IOC Report
PZNfhfaj9O.exe

loading gif

Files

File Path
Type
Category
Malicious
PZNfhfaj9O.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PZNfhfaj9O.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp3010.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\CiENBY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CiENBY.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CiENBY.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4crtcs5o.3ss.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5dl3rkda.tzc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_la3pxgze.1nu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lgziukw1.ns2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n5fyhhir.eq2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_syyobi1x.j3r.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tqpzhywa.cfy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uzs012ld.0je.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp16C7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp16E7.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp16F8.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp1708.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp1709.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp171A.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp24DB.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp24EB.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp250C.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp251C.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp252D.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp253E.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp2665.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp3138.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp3148.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp3159.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp316A.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp317A.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp319A.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp4DAC.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp4DBC.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp4DCD.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp4DDE.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp4DEE.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp4E0E.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp5461.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp5C7A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5C7B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5CAB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5CAC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5CBD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5CCD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6190.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp61A0.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp61A1.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp61A2.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp653E.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp654F.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp655F.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp6570.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp6581.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp65A1.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6F79.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6F8A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6F8B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6F9C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6F9D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6FAD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8471.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp8492.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp84D1.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp9255.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9266.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9277.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9287.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9298.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp92A9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp92B9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp98E7.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA787.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA798.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA7A8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA7D8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA7F8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC7B5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC7C5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC7D6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC7E7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC807.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpC817.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpC818.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpDF65.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpDF76.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpDF86.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpDF97.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpDFA7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpDFB8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFCE5.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpFCF6.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpFCF7.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpFD07.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpFD43.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpFD44.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpFD55.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpFD56.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
There are 90 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PZNfhfaj9O.exe
"C:\Users\user\Desktop\PZNfhfaj9O.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PZNfhfaj9O.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\CiENBY.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CiENBY" /XML "C:\Users\user\AppData\Local\Temp\tmp3010.tmp"
malicious
C:\Users\user\Desktop\PZNfhfaj9O.exe
"C:\Users\user\Desktop\PZNfhfaj9O.exe"
malicious
C:\Users\user\Desktop\PZNfhfaj9O.exe
"C:\Users\user\Desktop\PZNfhfaj9O.exe"
malicious
C:\Users\user\AppData\Roaming\CiENBY.exe
C:\Users\user\AppData\Roaming\CiENBY.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CiENBY" /XML "C:\Users\user\AppData\Local\Temp\tmp5461.tmp"
malicious
C:\Users\user\AppData\Roaming\CiENBY.exe
"C:\Users\user\AppData\Roaming\CiENBY.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
185.222.58.80:55615
malicious
https://api.ipify.orgcookies//settinString.Removeg
unknown
malicious
http://185.222.58.80:55615/
185.222.58.80
malicious
https://ipinfo.io/ip%appdata%
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.fontbureau.com/designersG
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://www.fontbureau.com/designers?
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://api.ip.sb/geoip
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://ns.microsoft.co2/t/Re
unknown
http://www.tiro.com
unknown
http://tempuri.org/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://185.222.58.80:5
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://www.sajatypeworks.com
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://185.222.58.80:55615
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
https://api.ip.sb
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://www.ecosia.org/newtab/
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://tempuri.org/Endpoint/SetEnviron
unknown
http://www.carterandcone.coml
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://www.fontbureau.com/designers8
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://ns.adobe.0/xmpDe
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 56 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.222.58.80
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PZNfhfaj9O_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PZNfhfaj9O_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PZNfhfaj9O_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PZNfhfaj9O_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PZNfhfaj9O_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PZNfhfaj9O_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PZNfhfaj9O_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PZNfhfaj9O_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PZNfhfaj9O_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PZNfhfaj9O_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PZNfhfaj9O_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PZNfhfaj9O_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PZNfhfaj9O_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PZNfhfaj9O_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CiENBY_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CiENBY_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CiENBY_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CiENBY_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CiENBY_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CiENBY_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CiENBY_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CiENBY_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CiENBY_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CiENBY_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CiENBY_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CiENBY_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CiENBY_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CiENBY_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3EDB000
trusted library allocation
page read and write
malicious
3E2A000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
6B20000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6FD0000
heap
page read and write
12DE000
stack
page read and write
679E000
heap
page read and write
72E0000
heap
page read and write
544E000
stack
page read and write
63D8000
trusted library allocation
page read and write
5256000
trusted library allocation
page read and write
402B000
trusted library allocation
page read and write
1043000
trusted library allocation
page execute and read and write
526D000
stack
page read and write
6964000
trusted library allocation
page read and write
113F000
stack
page read and write
4D40000
trusted library allocation
page read and write
7F0000
heap
page read and write
686D000
stack
page read and write
2DEF000
stack
page read and write
7A80000
trusted library allocation
page execute and read and write
7050000
trusted library allocation
page execute and read and write
30BC000
trusted library allocation
page read and write
318F000
stack
page read and write
10C3000
heap
page read and write
7AC0000
trusted library allocation
page read and write
3F58000
trusted library allocation
page read and write
6920000
heap
page read and write
6764000
heap
page read and write
EF7000
stack
page read and write
3983000
trusted library allocation
page read and write
7887000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
315A000
trusted library allocation
page read and write
6790000
heap
page read and write
52E0000
trusted library allocation
page read and write
142E000
heap
page read and write
1390000
trusted library allocation
page read and write
5840000
trusted library allocation
page execute and read and write
7390000
trusted library allocation
page read and write
3126000
trusted library allocation
page read and write
112E000
stack
page read and write
52E4000
trusted library allocation
page read and write
580000
heap
page read and write
2FD2000
trusted library allocation
page read and write
A3EE000
stack
page read and write
63E5000
trusted library allocation
page read and write
6939000
trusted library allocation
page read and write
B80000
heap
page read and write
2841000
trusted library allocation
page read and write
3007000
trusted library allocation
page read and write
5312000
trusted library allocation
page read and write
121B000
heap
page read and write
348B000
trusted library allocation
page read and write
2C60000
heap
page read and write
3841000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
127B000
trusted library allocation
page execute and read and write
2D10000
trusted library allocation
page read and write
73DE000
stack
page read and write
1420000
heap
page read and write
13B0000
heap
page read and write
569E000
stack
page read and write
62B0000
trusted library allocation
page read and write
6102000
trusted library allocation
page read and write
5904000
heap
page read and write
7650000
trusted library allocation
page read and write
695F000
trusted library allocation
page read and write
132F000
stack
page read and write
670B000
heap
page read and write
296E000
trusted library allocation
page read and write
2CCB000
stack
page read and write
1077000
heap
page read and write
5A80000
trusted library allocation
page read and write
550000
heap
page read and write
3AF1000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
5E40000
heap
page read and write
5630000
trusted library allocation
page execute and read and write
1182000
heap
page read and write
1040000
trusted library allocation
page read and write
2B04000
trusted library allocation
page read and write
ADCB000
stack
page read and write
13D7000
trusted library allocation
page execute and read and write
7F5A0000
trusted library allocation
page execute and read and write
A86E000
stack
page read and write
304F000
trusted library allocation
page read and write
B9A000
stack
page read and write
2D40000
heap
page read and write
69F000
unkown
page read and write
2F91000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
4E08000
trusted library allocation
page read and write
5E50000
heap
page read and write
7465000
heap
page read and write
9FCE000
stack
page read and write
52D2000
trusted library allocation
page read and write
3AF8000
trusted library allocation
page read and write
7765000
heap
page read and write
314E000
stack
page read and write
FC0000
heap
page read and write
629F000
trusted library allocation
page read and write
5450000
heap
page execute and read and write
58B0000
heap
page read and write
12F0000
trusted library allocation
page read and write
13A3000
trusted library allocation
page execute and read and write
5615000
heap
page read and write
6386000
trusted library allocation
page read and write
6272000
trusted library allocation
page read and write
9FD000
heap
page read and write
1222000
heap
page read and write
2E10000
heap
page read and write
762E000
stack
page read and write
CFE000
heap
page read and write
681E000
stack
page read and write
125D000
trusted library allocation
page execute and read and write
497D000
stack
page read and write
6F82000
trusted library allocation
page read and write
387C000
trusted library allocation
page read and write
5594000
trusted library section
page readonly
56C0000
trusted library allocation
page read and write
6380000
trusted library allocation
page read and write
2D07000
trusted library allocation
page read and write
25CB000
trusted library allocation
page execute and read and write
62C0000
trusted library allocation
page read and write
3021000
trusted library allocation
page read and write
13A4000
trusted library allocation
page read and write
28C3000
trusted library allocation
page read and write
5180000
trusted library allocation
page execute and read and write
63D1000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
2C59000
trusted library allocation
page read and write
54E000
unkown
page read and write
58EE000
heap
page read and write
3860000
trusted library allocation
page read and write
A66D000
stack
page read and write
9ECE000
stack
page read and write
B020000
trusted library allocation
page execute and read and write
58BA000
trusted library allocation
page read and write
1277000
trusted library allocation
page execute and read and write
12D3000
trusted library allocation
page execute and read and write
7A90000
trusted library allocation
page execute and read and write
52AE000
stack
page read and write
4F9C000
stack
page read and write
384E000
trusted library allocation
page read and write
3F9E000
trusted library allocation
page read and write
2714000
trusted library allocation
page read and write
53B0000
trusted library allocation
page execute and read and write
7427000
heap
page read and write
694F000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
62A4000
trusted library allocation
page read and write
3025000
trusted library allocation
page read and write
2640000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
77E6000
heap
page read and write
13C0000
trusted library allocation
page read and write
39D5000
trusted library allocation
page read and write
5390000
heap
page read and write
67A0000
trusted library allocation
page read and write
A4EE000
stack
page read and write
53C0000
trusted library allocation
page read and write
6E82000
trusted library allocation
page read and write
7A50000
trusted library allocation
page read and write
13D2000
trusted library allocation
page read and write
63B6000
trusted library allocation
page read and write
5510000
heap
page read and write
950000
heap
page read and write
52D0000
trusted library allocation
page read and write
659F000
stack
page read and write
91A6000
heap
page read and write
70BF000
heap
page read and write
57E0000
trusted library allocation
page read and write
104D000
trusted library allocation
page execute and read and write
1138000
heap
page read and write
5251000
trusted library allocation
page read and write
6E7D000
trusted library allocation
page read and write
11CD000
heap
page read and write
6880000
trusted library allocation
page read and write
3AF4000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
72F0000
heap
page read and write
2D51000
trusted library allocation
page read and write
692F000
stack
page read and write
1266000
trusted library allocation
page execute and read and write
1400000
trusted library allocation
page execute and read and write
7D6E000
stack
page read and write
6032000
heap
page read and write
3AEA000
trusted library allocation
page read and write
73E0000
heap
page read and write
773A000
heap
page read and write
6A8E000
stack
page read and write
FF7000
heap
page read and write
13C2000
trusted library allocation
page read and write
11DE000
heap
page read and write
63DD000
trusted library allocation
page read and write
6110000
trusted library allocation
page execute and read and write
AAEE000
stack
page read and write
51FD000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
68A0000
heap
page read and write
5610000
heap
page read and write
3ADE000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
6948000
trusted library allocation
page read and write
7360000
heap
page read and write
B20000
heap
page read and write
62B5000
trusted library allocation
page read and write
5D1E000
stack
page read and write
5600000
heap
page read and write
CDE000
stack
page read and write
152F000
stack
page read and write
2C8E000
stack
page read and write
11C6000
heap
page read and write
2CDE000
trusted library allocation
page read and write
555B000
stack
page read and write
4094000
trusted library allocation
page read and write
1290000
trusted library allocation
page read and write
752E000
stack
page read and write
CE3000
trusted library allocation
page execute and read and write
77D5000
heap
page read and write
7A2E000
stack
page read and write
71C0000
trusted library allocation
page read and write
3DEC000
trusted library allocation
page read and write
F9E000
stack
page read and write
6E85000
trusted library allocation
page read and write
13AC000
stack
page read and write
1000000
heap
page read and write
CED000
trusted library allocation
page execute and read and write
10E0000
heap
page read and write
63D6000
trusted library allocation
page read and write
7060000
heap
page read and write
F65000
heap
page read and write
CF0000
heap
page read and write
69EE000
stack
page read and write
12E0000
heap
page read and write
7AD0000
trusted library allocation
page execute and read and write
7456000
heap
page read and write
1360000
heap
page read and write
2CD0000
trusted library allocation
page read and write
A3AE000
stack
page read and write
71E5000
heap
page read and write
7040000
trusted library allocation
page read and write
1159000
heap
page read and write
1307000
trusted library allocation
page execute and read and write
124E000
stack
page read and write
A52E000
stack
page read and write
7160000
trusted library allocation
page read and write
838E000
stack
page read and write
53CB000
trusted library allocation
page read and write
2948000
trusted library allocation
page read and write
28C5000
trusted library allocation
page read and write
5560000
heap
page execute and read and write
7170000
trusted library allocation
page read and write
2CA0000
heap
page read and write
67C2000
trusted library allocation
page read and write
63BC000
trusted library allocation
page read and write
6890000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6955000
trusted library allocation
page read and write
A0C000
heap
page read and write
5A8E000
trusted library allocation
page read and write
900000
heap
page read and write
E5B000
stack
page read and write
A38E000
stack
page read and write
1300000
trusted library allocation
page read and write
25E0000
trusted library allocation
page read and write
2C80000
trusted library allocation
page execute and read and write
2D40000
heap
page read and write
555E000
stack
page read and write
31A0000
heap
page read and write
77B8000
heap
page read and write
19A000
stack
page read and write
4001000
trusted library allocation
page read and write
77DD000
heap
page read and write
7751000
heap
page read and write
A9AE000
stack
page read and write
6798000
heap
page read and write
3C36000
trusted library allocation
page read and write
2720000
trusted library allocation
page read and write
41B000
heap
page read and write
127E000
stack
page read and write
1165000
heap
page read and write
71F0000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
7490000
heap
page read and write
12DD000
trusted library allocation
page execute and read and write
FDE000
stack
page read and write
5810000
trusted library allocation
page execute and read and write
25C2000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
2BFD000
trusted library allocation
page read and write
6820000
trusted library allocation
page execute and read and write
7C30000
trusted library allocation
page read and write
A72C000
stack
page read and write
2D0A000
stack
page read and write
5782000
trusted library allocation
page read and write
605E000
heap
page read and write
636F000
stack
page read and write
6E9B000
trusted library allocation
page read and write
3397000
trusted library allocation
page read and write
5928000
heap
page read and write
747E000
heap
page read and write
7730000
heap
page read and write
5830000
trusted library allocation
page read and write
7A60000
trusted library allocation
page read and write
71B0000
trusted library allocation
page execute and read and write
AEA000
stack
page read and write
63B4000
trusted library allocation
page read and write
A8AD000
stack
page read and write
575E000
stack
page read and write
6725000
heap
page read and write
6972000
trusted library allocation
page read and write
A62F000
stack
page read and write
40C2000
trusted library allocation
page read and write
6A2E000
stack
page read and write
6870000
trusted library allocation
page read and write
2E28000
trusted library allocation
page read and write
271A000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
13BD000
trusted library allocation
page execute and read and write
136E000
stack
page read and write
5A8B000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
B00E000
stack
page read and write
58BD000
trusted library allocation
page read and write
1250000
trusted library allocation
page read and write
F90000
heap
page read and write
1302000
trusted library allocation
page read and write
676E000
heap
page read and write
53B0000
trusted library allocation
page read and write
719A000
trusted library allocation
page read and write
71F000
stack
page read and write
FF0000
heap
page read and write
66E2000
heap
page read and write
15D000
stack
page read and write
52C0000
heap
page read and write
50C1000
trusted library allocation
page read and write
7F5E0000
trusted library allocation
page execute and read and write
A00D000
stack
page read and write
6EC0000
trusted library allocation
page read and write
3013000
trusted library allocation
page read and write
6E6E000
trusted library allocation
page read and write
6E5C000
trusted library allocation
page read and write
400000
heap
page read and write
12D0000
trusted library allocation
page read and write
AC2E000
stack
page read and write
25AD000
trusted library allocation
page execute and read and write
3F91000
trusted library allocation
page read and write
7472000
heap
page read and write
71D0000
heap
page read and write
5170000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
6F40000
heap
page read and write
7FA50000
trusted library allocation
page execute and read and write
53F0000
heap
page read and write
25A0000
trusted library allocation
page read and write
5EEE000
stack
page read and write
2668000
trusted library allocation
page read and write
626F000
stack
page read and write
6900000
trusted library allocation
page execute and read and write
262E000
stack
page read and write
F00000
heap
page read and write
38A3000
trusted library allocation
page read and write
66A0000
heap
page read and write
2CA3000
heap
page read and write
57A0000
heap
page read and write
F60000
heap
page read and write
6E5F000
trusted library allocation
page read and write
53D0000
trusted library section
page readonly
5D0000
heap
page read and write
6E71000
trusted library allocation
page read and write
5902000
heap
page read and write
7B30000
heap
page read and write
5D5E000
stack
page read and write
2730000
heap
page execute and read and write
F95000
heap
page read and write
2CD0000
trusted library allocation
page execute and read and write
A76D000
stack
page read and write
2F80000
heap
page execute and read and write
AB2E000
stack
page read and write
58E0000
trusted library allocation
page execute and read and write
1108000
heap
page read and write
A62C000
stack
page read and write
12F6000
trusted library allocation
page execute and read and write
5210000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
9B0000
unkown
page readonly
E50000
heap
page read and write
283E000
stack
page read and write
1174000
heap
page read and write
75F0000
trusted library allocation
page execute and read and write
6E4E000
stack
page read and write
3FC2000
trusted library allocation
page read and write
540E000
stack
page read and write
60E0000
heap
page read and write
6960000
trusted library allocation
page read and write
53E0000
heap
page read and write
5776000
trusted library allocation
page read and write
4D60000
heap
page execute and read and write
50D2000
trusted library allocation
page read and write
669E000
stack
page read and write
4361000
trusted library allocation
page read and write
7785000
heap
page read and write
6AE0000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
13DB000
trusted library allocation
page execute and read and write
3FA2000
trusted library allocation
page read and write
2CE0000
heap
page read and write
565E000
stack
page read and write
57A1000
trusted library allocation
page read and write
1272000
trusted library allocation
page read and write
6A90000
trusted library allocation
page execute and read and write
2F54000
trusted library allocation
page read and write
1091000
heap
page read and write
6AF0000
trusted library allocation
page read and write
53BF000
stack
page read and write
7F2B0000
trusted library allocation
page execute and read and write
5580000
trusted library allocation
page read and write
10DE000
stack
page read and write
5890000
trusted library allocation
page read and write
6160000
trusted library allocation
page execute and read and write
5150000
trusted library allocation
page execute and read and write
2FD8000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
6100000
trusted library allocation
page read and write
105E000
heap
page read and write
6E56000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
6935000
trusted library allocation
page read and write
3D51000
trusted library allocation
page read and write
777F000
heap
page read and write
7C7E000
stack
page read and write
743C000
heap
page read and write
2D35000
trusted library allocation
page read and write
58AE000
stack
page read and write
25B0000
trusted library allocation
page read and write
12F2000
trusted library allocation
page read and write
25C5000
trusted library allocation
page execute and read and write
2AFF000
trusted library allocation
page read and write
1138000
heap
page read and write
12FA000
trusted library allocation
page execute and read and write
632D000
stack
page read and write
3427000
trusted library allocation
page read and write
5306000
trusted library allocation
page read and write
716F000
stack
page read and write
5D5000
heap
page read and write
13EE000
stack
page read and write
744B000
heap
page read and write
75EE000
stack
page read and write
2E0E000
stack
page read and write
AF0E000
stack
page read and write
9DCF000
stack
page read and write
1050000
heap
page read and write
1350000
heap
page read and write
310F000
unkown
page read and write
3852000
trusted library allocation
page read and write
50E1000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
70AA000
heap
page read and write
A48E000
stack
page read and write
39CE000
trusted library allocation
page read and write
96D000
heap
page read and write
5200000
trusted library allocation
page read and write
5FEE000
stack
page read and write
114A000
heap
page read and write
74BE000
stack
page read and write
2CD8000
trusted library allocation
page read and write
7E70000
heap
page read and write
13D5000
trusted library allocation
page execute and read and write
33C4000
trusted library allocation
page read and write
7742000
heap
page read and write
78CE000
stack
page read and write
2CB4000
trusted library allocation
page read and write
1130000
heap
page read and write
6DE000
stack
page read and write
2F9F000
trusted library allocation
page read and write
7180000
heap
page read and write
5234000
trusted library allocation
page read and write
7640000
trusted library allocation
page execute and read and write
3340000
heap
page read and write
70BB000
heap
page read and write
2F50000
trusted library allocation
page read and write
A11000
heap
page read and write
12E0000
trusted library allocation
page read and write
345E000
trusted library allocation
page read and write
3E01000
trusted library allocation
page read and write
55EB000
stack
page read and write
63E2000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
13F0000
trusted library allocation
page read and write
7D7E000
stack
page read and write
525D000
trusted library allocation
page read and write
2F4E000
stack
page read and write
530D000
trusted library allocation
page read and write
2DD0000
heap
page read and write
51D0000
trusted library allocation
page read and write
615E000
stack
page read and write
58C0000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
58C9000
heap
page read and write
6980000
trusted library allocation
page read and write
7660000
trusted library allocation
page execute and read and write
6E76000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
6775000
heap
page read and write
1262000
trusted library allocation
page read and write
7746000
heap
page read and write
6390000
trusted library allocation
page read and write
7AF0000
heap
page read and write
6ADE000
stack
page read and write
578E000
trusted library allocation
page read and write
7470000
trusted library allocation
page read and write
4CFE000
stack
page read and write
63F4000
trusted library allocation
page read and write
7E80000
trusted library allocation
page execute and read and write
114E000
heap
page read and write
25B2000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
294A000
trusted library allocation
page read and write
2D15000
trusted library allocation
page read and write
259E000
stack
page read and write
13C6000
trusted library allocation
page execute and read and write
50C6000
trusted library allocation
page read and write
6A40000
trusted library allocation
page execute and read and write
53F3000
heap
page read and write
3B36000
trusted library allocation
page read and write
A42000
heap
page read and write
76EF000
stack
page read and write
58A0000
trusted library allocation
page read and write
71E0000
trusted library allocation
page execute and read and write
2890000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
A9AE000
stack
page read and write
7A64000
trusted library allocation
page read and write
6000000
heap
page read and write
11FC000
heap
page read and write
77FF000
stack
page read and write
312C000
trusted library allocation
page read and write
94D000
stack
page read and write
3892000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
13B0000
trusted library allocation
page read and write
5220000
trusted library allocation
page execute and read and write
6932000
trusted library allocation
page read and write
741F000
heap
page read and write
68F0000
trusted library allocation
page read and write
6975000
trusted library allocation
page read and write
4E6E000
stack
page read and write
67D0000
trusted library allocation
page execute and read and write
A9C0000
trusted library allocation
page execute and read and write
2D80000
heap
page read and write
33F7000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
A10D000
stack
page read and write
6754000
heap
page read and write
76F0000
trusted library allocation
page read and write
50AE000
stack
page read and write
3888000
trusted library allocation
page read and write
50DE000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
57ED000
stack
page read and write
2CC0000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
51FA000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
A24E000
stack
page read and write
71E1000
heap
page read and write
55F0000
heap
page read and write
28D1000
trusted library allocation
page read and write
7E6E000
stack
page read and write
386C000
trusted library allocation
page read and write
F58000
stack
page read and write
25C0000
trusted library allocation
page read and write
C8E000
stack
page read and write
6B1E000
stack
page read and write
A34E000
stack
page read and write
7170000
trusted library allocation
page execute and read and write
2700000
trusted library allocation
page read and write
695A000
trusted library allocation
page read and write
1058000
heap
page read and write
6078000
heap
page read and write
7D2E000
stack
page read and write
6930000
trusted library allocation
page read and write
31AA000
heap
page read and write
AECC000
stack
page read and write
9190000
heap
page read and write
7610000
trusted library allocation
page read and write
3E9C000
trusted library allocation
page read and write
386F000
trusted library allocation
page read and write
677E000
heap
page read and write
63CE000
trusted library allocation
page read and write
50BB000
trusted library allocation
page read and write
6DCE000
stack
page read and write
2FE0000
trusted library allocation
page read and write
A76D000
stack
page read and write
676C000
stack
page read and write
2EE0000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
E85000
heap
page read and write
3881000
trusted library allocation
page read and write
6ACE000
stack
page read and write
1426000
heap
page read and write
4EEB000
stack
page read and write
2D20000
heap
page execute and read and write
5600000
trusted library section
page read and write
565E000
stack
page read and write
3459000
trusted library allocation
page read and write
73F9000
heap
page read and write
605A000
heap
page read and write
63BF000
trusted library allocation
page read and write
2D0E000
stack
page read and write
F5E000
stack
page read and write
25C7000
trusted library allocation
page execute and read and write
CE0000
trusted library allocation
page read and write
776B000
heap
page read and write
E80000
heap
page read and write
596D000
stack
page read and write
3154000
trusted library allocation
page read and write
F10000
heap
page read and write
6B30000
trusted library allocation
page read and write
A110000
heap
page read and write
12D4000
trusted library allocation
page read and write
6788000
heap
page read and write
2F5A000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
126A000
trusted library allocation
page execute and read and write
523B000
trusted library allocation
page read and write
2DF0000
heap
page execute and read and write
2DCE000
unkown
page read and write
25B6000
trusted library allocation
page execute and read and write
5280000
trusted library allocation
page read and write
39C8000
trusted library allocation
page read and write
3865000
trusted library allocation
page read and write
B40000
heap
page read and write
2CD5000
trusted library allocation
page read and write
5590000
trusted library section
page readonly
3E7C000
trusted library allocation
page read and write
3875000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7C2E000
stack
page read and write
A770000
heap
page read and write
6410000
trusted library allocation
page execute and read and write
773E000
heap
page read and write
6772000
heap
page read and write
6910000
trusted library allocation
page execute and read and write
A8AE000
stack
page read and write
63C8000
trusted library allocation
page read and write
130B000
trusted library allocation
page execute and read and write
4F6E000
stack
page read and write
5771000
trusted library allocation
page read and write
7B56000
heap
page read and write
57A5000
heap
page read and write
74FE000
stack
page read and write
7085000
heap
page read and write
7C40000
trusted library allocation
page read and write
6882000
trusted library allocation
page read and write
6E78000
trusted library allocation
page read and write
28BB000
trusted library allocation
page read and write
6F00000
heap
page read and write
2D00000
trusted library allocation
page read and write
987000
heap
page read and write
E60000
heap
page read and write
6E64000
trusted library allocation
page read and write
4FAE000
stack
page read and write
5120000
trusted library allocation
page read and write
985000
heap
page read and write
7A70000
trusted library allocation
page execute and read and write
576B000
trusted library allocation
page read and write
2B46000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
2CCD000
stack
page read and write
12C7000
heap
page read and write
52EB000
trusted library allocation
page read and write
CE4000
trusted library allocation
page read and write
12C0000
heap
page read and write
300D000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
58B000
stack
page read and write
2B02000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
2EFC000
stack
page read and write
CF8000
heap
page read and write
694A000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page execute and read and write
7190000
trusted library allocation
page read and write
7396000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
4D3E000
stack
page read and write
6270000
trusted library allocation
page read and write
6709000
heap
page read and write
5820000
trusted library allocation
page read and write
52E0000
trusted library allocation
page execute and read and write
4D58000
trusted library allocation
page read and write
487C000
stack
page read and write
6ED0000
trusted library allocation
page read and write
524E000
trusted library allocation
page read and write
5DEF000
stack
page read and write
5A7E000
stack
page read and write
A9ED000
stack
page read and write
7C3E000
stack
page read and write
77A4000
heap
page read and write
39DA000
trusted library allocation
page read and write
2E01000
trusted library allocation
page read and write
5970000
trusted library allocation
page execute and read and write
2ED8000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
52FE000
trusted library allocation
page read and write
778B000
heap
page read and write
3A33000
trusted library allocation
page read and write
BE7000
stack
page read and write
58C0000
heap
page read and write
57D0000
trusted library allocation
page read and write
78F0000
trusted library section
page read and write
5570000
trusted library allocation
page read and write
777C000
heap
page read and write
8F7000
stack
page read and write
4D51000
trusted library allocation
page read and write
54F0000
heap
page read and write
6E0E000
stack
page read and write
2D3B000
trusted library allocation
page read and write
13AD000
trusted library allocation
page execute and read and write
7630000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
114E000
heap
page read and write
1320000
trusted library allocation
page read and write
73EC000
heap
page read and write
5370000
heap
page read and write
7AE0000
trusted library allocation
page read and write
2CB6000
trusted library allocation
page read and write
28D5000
trusted library allocation
page read and write
2630000
trusted library allocation
page execute and read and write
710B000
stack
page read and write
5230000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
9B2000
unkown
page readonly
2710000
trusted library allocation
page read and write
2650000
heap
page read and write
508D000
stack
page read and write
63C4000
trusted library allocation
page read and write
2BA1000
trusted library allocation
page read and write
410000
heap
page read and write
6E68000
trusted library allocation
page read and write
55F0000
trusted library allocation
page execute and read and write
7880000
trusted library allocation
page read and write
63B2000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
3AE5000
trusted library allocation
page read and write
33FB000
trusted library allocation
page read and write
62A0000
trusted library allocation
page read and write
5FFC000
heap
page read and write
14BF000
stack
page read and write
50B0000
trusted library allocation
page read and write
77CA000
heap
page read and write
53A2000
trusted library allocation
page read and write
7795000
heap
page read and write
6A80000
heap
page read and write
1044000
trusted library allocation
page read and write
753E000
stack
page read and write
6E54000
trusted library allocation
page read and write
52B0000
trusted library allocation
page execute and read and write
6E50000
trusted library allocation
page read and write
649F000
stack
page read and write
12ED000
trusted library allocation
page execute and read and write
5FF0000
heap
page read and write
55A0000
heap
page execute and read and write
2D0D000
trusted library allocation
page read and write
1167000
heap
page read and write
97A000
heap
page read and write
592D000
stack
page read and write
2D30000
trusted library allocation
page read and write
1140000
heap
page read and write
3859000
trusted library allocation
page read and write
3118000
trusted library allocation
page read and write
There are 767 hidden memdumps, click here to show them.