IOC Report
13P2mxLaQk.exe

loading gif

Files

File Path
Type
Category
Malicious
13P2mxLaQk.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\13P2mxLaQk.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp2CA3.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\VWGccZGgix.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\VWGccZGgix.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\VWGccZGgix.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_15ybh1zc.2ay.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_31yyrxo2.jps.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_erocvk3p.exb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pmjaztvh.zjg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp1357.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp1367.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp1378.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp1398.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp13A9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp2070.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp25D7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp25E8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp2608.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp2619.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp2629.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp263A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp30D9.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3157.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3177.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3178.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3189.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3EC3.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp46C3.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp46C4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp4A0C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4A1C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4A3C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4A5D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4A6D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp5C8D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5C8E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5C9F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5CAF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5CB0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp5CC1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp5CE1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp5CE2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp60C2.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp60D3.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp60D4.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp6C9F.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp7F1B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7F3C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7F5C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp7F6C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8063.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp8073.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8084.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8095.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp80A5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp80B6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp80B7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp80C8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp92D8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp92D9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp92F9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp930A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp931A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp932B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp933C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp9AA2.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9AA3.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9AA4.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA505.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpB630.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpB641.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpB652.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpB672.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpB673.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpB693.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpB6A4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpB737.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpB747.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpB768.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpB778.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC8B4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpC8D4.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC8E5.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpDC33.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpDC53.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpDC54.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpDC75.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpDC76.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpDC96.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEB90.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpEBA0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpEBB1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpEBD1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpEBE2.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEEB6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEEC6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEEE7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEEF7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
There are 91 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\13P2mxLaQk.exe
"C:\Users\user\Desktop\13P2mxLaQk.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VWGccZGgix.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VWGccZGgix" /XML "C:\Users\user\AppData\Local\Temp\tmp2CA3.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\VWGccZGgix.exe
C:\Users\user\AppData\Roaming\VWGccZGgix.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VWGccZGgix" /XML "C:\Users\user\AppData\Local\Temp\tmp3EC3.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://ipinfo.io/ip%appdata%
unknown
malicious
http://billred229102.duckdns.org:34221/
45.88.88.45
malicious
https://api.ipify.orgcookies//settinString.Removeg
unknown
malicious
billred229102.duckdns.org:34221
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://billred229102.duckdns.org:34221
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://billred229102.duckdns.org:34221t-
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://billred229102.duckdns.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
billred229102.duckdns.org
45.88.88.45
malicious
api.ip.sb
unknown
malicious

IPs

IP
Domain
Country
Malicious
45.88.88.45
billred229102.duckdns.org
Bulgaria
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4009000
trusted library allocation
page read and write
malicious
2DC0000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
4AF5000
heap
page read and write
4E6D000
stack
page read and write
C70000
unkown
page readonly
5A4B000
stack
page read and write
5A70000
trusted library allocation
page read and write
7A5E000
stack
page read and write
45FD000
trusted library allocation
page read and write
FF0000
heap
page read and write
8080000
heap
page read and write
426B000
trusted library allocation
page read and write
5596000
trusted library allocation
page read and write
5FAF000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
6530000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
1790000
trusted library allocation
page execute and read and write
5580000
trusted library allocation
page read and write
5FA8000
trusted library allocation
page read and write
473D000
stack
page read and write
A60000
heap
page read and write
2FD6000
trusted library allocation
page read and write
11C8000
heap
page read and write
70F8000
trusted library allocation
page read and write
5606000
trusted library allocation
page read and write
58CE000
trusted library allocation
page read and write
1350000
heap
page read and write
7120000
heap
page read and write
430C000
trusted library allocation
page read and write
7EE1000
heap
page read and write
66E0000
trusted library allocation
page execute and read and write
3169000
trusted library allocation
page read and write
6F6E000
stack
page read and write
6372000
heap
page read and write
5530000
trusted library allocation
page read and write
774F000
stack
page read and write
6F12000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
799D000
stack
page read and write
2C40000
trusted library allocation
page read and write
6D7E000
stack
page read and write
441D000
trusted library allocation
page read and write
533F000
stack
page read and write
15ED000
trusted library allocation
page execute and read and write
2C50000
trusted library allocation
page read and write
332B000
trusted library allocation
page read and write
5860000
heap
page execute and read and write
1647000
heap
page read and write
6ED7000
heap
page read and write
6539000
trusted library allocation
page read and write
62BE000
stack
page read and write
6DD0000
heap
page read and write
4401000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
7C12000
trusted library allocation
page read and write
1472000
trusted library allocation
page read and write
6DBE000
stack
page read and write
2EC0000
trusted library allocation
page read and write
4418000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
11A8000
heap
page read and write
886000
trusted library allocation
page read and write
832000
trusted library allocation
page read and write
5230000
heap
page execute and read and write
6798000
heap
page read and write
31FA000
trusted library allocation
page read and write
1320000
heap
page read and write
371D000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page execute and read and write
56FD000
trusted library allocation
page read and write
11F2000
trusted library allocation
page read and write
628E000
stack
page read and write
5F92000
trusted library allocation
page read and write
6C5E000
stack
page read and write
6314000
heap
page read and write
5920000
heap
page read and write
2E28000
trusted library allocation
page read and write
5F80000
trusted library allocation
page execute and read and write
6BD0000
trusted library allocation
page read and write
58CC000
trusted library allocation
page read and write
8D2000
heap
page read and write
68E0000
trusted library allocation
page read and write
665E000
stack
page read and write
70F6000
trusted library allocation
page read and write
2C5A000
trusted library allocation
page read and write
2FDD000
trusted library allocation
page read and write
7750000
trusted library section
page read and write
27E3000
trusted library allocation
page read and write
D87000
stack
page read and write
6A20000
heap
page read and write
610000
heap
page read and write
339D000
trusted library allocation
page read and write
A31000
trusted library allocation
page read and write
6555000
trusted library allocation
page read and write
5008000
trusted library allocation
page read and write
15E3000
trusted library allocation
page execute and read and write
70E4000
trusted library allocation
page read and write
69E0000
heap
page read and write
4404000
trusted library allocation
page read and write
2535000
trusted library allocation
page read and write
5DF000
unkown
page read and write
804000
trusted library allocation
page read and write
1480000
trusted library allocation
page read and write
508F000
stack
page read and write
70E8000
trusted library allocation
page read and write
70C1000
heap
page read and write
6DC0000
heap
page read and write
1191000
heap
page read and write
8C4000
heap
page read and write
F35000
heap
page read and write
161B000
trusted library allocation
page execute and read and write
1470000
trusted library allocation
page read and write
6910000
heap
page execute and read and write
6548000
trusted library allocation
page read and write
5820000
trusted library section
page readonly
4091000
trusted library allocation
page read and write
7EAB000
heap
page read and write
7110000
trusted library allocation
page read and write
73C0000
trusted library allocation
page execute and read and write
7380000
trusted library allocation
page read and write
57B0000
trusted library allocation
page execute and read and write
80A1000
heap
page read and write
5652000
trusted library allocation
page read and write
5A90000
heap
page read and write
62CC000
heap
page read and write
3245000
trusted library allocation
page read and write
7730000
heap
page read and write
55AE000
stack
page read and write
6A95000
heap
page read and write
17B6000
heap
page read and write
115E000
heap
page read and write
7F560000
trusted library allocation
page execute and read and write
5690000
heap
page execute and read and write
DC0000
heap
page read and write
11F8000
heap
page read and write
7140000
trusted library allocation
page read and write
146D000
trusted library allocation
page execute and read and write
4B00000
heap
page read and write
6A6E000
stack
page read and write
4BB3000
heap
page read and write
543F000
stack
page read and write
5AA0000
trusted library allocation
page read and write
630000
heap
page read and write
5F99000
trusted library allocation
page read and write
10F7000
stack
page read and write
6354000
heap
page read and write
639F000
heap
page read and write
6DE0000
trusted library allocation
page read and write
15E4000
trusted library allocation
page read and write
7F6E0000
trusted library allocation
page execute and read and write
7C0000
heap
page read and write
2CFE000
unkown
page read and write
4412000
trusted library allocation
page read and write
562E000
stack
page read and write
E17000
heap
page read and write
2560000
trusted library allocation
page read and write
7EA7000
heap
page read and write
700E000
stack
page read and write
620000
heap
page read and write
42FE000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
675D000
heap
page read and write
3170000
trusted library allocation
page read and write
A6B000
heap
page read and write
E10000
heap
page read and write
25B7000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
2D7E000
stack
page read and write
7EC2000
heap
page read and write
2E0E000
stack
page read and write
5840000
heap
page read and write
4B20000
heap
page read and write
7AFE000
stack
page read and write
7620000
heap
page read and write
69CE000
stack
page read and write
5930000
heap
page read and write
6C80000
trusted library allocation
page execute and read and write
4307000
trusted library allocation
page read and write
5FBF000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
12FE000
stack
page read and write
1453000
trusted library allocation
page execute and read and write
1454000
trusted library allocation
page read and write
3181000
trusted library allocation
page read and write
A3A000
stack
page read and write
4343000
trusted library allocation
page read and write
837000
trusted library allocation
page execute and read and write
6BC0000
trusted library allocation
page read and write
5C80000
trusted library allocation
page read and write
6B84000
trusted library allocation
page read and write
6BA5000
trusted library allocation
page read and write
1485000
trusted library allocation
page execute and read and write
58C0000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
11CA000
heap
page read and write
3739000
trusted library allocation
page read and write
11F6000
trusted library allocation
page execute and read and write
771C000
stack
page read and write
1460000
trusted library allocation
page read and write
A50000
trusted library allocation
page read and write
B7F000
stack
page read and write
D02000
unkown
page readonly
557E000
stack
page read and write
1487000
trusted library allocation
page execute and read and write
3F7B000
trusted library allocation
page read and write
55ED000
stack
page read and write
4AB0000
trusted library allocation
page execute and read and write
79B0000
trusted library allocation
page execute and read and write
6A5E000
stack
page read and write
7A10000
trusted library allocation
page execute and read and write
850000
trusted library allocation
page read and write
826000
trusted library allocation
page execute and read and write
835000
trusted library allocation
page execute and read and write
7120000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
7E98000
heap
page read and write
63A0000
heap
page read and write
870000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
43F4000
trusted library allocation
page read and write
81D000
trusted library allocation
page execute and read and write
5B84000
trusted library allocation
page read and write
3653000
trusted library allocation
page read and write
69BE000
stack
page read and write
7A40000
trusted library allocation
page execute and read and write
5AE0000
trusted library allocation
page execute and read and write
2DDE000
trusted library allocation
page read and write
1617000
trusted library allocation
page execute and read and write
67E000
stack
page read and write
5650000
trusted library allocation
page execute and read and write
A3D000
trusted library allocation
page read and write
638E000
stack
page read and write
82A000
trusted library allocation
page execute and read and write
7C0000
heap
page read and write
3624000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
765E000
stack
page read and write
308E000
trusted library allocation
page read and write
637F000
heap
page read and write
6C90000
trusted library allocation
page read and write
655F000
trusted library allocation
page read and write
56FA000
trusted library allocation
page read and write
70DC000
trusted library allocation
page read and write
563B000
trusted library allocation
page read and write
43FA000
trusted library allocation
page read and write
252E000
stack
page read and write
2C9000
stack
page read and write
A0B000
stack
page read and write
15FE000
stack
page read and write
55D0000
trusted library allocation
page read and write
45A8000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
7EDD000
heap
page read and write
7770000
trusted library allocation
page execute and read and write
66DE000
stack
page read and write
55B1000
trusted library allocation
page read and write
63D0000
heap
page execute and read and write
42E8000
trusted library allocation
page read and write
4B10000
trusted library section
page readonly
71A0000
trusted library allocation
page execute and read and write
4162000
trusted library allocation
page read and write
2FBB000
trusted library allocation
page read and write
6EF6000
heap
page read and write
5A10000
trusted library allocation
page execute and read and write
519C000
stack
page read and write
93C000
heap
page read and write
4A90000
heap
page read and write
67B1000
heap
page read and write
5B40000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
35C2000
trusted library allocation
page read and write
36E0000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
8FE000
heap
page read and write
4AA0000
trusted library allocation
page read and write
32EB000
trusted library allocation
page read and write
3478000
trusted library allocation
page read and write
7370000
trusted library allocation
page read and write
6DF0000
trusted library allocation
page execute and read and write
3685000
trusted library allocation
page read and write
440A000
trusted library allocation
page read and write
11E9000
heap
page read and write
11EE000
stack
page read and write
2D71000
trusted library allocation
page read and write
3C7000
stack
page read and write
7EF1000
heap
page read and write
42F8000
trusted library allocation
page read and write
78FE000
stack
page read and write
14C0000
heap
page read and write
5830000
heap
page read and write
79E0000
trusted library allocation
page read and write
940000
heap
page read and write
2E10000
heap
page execute and read and write
565E000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
2C54000
trusted library allocation
page read and write
1207000
trusted library allocation
page execute and read and write
55AE000
trusted library allocation
page read and write
933E000
stack
page read and write
5661000
trusted library allocation
page read and write
7720000
heap
page read and write
428C000
trusted library allocation
page read and write
2D89000
trusted library allocation
page read and write
1100000
heap
page read and write
673A000
heap
page read and write
4AC0000
trusted library allocation
page read and write
58BE000
stack
page read and write
80D000
trusted library allocation
page execute and read and write
2590000
heap
page read and write
4299000
trusted library allocation
page read and write
1606000
trusted library allocation
page execute and read and write
7102000
trusted library allocation
page read and write
818F000
stack
page read and write
4B1F000
trusted library section
page readonly
7760000
trusted library allocation
page read and write
2C20000
trusted library allocation
page execute and read and write
9140000
heap
page read and write
11A0000
heap
page read and write
66E0000
heap
page read and write
5B62000
trusted library allocation
page read and write
5F00000
trusted library allocation
page read and write
DF0000
heap
page read and write
6A08000
trusted library allocation
page read and write
5A80000
trusted library allocation
page read and write
A1B000
trusted library allocation
page read and write
5F30000
trusted library allocation
page execute and read and write
5646000
trusted library allocation
page read and write
6C00000
trusted library allocation
page execute and read and write
1184000
heap
page read and write
73F0000
trusted library allocation
page read and write
59E000
unkown
page read and write
7136000
trusted library allocation
page read and write
5670000
trusted library allocation
page read and write
70DF000
trusted library allocation
page read and write
3441000
trusted library allocation
page read and write
1610000
trusted library allocation
page read and write
3253000
trusted library allocation
page read and write
652E000
stack
page read and write
2FB0000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
7ED0000
heap
page read and write
5850000
heap
page read and write
1476000
trusted library allocation
page execute and read and write
2FF0000
heap
page execute and read and write
5F7E000
stack
page read and write
5580000
trusted library allocation
page read and write
5FB5000
trusted library allocation
page read and write
7A30000
trusted library allocation
page execute and read and write
4F8E000
stack
page read and write
7F930000
trusted library allocation
page execute and read and write
BFEC000
stack
page read and write
2FD1000
trusted library allocation
page read and write
9CE000
stack
page read and write
7F08000
heap
page read and write
BEAE000
stack
page read and write
6610000
trusted library allocation
page read and write
6BA2000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
2D3F000
unkown
page read and write
8FC000
heap
page read and write
40FE000
trusted library allocation
page read and write
4332000
trusted library allocation
page read and write
3EB0000
trusted library allocation
page read and write
7105000
trusted library allocation
page read and write
2F6E000
stack
page read and write
25A1000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
1450000
trusted library allocation
page read and write
62D4000
heap
page read and write
37EC000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
40F1000
trusted library allocation
page read and write
1210000
heap
page read and write
522E000
stack
page read and write
440D000
trusted library allocation
page read and write
618F000
stack
page read and write
118F000
heap
page read and write
6C95000
trusted library allocation
page read and write
68F5000
trusted library allocation
page read and write
1029000
heap
page read and write
5600000
trusted library allocation
page read and write
5720000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
6BE000
stack
page read and write
7A10000
trusted library allocation
page execute and read and write
5AD0000
trusted library allocation
page read and write
547D000
stack
page read and write
6535000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
70F2000
heap
page read and write
363B000
trusted library allocation
page read and write
5FBA000
trusted library allocation
page read and write
14C0000
heap
page read and write
11F0000
trusted library allocation
page read and write
5641000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
5590000
trusted library allocation
page execute and read and write
68E4000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
2E20000
heap
page read and write
6B76000
trusted library allocation
page read and write
5ABD000
trusted library allocation
page read and write
4AA2000
trusted library allocation
page read and write
63AE000
heap
page read and write
FD3000
trusted library allocation
page execute and read and write
63A6000
heap
page read and write
6A00000
trusted library allocation
page read and write
5520000
heap
page read and write
6399000
heap
page read and write
148B000
trusted library allocation
page execute and read and write
6390000
heap
page read and write
751E000
stack
page read and write
79A0000
trusted library section
page read and write
5660000
trusted library allocation
page read and write
B80000
heap
page read and write
4292000
trusted library allocation
page read and write
120B000
trusted library allocation
page execute and read and write
6E0000
heap
page read and write
55A0000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
17B0000
heap
page read and write
6782000
heap
page read and write
80E5000
heap
page read and write
642E000
stack
page read and write
589E000
stack
page read and write
5A0E000
stack
page read and write
65FE000
stack
page read and write
FD4000
trusted library allocation
page read and write
4D8E000
stack
page read and write
5B70000
trusted library allocation
page execute and read and write
2C0C000
stack
page read and write
2C10000
heap
page execute and read and write
785E000
stack
page read and write
11D7000
heap
page read and write
FDD000
trusted library allocation
page execute and read and write
7E90000
heap
page read and write
862E000
stack
page read and write
6900000
trusted library allocation
page read and write
AECE000
stack
page read and write
4301000
trusted library allocation
page read and write
1210000
heap
page read and write
810000
trusted library allocation
page read and write
5C8E000
trusted library allocation
page read and write
2D6E000
stack
page read and write
89A000
heap
page read and write
6BB0000
trusted library allocation
page read and write
579E000
stack
page read and write
14CB000
heap
page read and write
6A10000
heap
page read and write
4B90000
trusted library allocation
page read and write
5591000
trusted library allocation
page read and write
6DB6000
trusted library allocation
page read and write
30F1000
trusted library allocation
page read and write
433A000
trusted library allocation
page read and write
2B2E000
stack
page read and write
7A00000
trusted library allocation
page read and write
7ED6000
heap
page read and write
73D0000
trusted library allocation
page execute and read and write
4304000
trusted library allocation
page read and write
1110000
heap
page read and write
5B70000
trusted library allocation
page execute and read and write
7A20000
trusted library allocation
page read and write
35A9000
trusted library allocation
page read and write
5670000
trusted library allocation
page read and write
5F22000
trusted library allocation
page read and write
5F90000
trusted library allocation
page read and write
15D0000
trusted library allocation
page read and write
63C4000
heap
page read and write
7390000
trusted library allocation
page read and write
1355000
heap
page read and write
F7E000
stack
page read and write
2ED4000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
6E5000
heap
page read and write
6B9D000
trusted library allocation
page read and write
3089000
trusted library allocation
page read and write
31B7000
trusted library allocation
page read and write
6EC0000
heap
page read and write
7CA000
heap
page read and write
54F5000
trusted library allocation
page read and write
70D6000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
822000
trusted library allocation
page read and write
3793000
trusted library allocation
page read and write
15CF000
stack
page read and write
317D000
trusted library allocation
page read and write
15F0000
trusted library allocation
page read and write
C72000
unkown
page readonly
A70000
heap
page read and write
579F000
stack
page read and write
1615000
trusted library allocation
page execute and read and write
5C8B000
trusted library allocation
page read and write
160A000
trusted library allocation
page execute and read and write
884000
trusted library allocation
page read and write
149E000
stack
page read and write
57DE000
stack
page read and write
6B7C000
trusted library allocation
page read and write
335C000
trusted library allocation
page read and write
6302000
heap
page read and write
6B96000
trusted library allocation
page read and write
82FE000
stack
page read and write
5B60000
trusted library allocation
page read and write
2DE4000
trusted library allocation
page read and write
4AF0000
heap
page read and write
C7F000
stack
page read and write
5C7E000
stack
page read and write
1612000
trusted library allocation
page read and write
FF8000
heap
page read and write
7340000
trusted library allocation
page execute and read and write
2DA0000
heap
page read and write
81E1000
trusted library allocation
page read and write
7636000
heap
page read and write
3393000
trusted library allocation
page read and write
512C000
stack
page read and write
63C0000
trusted library allocation
page read and write
15FD000
trusted library allocation
page execute and read and write
1236000
heap
page read and write
6F20000
trusted library allocation
page execute and read and write
31F8000
trusted library allocation
page read and write
5ABA000
trusted library allocation
page read and write
7510000
heap
page read and write
BEEB000
stack
page read and write
7F1F000
heap
page read and write
7EEC000
heap
page read and write
6B74000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
36AD000
trusted library allocation
page read and write
581E000
stack
page read and write
7130000
trusted library allocation
page read and write
43A000
stack
page read and write
7E9B000
heap
page read and write
8070000
heap
page read and write
411A000
trusted library allocation
page read and write
6A9E000
stack
page read and write
5AC0000
trusted library allocation
page read and write
63E0000
trusted library allocation
page execute and read and write
70EE000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
3185000
trusted library allocation
page read and write
7CD000
stack
page read and write
63AB000
heap
page read and write
1202000
trusted library allocation
page read and write
2EDA000
trusted library allocation
page read and write
69D0000
trusted library allocation
page execute and read and write
6B6E000
stack
page read and write
32B0000
trusted library allocation
page read and write
5582000
trusted library allocation
page read and write
5A60000
trusted library allocation
page execute and read and write
9156000
heap
page read and write
42F5000
trusted library allocation
page read and write
7BFE000
stack
page read and write
89E000
heap
page read and write
1630000
trusted library allocation
page read and write
4B80000
heap
page read and write
429E000
trusted library allocation
page read and write
65E000
stack
page read and write
6BB9000
trusted library allocation
page read and write
6390000
heap
page read and write
6B5E000
stack
page read and write
5710000
trusted library allocation
page read and write
B70000
heap
page read and write
B06C000
stack
page read and write
6BF000
stack
page read and write
599E000
stack
page read and write
32BA000
trusted library allocation
page read and write
1157000
stack
page read and write
73A0000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
669E000
stack
page read and write
1602000
trusted library allocation
page read and write
3279000
trusted library allocation
page read and write
366B000
trusted library allocation
page read and write
F30000
heap
page read and write
FE0000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
5B6E000
stack
page read and write
5B95000
trusted library allocation
page read and write
2530000
trusted library allocation
page read and write
2E60000
heap
page read and write
7B9E000
stack
page read and write
5A40000
trusted library allocation
page execute and read and write
6A2E000
heap
page read and write
59A1000
trusted library allocation
page read and write
6DB0000
trusted library allocation
page read and write
697E000
stack
page read and write
5A90000
trusted library allocation
page read and write
4122000
trusted library allocation
page read and write
2FEE000
stack
page read and write
3D82000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5B2D000
stack
page read and write
66DE000
stack
page read and write
5B80000
trusted library allocation
page read and write
654A000
trusted library allocation
page read and write
7410000
heap
page read and write
323C000
trusted library allocation
page read and write
1205000
trusted library allocation
page execute and read and write
44FD000
trusted library allocation
page read and write
1200000
trusted library allocation
page read and write
654F000
trusted library allocation
page read and write
670000
heap
page read and write
11BE000
heap
page read and write
5570000
heap
page read and write
5233000
heap
page execute and read and write
6B88000
trusted library allocation
page read and write
4DCE000
stack
page read and write
4B98000
trusted library allocation
page read and write
32EC000
trusted library allocation
page read and write
17BB000
heap
page read and write
3D7E000
trusted library allocation
page read and write
6D6B000
stack
page read and write
42EE000
trusted library allocation
page read and write
1482000
trusted library allocation
page read and write
A2E000
trusted library allocation
page read and write
1150000
heap
page read and write
F80000
heap
page read and write
655A000
trusted library allocation
page read and write
145D000
trusted library allocation
page execute and read and write
734E000
stack
page read and write
340F000
trusted library allocation
page read and write
70F1000
trusted library allocation
page read and write
924000
heap
page read and write
7785000
trusted library allocation
page read and write
6532000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
3685000
trusted library allocation
page read and write
774C000
stack
page read and write
7EF4000
heap
page read and write
6B72000
trusted library allocation
page read and write
3DC2000
trusted library allocation
page read and write
7400000
trusted library allocation
page execute and read and write
6DC0000
trusted library allocation
page read and write
3406000
trusted library allocation
page read and write
D9A000
stack
page read and write
6722000
heap
page read and write
7F17000
heap
page read and write
2DF2000
trusted library allocation
page read and write
833E000
stack
page read and write
33CF000
trusted library allocation
page read and write
5FAA000
trusted library allocation
page read and write
4AAA000
trusted library allocation
page read and write
14EE000
stack
page read and write
5693000
heap
page execute and read and write
6DD0000
heap
page read and write
7189000
trusted library allocation
page read and write
6CEE000
stack
page read and write
66F8000
heap
page read and write
6752000
heap
page read and write
FED000
trusted library allocation
page execute and read and write
DC5000
heap
page read and write
55E1000
trusted library allocation
page read and write
972000
heap
page read and write
50CB000
stack
page read and write
7190000
trusted library allocation
page read and write
35A1000
trusted library allocation
page read and write
57AE000
stack
page read and write
1640000
heap
page read and write
145F000
stack
page read and write
7ED4000
heap
page read and write
7F0000
trusted library allocation
page read and write
68F2000
trusted library allocation
page read and write
4B7E000
stack
page read and write
17A0000
trusted library allocation
page read and write
2E6E000
stack
page read and write
101B000
heap
page read and write
591D000
stack
page read and write
480000
heap
page read and write
77FE000
stack
page read and write
6385000
heap
page read and write
6B8E000
trusted library allocation
page read and write
2DEA000
trusted library allocation
page read and write
7C00000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
1130000
heap
page read and write
4191000
trusted library allocation
page read and write
4410000
trusted library allocation
page read and write
3322000
trusted library allocation
page read and write
70D2000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
1300000
heap
page read and write
7A9E000
stack
page read and write
4DD0000
trusted library allocation
page read and write
79F0000
trusted library allocation
page execute and read and write
6B7F000
trusted library allocation
page read and write
4BB0000
heap
page read and write
6CA0000
trusted library allocation
page read and write
7F11000
heap
page read and write
12B0000
heap
page read and write
2FCE000
trusted library allocation
page read and write
A60000
heap
page execute and read and write
2D80000
trusted library allocation
page read and write
581E000
stack
page read and write
7FD00000
trusted library allocation
page execute and read and write
2C60000
heap
page read and write
135E000
stack
page read and write
4BA0000
trusted library allocation
page execute and read and write
70D4000
trusted library allocation
page read and write
51EE000
stack
page read and write
105B000
stack
page read and write
3001000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
C8B000
stack
page read and write
4311000
trusted library allocation
page read and write
A36000
trusted library allocation
page read and write
558A000
trusted library allocation
page read and write
944000
heap
page read and write
6B98000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
F10000
heap
page read and write
890000
heap
page read and write
6DEE000
stack
page read and write
68F0000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
70FD000
trusted library allocation
page read and write
30EE000
stack
page read and write
3140000
trusted library allocation
page read and write
131E000
stack
page read and write
14C7000
heap
page read and write
5F20000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
6B91000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
6330000
heap
page read and write
3205000
trusted library allocation
page read and write
8B7000
heap
page read and write
3D71000
trusted library allocation
page read and write
576D000
stack
page read and write
6F10000
trusted library allocation
page read and write
303C000
trusted library allocation
page read and write
7C10000
heap
page read and write
6FCE000
stack
page read and write
5A95000
heap
page read and write
1DD000
stack
page read and write
803000
trusted library allocation
page execute and read and write
5680000
trusted library allocation
page execute and read and write
427B000
trusted library allocation
page read and write
2EE0000
heap
page read and write
F0D000
stack
page read and write
5A50000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
83B000
trusted library allocation
page execute and read and write
5E0000
heap
page read and write
5523000
heap
page read and write
27F3000
trusted library allocation
page read and write
317D000
trusted library allocation
page read and write
4B30000
heap
page execute and read and write
4102000
trusted library allocation
page read and write
63BB000
heap
page read and write
65BD000
stack
page read and write
5F95000
trusted library allocation
page read and write
14F0000
heap
page read and write
5160000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
68DE000
stack
page read and write
2DEF000
stack
page read and write
70A0000
heap
page read and write
860000
trusted library allocation
page execute and read and write
2FAC000
stack
page read and write
36A4000
trusted library allocation
page read and write
4001000
trusted library allocation
page read and write
764E000
stack
page read and write
7A50000
heap
page read and write
522D000
stack
page read and write
56D0000
trusted library allocation
page read and write
120B000
heap
page read and write
2ED0000
trusted library allocation
page read and write
There are 765 hidden memdumps, click here to show them.