocation
page execute and read and write
1A40000
trusted library allocation
page read and write
5DE000
stack
page read and write
10AB000
heap
page read and write
58C3000
heap
page read and write
5220000
heap
page read and write
6B9E000
stack
page read and write
6800000
trusted library allocation
page read and write
7ACD000
heap
page read and write
2D91000
trusted library allocation
page read and write
4ECE000
stack
page read and write
48F6000
trusted library allocation
page read and write
4D08000
trusted library allocation
page read and write
E0E000
stack
page read and write
2D50000
trusted library allocation
page read and write
2722000
trusted library allocation
page read and write
65B0000
trusted library allocation
page read and write
5631000
trusted library allocation
page read and write
6D60000
heap
page read and write
94DF000
stack
page read and write
5CC0000
heap
page read and write
4905000
trusted library allocation
page read and write
6EB000
stack
page read and write
551F000
stack
page read and write
6232000
heap
page read and write
9E8E000
stack
page read and write
2810000
trusted library allocation
page read and write
5410000
trusted library allocation
page execute and read and write
68BD000
stack
page read and write
9060000
heap
page read and write
4BB4000
trusted library section
page readonly
BD5000
heap
page read and write
98E000
stack
page read and write
3499000
trusted library allocation
page read and write
709A000
trusted library allocation
page read and write
23A8000
trusted library allocation
page read and write
3DE8000
trusted library allocation
page read and write
6C28000
trusted library allocation
page read and write
698E000
stack
page read and write
7750000
trusted library allocation
page read and write
6C06000
trusted library allocation
page read and write
F4E000
stack
page read and write
6A0000
heap
page read and write
5C90000
trusted library allocation
page read and write
67C0000
heap
page read and write
6CDF000
stack
page read and write
B10E000
stack
page read and write
26F4000
trusted library allocation
page read and write
6F9000
heap
page read and write
4E50000
heap
page read and write
552B000
trusted library allocation
page read and write
6809000
trusted library allocation
page read and write
69F0000
heap
page read and write
58C0000
heap
page read and write
633000
trusted library allocation
page read and write
527E000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
2E7D000
stack
page read and write
64E0000
trusted library allocation
page execute and read and write
59BE000
stack
page read and write
6C50000
trusted library allocation
page read and write
6295000
trusted library allocation
page read and write
B00E000
stack
page read and write
25CF000
trusted library allocation
page read and write
6661000
heap
page read and write
2D8D000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
3401000
trusted library allocation
page read and write
1400000
heap
page read and write
6DAE000
stack
page read and write
6E67000
heap
page read and write
951D000
stack
page read and write
9F0000
heap
page read and write
4E70000
trusted library allocation
page read and write
B80000
heap
page read and write
1817000
trusted library allocation
page execute and read and write
19F0000
trusted library allocation
page read and write
5850000
trusted library allocation
page execute and read and write
AC3E000
stack
page read and write
1802000
trusted library allocation
page read and write
640F000
stack
page read and write
B1B000
stack
page read and write
BD000
stack
page read and write
6651000
heap
page read and write
145E000
stack
page read and write
6412000
trusted library allocation
page read and write
6C90000
heap
page read and write
1A60000
heap
page read and write
52D0000
trusted library allocation
page read and write
4EDD000
stack
page read and write
682A000
trusted library allocation
page read and write
6EC4000
heap
page read and write
E4B000
heap
page read and write
6520000
heap
page read and write
6920000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
17E0000
trusted library allocation
page read and write
B28D000
stack
page read and write
65DA000
trusted library allocation
page read and write
272B000
trusted library allocation
page execute and read and write
6E87000
heap
page read and write
34D1000
trusted library allocation
page read and write
2D72000
trusted library allocation
page read and write
6C1E000
trusted library allocation
page read and write
2A88000
trusted library allocation
page read and write
645F000
stack
page read and write
9D0000
trusted library allocation
page read and write
825E000
stack
page read and write
687000
heap
page read and write
F8D000
trusted library allocation
page execute and read and write
7080000
trusted library allocation
page read and write
3A83000
trusted library allocation
page read and write
354C000
trusted library allocation
page read and write
F3D000
stack
page read and write
34E9000
trusted library allocation
page read and write
68FE000
stack
page read and write
52B0000
trusted library allocation
page execute and read and write
2D01000
trusted library allocation
page read and write
5180000
trusted library allocation
page execute and read and write
62AA000
trusted library allocation
page read and write
66A0000
trusted library allocation
page execute and read and write
4E80000
heap
page execute and read and write
324B000
heap
page read and write
535D000
trusted library allocation
page read and write
6845000
trusted library allocation
page read and write
99DE000
stack
page read and write
2491000
trusted library allocation
page read and write
4409000
trusted library allocation
page read and write
76A0000
trusted library allocation
page execute and read and write
F60000
trusted library allocation
page read and write
5950000
trusted library allocation
page execute and read and write
2BAA000
trusted library allocation
page read and write
65AE000
stack
page read and write
FA000
stack
page read and write
5700000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
6D0E000
trusted library allocation
page read and write
69AE000
stack
page read and write
1A1E000
trusted library allocation
page read and write
5F0000
heap
page read and write
623000
trusted library allocation
page execute and read and write
4E20000
trusted library allocation
page read and write
A77F000
stack
page read and write
535A000
trusted library allocation
page read and write
7860000
trusted library allocation
page read and write
6415000
trusted library allocation
page read and write
6CF2000
trusted library allocation
page read and write
620000
trusted library allocation
page read and write
AE7E000
stack
page read and write
6C0F000
trusted library allocation
page read and write
66EE000
stack
page read and write
55E000
stack
page read and write
500E000
stack
page read and write
1FF000
unkown
page read and write
7A0E000
stack
page read and write
25EF000
stack
page read and write
B80000
heap
page read and write
65FB000
heap
page read and write
2BEA000
trusted library allocation
page read and write
5CD0000
heap
page read and write
15D8000
heap
page read and write
7530000
trusted library allocation
page read and write
6D11000
trusted library allocation
page read and write
500000
heap
page read and write
6C32000
trusted library allocation
page read and write
AD7E000
stack
page read and write
5F60000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
652000
trusted library allocation
page read and write
27CC000
stack
page read and write
4D0000
heap
page read and write
7840000
trusted library allocation
page execute and read and write
2CFE000
stack
page read and write
239F000
stack
page read and write
2F20000
heap
page read and write
660F000
heap
page read and write
6D22000
trusted library allocation
page read and write
17ED000
trusted library allocation
page execute and read and write
570000
heap
page read and write
578A000
trusted library allocation
page read and write
1460000
heap
page read and write
630E000
stack
page read and write
2BC0000
trusted library allocation
page read and write
F80000
unkown
page readonly
157E000
stack
page read and write
31FA000
trusted library allocation
page read and write
1A0B000
trusted library allocation
page read and write
6818000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
7AB6000
heap
page read and write
4F7000
stack
page read and write
583E000
stack
page read and write
6E59000
heap
page read and write
4E60000
trusted library allocation
page read and write
A67F000
stack
page read and write
985E000
stack
page read and write
4E00000
trusted library allocation
page read and write
9A0000
trusted library allocation
page read and write
17D0000
trusted library allocation
page read and write
366B000
trusted library allocation
page read and write
5F70000
trusted library allocation
page read and write
6834000
trusted library allocation
page read and write
458D000
stack
page read and write
4930000
trusted library allocation
page read and write
62BF000
trusted library allocation
page read and write
61FA000
heap
page read and write
6D18000
trusted library allocation
page read and write
9F8F000
stack
page read and write
59C0000
heap
page execute and read and write
6A13000
heap
page read and write
6D30000
trusted library allocation
page read and write
624000
trusted library allocation
page read and write
F92000
trusted library allocation
page read and write
57FE000
stack
page read and write
48EE000
trusted library allocation
page read and write
5642000
trusted library allocation
page read and write
FB0000
heap
page read and write
591B000
stack
page read and write
608E000
stack
page read and write
28E1000
trusted library allocation
page read and write
595B000
trusted library allocation
page read and write
999F000
stack
page read and write
4FB5000
heap
page read and write
FA0000
trusted library allocation
page read and write
FBE000
heap
page read and write
6825000
trusted library allocation
page read and write
65C2000
heap
page read and write
109A000
stack
page read and write
6DB0000
heap
page read and write
3748000
trusted library allocation
page read and write
6C02000
trusted library allocation
page read and write
1465000
heap
page read and write
6DFD000
heap
page read and write
5272000
trusted library allocation
page read and write
17E3000
trusted library allocation
page execute and read and write
13BE000
stack
page read and write
2AA1000
trusted library allocation
page read and write
54FD000
stack
page read and write
695000
heap
page read and write
655E000
stack
page read and write
DC0000
heap
page read and write
9E5000
trusted library allocation
page read and write
6802000
trusted library allocation
page read and write
6FC000
heap
page read and write
6198000
heap
page read and write
6D1000
heap
page read and write
FA5000
trusted library allocation
page execute and read and write
9C0B000
stack
page read and write
5760000
trusted library allocation
page read and write
698E000
stack
page read and write
69EF000
stack
page read and write
6690000
trusted library allocation
page read and write
58A0000
trusted library allocation
page read and write
3D0D000
trusted library allocation
page read and write
63D000
trusted library allocation
page execute and read and write
6619000
heap
page read and write
5380000
trusted library allocation
page execute and read and write
2E8C000
trusted library allocation
page read and write
17FD000
trusted library allocation
page execute and read and write
610000
trusted library allocation
page read and write
12BE000
stack
page read and write
76B0000
heap
page read and write
67B0000
heap
page read and write
64F0000
trusted library allocation
page read and write
6A3000
heap
page read and write
6CFC000
trusted library allocation
page read and write
15DE000
heap
page read and write
1880000
heap
page read and write
52BE000
stack
page read and write
F70000
trusted library allocation
page read and write
A8BD000
stack
page read and write
181B000
trusted library allocation
page execute and read and write
525B000
trusted library allocation
page read and write
3A11000
trusted library allocation
page read and write
BFE000
stack
page read and write
2D79000
trusted library allocation
page read and write
4DDC000
stack
page read and write
4980000
trusted library allocation
page read and write
5651000
trusted library allocation
page read and write
6DDA000
heap
page read and write
663B000
heap
page read and write
5890000
trusted library allocation
page execute and read and write
3070000
heap
page read and write
5930000
heap
page read and write
514E000
stack
page read and write
9ADF000
stack
page read and write
694E000
stack
page read and write
3D72000
trusted library allocation
page read and write
19A000
stack
page read and write
19D0000
heap
page read and write
2670000
heap
page read and write
4F4E000
heap
page read and write
4C40000
heap
page execute and read and write
9C0000
heap
page read and write
1A21000
trusted library allocation
page read and write
AD3E000
stack
page read and write
7FB60000
trusted library allocation
page execute and read and write
7F460000
trusted library allocation
page execute and read and write
FF8000
heap
page read and write
3218000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
6A1D000
heap
page read and write
2BC1000
trusted library allocation
page read and write
7070000
trusted library allocation
page read and write
5840000
trusted library allocation
page execute and read and write
2725000
trusted library allocation
page execute and read and write
595000
heap
page read and write
642000
trusted library allocation
page read and write
5310000
heap
page execute and read and write
2800000
trusted library allocation
page read and write
1679000
heap
page read and write
6C0C000
trusted library allocation
page read and write
681A000
trusted library allocation
page read and write
6292000
trusted library allocation
page read and write
657000
trusted library allocation
page execute and read and write
6850000
trusted library allocation
page read and write
2A90000
trusted library allocation
page read and write
A87E000
stack
page read and write
2838000
trusted library allocation
page read and write
B90000
heap
page read and write
726000
heap
page read and write
989E000
stack
page read and write
6BF0000
trusted library allocation
page execute and read and write
C41000
heap
page read and write
62A8000
trusted library allocation
page read and write
ABFF000
stack
page read and write
56F0000
trusted library allocation
page read and write
FC0000
heap
page read and write
2716000
trusted library allocation
page execute and read and write
73D0000
trusted library allocation
page execute and read and write
70B0000
trusted library allocation
page read and write
2BD0000
heap
page execute and read and write
6C40000
trusted library allocation
page read and write
9D4E000
stack
page read and write
1653000
heap
page read and write
7E7000
stack
page read and write
5F8E000
stack
page read and write
2FA8000
trusted library allocation
page read and write
6580000
heap
page read and write
A9BD000
stack
page read and write
270D000
trusted library allocation
page execute and read and write
510E000
stack
page read and write
2A60000
trusted library allocation
page read and write
4E30000
heap
page read and write
1810000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
1A04000
trusted library allocation
page read and write
5870000
heap
page read and write
48FD000
trusted library allocation
page read and write
682F000
trusted library allocation
page read and write
27D0000
trusted library allocation
page execute and read and write
7552000
trusted library allocation
page read and write
618E000
stack
page read and write
65EA000
heap
page read and write
FEB000
heap
page read and write
E30000
trusted library allocation
page read and write
7A2F000
stack
page read and write
353D000
trusted library allocation
page read and write
6C9F000
stack
page read and write
1197000
stack
page read and write
498D000
trusted library allocation
page read and write
6210000
heap
page read and write
1A00000
trusted library allocation
page read and write
C05000
heap
page read and write
D9F000
stack
page read and write
7F540000
trusted library allocation
page execute and read and write
7082000
trusted library allocation
page read and write
6D50000
heap
page read and write
2D80000
trusted library allocation
page read and write
26F0000
trusted library allocation
page read and write
4970000
heap
page read and write
7A70000
heap
page read and write
24DC000
trusted library allocation
page read and write
3E52000
trusted library allocation
page read and write
6E7D000
heap
page read and write
2B9E000
stack
page read and write
34F3000
trusted library allocation
page read and write
4BAC000
stack
page read and write
6D08000
trusted library allocation
page read and write
564E000
trusted library allocation
page read and write
78A0000
trusted library allocation
page read and write
1812000
trusted library allocation
page read and write
5970000
heap
page read and write
578D000
trusted library allocation
page read and write
52E0000
trusted library allocation
page execute and read and write
9B6000
trusted library allocation
page read and write
6674000
heap
page read and write
66F0000
trusted library allocation
page execute and read and write
7CBE000
stack
page read and write
57FD000
stack
page read and write
5660000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
3D12000
trusted library allocation
page read and write
BA8000
heap
page read and write
F7D000
trusted library allocation
page execute and read and write
66E000
heap
page read and write
561E000
stack
page read and write
5CC5000
heap
page read and write
5620000
trusted library allocation
page read and write
19E0000
trusted library allocation
page execute and read and write
48DB000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
3685000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
6C35000
trusted library allocation
page read and write
69CE000
stack
page read and write
30FE000
stack
page read and write
4BE0000
trusted library allocation
page execute and read and write
681F000
trusted library allocation
page read and write
40D5000
trusted library allocation
page read and write
17CE000
stack
page read and write
2BF0000
heap
page read and write
FA2000
trusted library allocation
page read and write
319E000
trusted library allocation
page read and write
F96000
trusted library allocation
page execute and read and write
7620000
trusted library allocation
page read and write
1590000
heap
page read and write
4990000
trusted library allocation
page execute and read and write
940000
trusted library allocation
page read and write
A65000
heap
page read and write
6EA9000
heap
page read and write
2830000
trusted library allocation
page read and write
6CF4000
trusted library allocation
page read and write
76C6000
heap
page read and write
6CF6000
trusted library allocation
page read and write
4F40000
heap
page read and write
7CFE000
stack
page read and write
F80000
trusted library allocation
page read and write
140000
heap
page read and write
4902000
trusted library allocation
page read and write
595E000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
455D000
trusted library allocation
page read and write
961D000
stack
page read and write
17E4000
trusted library allocation
page read and write
69F8000
heap
page read and write
57BE000
stack
page read and write
A60000
heap
page read and write
7670000
trusted library allocation
page read and write
56E0000
trusted library allocation
page execute and read and write
28E0000
heap
page read and write
3D01000
trusted library allocation
page read and write
274D000
trusted library allocation
page read and write
F74000
trusted library allocation
page read and write
510000
heap
page read and write
F82000
unkown
page readonly
540E000
stack
page read and write
5710000
trusted library allocation
page execute and read and write
6E50000
heap
page read and write
6805000
trusted library allocation
page read and write
750E000
stack
page read and write
5C30000
trusted library allocation
page read and write
6265000
heap
page read and write
640000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
4C10000
heap
page read and write
9076000
heap
page read and write
26FD000
trusted library allocation
page execute and read and write
3040000
heap
page read and write
5671000
trusted library allocation
page read and write
B7D000
stack
page read and write
1800000
trusted library allocation
page read and write
3A1E000
trusted library allocation
page read and write
5F7000
heap
page read and write
7C10000
trusted library allocation
page read and write
48D0000
trusted library allocation
page read and write
2BE0000
trusted library allocation
page read and write
656E000
stack
page read and write
5636000
trusted library allocation
page read and write
52FE000
stack
page read and write
5300000
trusted library allocation
page read and write
78EE000
stack
page read and write
6EB2000
heap
page read and write
4E1C000
trusted library allocation
page read and write
702000
heap
page read and write
6CFF000
trusted library allocation
page read and write
2712000
trusted library allocation
page read and write
180A000
trusted library allocation
page execute and read and write
BC9000
heap
page read and write
6EB7000
heap
page read and write
28D0000
trusted library allocation
page read and write
5D0E000
heap
page read and write
2E88000
trusted library allocation
page read and write
2740000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
57B0000
trusted library allocation
page execute and read and write
552E000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
6D16000
trusted library allocation
page read and write
2720000
trusted library allocation
page read and write
1A67000
heap
page read and write
6DC9000
heap
page read and write
1410000
heap
page read and write
5CA0000
trusted library section
page read and write
278E000
stack
page read and write
3491000
trusted library allocation
page read and write
527E000
stack
page read and write
32B5000
trusted library allocation
page read and write
590000
heap
page read and write
2727000
trusted library allocation
page execute and read and write
62C0000
trusted library allocation
page execute and read and write
17F3000
trusted library allocation
page read and write
2A11000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
F73000
trusted library allocation
page execute and read and write
6CDB000
stack
page read and write
BA0000
heap
page read and write
5330000
trusted library allocation
page read and write
2A9D000
trusted library allocation
page read and write
6D1D000
trusted library allocation
page read and write
6A19000
heap
page read and write
3740000
trusted library allocation
page read and write
77EE000
stack
page read and write
FB6000
heap
page read and write
56B0000
trusted library allocation
page read and write
10D0000
trusted library allocation
page read and write
2BC7000
trusted library allocation
page read and write
6BDE000
stack
page read and write
4B0D000
stack
page read and write
25CD000
trusted library allocation
page read and write
32F0000
heap
page execute and read and write
541F000
stack
page read and write
1830000
trusted library allocation
page read and write
666E000
heap
page read and write
6C60000
trusted library allocation
page read and write
659C000
heap
page read and write
6C49000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
34B9000
trusted library allocation
page read and write
EF8000
stack
page read and write
9E0000
trusted library allocation
page read and write
6420000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
26F3000
trusted library allocation
page execute and read and write
3A22000
trusted library allocation
page read and write
7C7E000
stack
page read and write
4910000
trusted library allocation
page read and write
807E000
stack
page read and write
64CF000
stack
page read and write
594E000
stack
page read and write
1A26000
trusted library allocation
page read and write
1A32000
trusted library allocation
page read and write
17F0000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
2EBA000
stack
page read and write
2900000
heap
page read and write
5360000
trusted library allocation
page read and write
30BF000
unkown
page read and write
635E000
stack
page read and write
6D04000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
65D0000
trusted library allocation
page read and write
67FE000
stack
page read and write
5E50000
heap
page read and write
5261000
trusted library allocation
page read and write
198F000
stack
page read and write
27F0000
trusted library allocation
page read and write
6910000
trusted library allocation
page execute and read and write
1BE000
unkown
page read and write
48F1000
trusted library allocation
page read and write
10E5000
heap
page read and write
B14C000
stack
page read and write
4E10000
trusted library allocation
page read and write
AFF000
stack
page read and write
6E95000
heap
page read and write
7D3E000
stack
page read and write
7670000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
3530000
heap
page read and write
5C2E000
stack
page read and write
B24C000
stack
page read and write
19CB000
stack
page read and write
E10000
heap
page read and write
6290000
trusted library allocation
page read and write
E47000
heap
page read and write
4E35000
heap
page read and write
7680000
trusted library allocation
page read and write
FAB000
trusted library allocation
page execute and read and write
9B4000
trusted library allocation
page read and write
990000
trusted library allocation
page execute and read and write
6692000
trusted library allocation
page read and write
344C000
trusted library allocation
page read and write
6A2F000
heap
page read and write
684E000
stack
page read and write
A9C0000
heap
page read and write
5770000
trusted library allocation
page read and write
7A30000
trusted library section
page read and write
4982000
trusted library allocation
page read and write
53CE000
stack
page read and write
64A000
trusted library allocation
page execute and read and write
There are 725 hidden memdumps, click here to show them.