IOC Report
HTZ4az17lj.exe

loading gif

Files

File Path
Type
Category
Malicious
HTZ4az17lj.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\uuhbr0xg.h20.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\EEGWXUHVUG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\NVWZAPQSQL.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\PIVFAGEAAV\PIVFAGEAAV.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\SQSJKEBWDT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\SQSJKEBWDT\ZGGKNSUKOP.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\6D97C624D7.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\uuhbr0xg.h20.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\ndoyz5n0.3un
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
C:\Users\user\AppData\Local\Temp\p.html
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\places.raw
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp3D76.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp59AE.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp59CE.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp753B.tmp.dat
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp754C.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp756C.tmp.dat
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp756D.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp90AB.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp90DB.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp90FB.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp911B.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpB2A0.tmp.bat
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\uuhbr0xg.h20.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\xqyyhqif.f3j
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Browsers\Firefox\Bookmarks.txt
ASCII text
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Browsers\Firefox\History.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Directories\Desktop.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Directories\Documents.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Directories\Downloads.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Directories\OneDrive.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Directories\Pictures.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Directories\Startup.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Directories\Temp.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Directories\Videos.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\BJZFPPWAPT.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\BJZFPPWAPT.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\BNAGMGSPLO.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\BNAGMGSPLO.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\BNAGMGSPLO\BJZFPPWAPT.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\BNAGMGSPLO\BNAGMGSPLO.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\BNAGMGSPLO\DUUDTUBZFW.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\BNAGMGSPLO\EEGWXUHVUG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\BNAGMGSPLO\EFOYFBOLXA.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\DUUDTUBZFW.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\EEGWXUHVUG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\EEGWXUHVUG.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\EFOYFBOLXA.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\EFOYFBOLXA.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\EIVQSAOTAQ.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\GIGIYTFFYT.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\NVWZAPQSQL\EIVQSAOTAQ.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\NVWZAPQSQL\NVWZAPQSQL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\NVWZAPQSQL\PALRGUCVEH.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\NVWZAPQSQL\TQDFJHPUIU.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\NVWZAPQSQL\ZIPXYXWIOY.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\PALRGUCVEH.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\PIVFAGEAAV.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\PIVFAGEAAV\BNAGMGSPLO.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\PIVFAGEAAV\EEGWXUHVUG.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\PIVFAGEAAV\NVWZAPQSQL.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\PIVFAGEAAV\SQSJKEBWDT.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\SQSJKEBWDT.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\SQSJKEBWDT\EFOYFBOLXA.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\SQSJKEBWDT\GIGIYTFFYT.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\SQSJKEBWDT\PALRGUCVEH.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\SQSJKEBWDT\SQSJKEBWDT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\TQDFJHPUIU.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\ZGGKNSUKOP.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\ZIPXYXWIOY.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Desktop\desktop.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\BJZFPPWAPT.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\BNAGMGSPLO.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\BNAGMGSPLO.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\BNAGMGSPLO\BJZFPPWAPT.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\BNAGMGSPLO\BNAGMGSPLO.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\BNAGMGSPLO\DUUDTUBZFW.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\BNAGMGSPLO\EEGWXUHVUG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\BNAGMGSPLO\EFOYFBOLXA.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\DUUDTUBZFW.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\EEGWXUHVUG.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\EEGWXUHVUG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\EFOYFBOLXA.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\EFOYFBOLXA.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\EIVQSAOTAQ.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\GIGIYTFFYT.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\My Music\desktop.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\My Pictures\Camera Roll\desktop.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\My Pictures\Saved Pictures\desktop.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\My Pictures\desktop.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\My Videos\desktop.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\NVWZAPQSQL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\NVWZAPQSQL.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\NVWZAPQSQL\EIVQSAOTAQ.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\NVWZAPQSQL\NVWZAPQSQL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\NVWZAPQSQL\PALRGUCVEH.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\NVWZAPQSQL\TQDFJHPUIU.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\NVWZAPQSQL\ZIPXYXWIOY.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\PALRGUCVEH.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\PALRGUCVEH.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\PIVFAGEAAV.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\PIVFAGEAAV\BNAGMGSPLO.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\PIVFAGEAAV\EEGWXUHVUG.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\PIVFAGEAAV\NVWZAPQSQL.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\PIVFAGEAAV\PIVFAGEAAV.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\PIVFAGEAAV\SQSJKEBWDT.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\SQSJKEBWDT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\SQSJKEBWDT.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\SQSJKEBWDT\EFOYFBOLXA.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\SQSJKEBWDT\GIGIYTFFYT.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\SQSJKEBWDT\PALRGUCVEH.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\SQSJKEBWDT\SQSJKEBWDT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\SQSJKEBWDT\ZGGKNSUKOP.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\TQDFJHPUIU.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\ZGGKNSUKOP.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\ZIPXYXWIOY.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Documents\desktop.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\BJZFPPWAPT.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\BNAGMGSPLO.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\BNAGMGSPLO.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\DUUDTUBZFW.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\EEGWXUHVUG.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\EEGWXUHVUG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\EFOYFBOLXA.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\EFOYFBOLXA.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\EIVQSAOTAQ.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\GIGIYTFFYT.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\NVWZAPQSQL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\NVWZAPQSQL.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\PALRGUCVEH.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\PALRGUCVEH.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\PIVFAGEAAV.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\SQSJKEBWDT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\SQSJKEBWDT.pdf
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\TQDFJHPUIU.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\ZGGKNSUKOP.jpg
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\ZIPXYXWIOY.png
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Downloads\desktop.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Pictures\Camera Roll\desktop.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Pictures\Saved Pictures\desktop.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\Grabber\DRIVE-C\Users\user\Pictures\desktop.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\System\Desktop.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\System\Process.txt
ASCII text
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\System\ProductKey.txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\System\ScanningNetworks.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\System\Systeminfos.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\d0d733758fee67ef1333def91e74c359\user@226533_en-CH\System\Windows.txt
ASCII text
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 11:26:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 11:26:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 11:26:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 11:26:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 16 11:26:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
There are 144 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\HTZ4az17lj.exe
"C:\Users\user\Desktop\HTZ4az17lj.exe"
malicious
C:\Windows\System32\schtasks.exe
"schtasks.exe" /query /TN WinTask
malicious
C:\Windows\System32\schtasks.exe
"schtasks.exe" /query /TN WinTask
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn WinTask /tr C:\Users\user\AppData\Local\Temp\uuhbr0xg.h20.exe /sc minute /mo 5
malicious
C:\Users\user\AppData\Local\Temp\uuhbr0xg.h20.exe
C:\Users\user\AppData\Local\Temp\uuhbr0xg.h20.exe
malicious
C:\Windows\System32\cmd.exe
"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profile
malicious
C:\Windows\System32\cmd.exe
"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
malicious
C:\Windows\System32\netsh.exe
netsh wlan show networks mode=bssid
malicious
C:\Windows\System32\schtasks.exe
"schtasks.exe" /query /TN WinTask
malicious
C:\Windows\System32\schtasks.exe
"schtasks.exe" /query /TN WinTask
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmpB2A0.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmpB2A0.tmp.bat
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\AppData\Local\Temp\p.html
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1952,i,15724053339194688930,12067670684069383472,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\findstr.exe
findstr All
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\AppData\Local\Temp\p.html
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1980,i,12318035346667771544,14619284953737115548,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\taskkill.exe
TaskKill /F /IM 6044
C:\Windows\System32\timeout.exe
Timeout /T 2 /Nobreak
There are 20 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://app.turboboy.co/users
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://facturanet.todo1.com/CO/login_CO.aspx
unknown
https://www.woodsmithlibrary.com/account/password/reset/complete/
unknown
https://duckduckgo.com/ac/?q=
unknown
https://id.tigo.com/openid/login/signup_form
unknown
https://www.vova.com/es/login.php
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
https://www.miclaroapp.com.co/
unknown
https://www.pinterest.es/
unknown
https://portal.vectric.com/register/9W7jITU6QgSBfrIhb_0UOw
unknown
https://www.vectorart3d.com/store/
unknown
https://es.pinterest.com/pin/329325791483354616/
unknown
https://api.telegram.org/bot5444063802:AAFQNx_Hpow_i63EVEkfhenefbLEXQSAzbY/sendDocument?chat_id=1126
unknown
http://www.woodsmithvideotips.com/home
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.directv.com.co/Midirectv/home/LogIn
unknown
http://icanhazip.com/
104.16.185.241
http://128.199H
unknown
https://shop.site-link.com/peachtreeorder/custinfo.asp
unknown
https://www.tumblr.com/register
unknown
http://www.woodsmithshop.com/account/login/
unknown
https://es.scribd.com/doc/181228937/Manual-de-Ayuda-Vectric-Aspire-3-5
unknown
https://www.dropbox.com/s/ppd4vfvmii0jnt8/Cam%20lever%20clamps%20for%20worksurfaces%20with%20dog%20h
unknown
https://todoenartes.com/register
unknown
https://www.wwgoa.com/checkout/
unknown
https://www.themakersmob.com/register/resend
unknown
https://www.mercadolibre.com.co/registration-buy
unknown
file:///C:/Users/user/AppData/Local/Temp/p.html
https://reset.vova.com/
unknown
https://www.paypal.com/signin
unknown
http://128.199.113.162/XtfcshEgt/upwawsfrg.php?zd=1
128.199.113.162
https://es.scribd.com/doc/116279436/Tabla-Conversion-Completa
unknown
https://www.gef.com.co/tienda/UserRegistrationForm
unknown
https://elmejorperfume.com/checkout/
unknown
https://github.com/LimerBoy/StormKitty
unknown
https://github.com/join
unknown
https://registration.mercadolibre.com.co/registration-buy
unknown
https://www.hponline.com.co/account/login
unknown
https://www.buildsomething.com/sign-up
unknown
https://www.ptreeorder.com/custinfo.asp
unknown
http://softwaredepotdesk.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.instructables.com/id/DIY-Chess-Board/
unknown
https://api.mylnikov.org
unknown
http://128.199.113.162/XtfcshEgt/upwawsfrg.php
128.199.113.162
http://icanhazip.com
unknown
https://woodsmithlibrary.foxycart.com/checkout
unknown
https://webmail.telmex.net.co/app/s/LoginPage.asp
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://api.telegram.org/botp
unknown
https://www.dominos.com.co/pages/order/payment
unknown
http://128.199.113.162
unknown
http://www.woodsmithvideoedition.com/account/login/
unknown
https://pse.todo1.com/PseBancolombia/control/ElectronicPayment.bancolombia
unknown
https://account.formula1.com/
unknown
https://www.woodsmithvideoedition.com/account/login/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot5444063802:AAFQNx_Hpow_i63EVEkfhenefbLEXQSAzbY/sendDocument?chat_id=1126217452
149.154.167.220
https://micorreo.telmex.com/
unknown
https://api.mylnikov.org/geolocation/wifi?v=1.1&bssid=00:50:56:a7:21:15
104.21.44.66
https://co.pinterest.com/
unknown
http://softdepotsupport.com/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.pinterest.com/smmmokin14/woodworking-tips-and-jigs/
unknown
https://www.ecosia.org/newtab/
unknown
https://www.paypal.com/webapps/hermes
unknown
https://wsvideoedition.foxycart.com/checkout
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.banggood.com/login.html
unknown
https://www.mundialdetornillos.com/index.php
unknown
https://secure.totalav.com/createlogin
unknown
https://www.woodsmithplans.com/account/
unknown
http://www.instructables.com/id/DIY-Chess-Board/
unknown
http://es.scribd.com/doc/181228937/Manual-de-Ayuda-Vectric-Aspire-3-5
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://webmail.claro.net.co/app/s/LoginPage.asp
unknown
https://www.incrementaltools.com/one-page-checkout.asp
unknown
https://www.pdffiller.com/en/login.htm
unknown
https://www.woodsmithshop.com/account/login/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.panamericana.com.co/registro/inicio
unknown
https://www.iclaro.com.hn/app/s/LoginPage.asp
unknown
http://www.woodsmithlibrary.com/login/
unknown
https://portal.vectric.com/registerNew
unknown
https://resultados.lch.com.co/ingresar
unknown
https://support.mozilla.org
unknown
http://api.telegram.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.directv.com.co/midirectv/ingresar
unknown
https://www.spotify.com/co/signup/
unknown
https://www.amazon.com/ap/forgotpassword
unknown
https://www.instagram.com/accounts/signup/
unknown
https://www.amazon.com/ap/signin
unknown
https://www.grammarly.com/signup
unknown
There are 86 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
229.116.3.0.in-addr.arpa
unknown
malicious
www.google.com
142.250.105.99
api.mylnikov.org
104.21.44.66
api.telegram.org
149.154.167.220
icanhazip.com
104.16.185.241

IPs

IP
Domain
Country
Malicious
104.21.44.66
api.mylnikov.org
United States
142.250.105.99
www.google.com
United States
192.168.2.5
unknown
unknown
149.154.167.220
api.telegram.org
United Kingdom
128.199.113.162
unknown
United Kingdom
239.255.255.250
unknown
Reserved
104.16.185.241
icanhazip.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HTZ4az17lj_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HTZ4az17lj_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HTZ4az17lj_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HTZ4az17lj_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HTZ4az17lj_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HTZ4az17lj_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HTZ4az17lj_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HTZ4az17lj_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HTZ4az17lj_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HTZ4az17lj_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HTZ4az17lj_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HTZ4az17lj_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HTZ4az17lj_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HTZ4az17lj_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uuhbr0xg_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uuhbr0xg_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uuhbr0xg_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uuhbr0xg_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uuhbr0xg_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uuhbr0xg_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uuhbr0xg_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uuhbr0xg_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uuhbr0xg_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uuhbr0xg_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uuhbr0xg_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uuhbr0xg_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uuhbr0xg_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uuhbr0xg_RASMANCS
FileDirectory
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
29580001000
trusted library allocation
page read and write
malicious
8DEDB8F000
unkown
page read and write
295805E1000
trusted library allocation
page read and write
7FF848E02000
trusted library allocation
page read and write
F2FDDFE000
stack
page read and write
1A610DD8000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
295F70D0000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
2958056C000
trusted library allocation
page read and write
295F7324000
heap
page read and write
29580487000
trusted library allocation
page read and write
29580709000
trusted library allocation
page read and write
2B694065000
heap
page read and write
1DB68BA7000
heap
page read and write
29580878000
trusted library allocation
page read and write
24D69DB0000
heap
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
295F74F5000
heap
page read and write
19C63790000
heap
page read and write
295F7888000
heap
page read and write
29580902000
trusted library allocation
page read and write
29591648000
trusted library allocation
page read and write
295F72D4000
heap
page read and write
5E0577F000
stack
page read and write
235B51F8000
heap
page read and write
F282BFC000
stack
page read and write
F28007E000
stack
page read and write
7FF848E10000
trusted library allocation
page read and write
1DB68E20000
heap
page read and write
295F7995000
heap
page read and write
29591206000
trusted library allocation
page read and write
295F5065000
heap
page read and write
29591B75000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
24D69EC8000
heap
page read and write
295805F5000
trusted library allocation
page read and write
295F6A00000
heap
page read and write
29591641000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
295807EB000
trusted library allocation
page read and write
24D23480000
heap
page read and write
295F4CC0000
heap
page read and write
295806E0000
trusted library allocation
page read and write
295F7850000
heap
page read and write
295803A0000
trusted library allocation
page read and write
295F5060000
heap
page read and write
295F4C30000
unkown
page readonly
2959172F000
trusted library allocation
page read and write
295910DE000
trusted library allocation
page read and write
29591BA3000
trusted library allocation
page read and write
295808EE000
trusted library allocation
page read and write
2959166F000
trusted library allocation
page read and write
295808D5000
trusted library allocation
page read and write
295910EE000
trusted library allocation
page read and write
29580808000
trusted library allocation
page read and write
295F4D01000
heap
page read and write
295805C7000
trusted library allocation
page read and write
2958084A000
trusted library allocation
page read and write
1DB68B70000
heap
page read and write
29591BD6000
trusted library allocation
page read and write
295F798E000
heap
page read and write
295805F8000
trusted library allocation
page read and write
29580440000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
295910FE000
trusted library allocation
page read and write
256F14F0000
heap
page read and write
2568026C000
trusted library allocation
page read and write
295F72AF000
heap
page read and write
1DB68B7B000
heap
page read and write
295F4D2C000
heap
page read and write
F2FF9FD000
stack
page read and write
2959118E000
trusted library allocation
page read and write
256F1520000
heap
page read and write
256F39B6000
heap
page read and write
29580761000
trusted library allocation
page read and write
F28003F000
stack
page read and write
F280BFA000
stack
page read and write
256F15A0000
heap
page read and write
2B693CF7000
heap
page read and write
295F73B9000
heap
page read and write
29580584000
trusted library allocation
page read and write
223A8D25000
heap
page read and write
295808C1000
trusted library allocation
page read and write
295F77F0000
trusted library allocation
page read and write
2959163B000
trusted library allocation
page read and write
2958049B000
trusted library allocation
page read and write
295F71D0000
heap
page read and write
7FF848E1B000
trusted library allocation
page execute and read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1A612750000
heap
page read and write
24D23755000
heap
page read and write
1DB68B95000
heap
page read and write
29591717000
trusted library allocation
page read and write
256F3EC0000
heap
page read and write
1A610DA0000
heap
page read and write
295F71EB000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
19C636E2000
heap
page read and write
A9D69FD000
stack
page read and write
295F4DD0000
heap
page read and write
638267F000
stack
page read and write
2958035C000
trusted library allocation
page read and write
2958060C000
trusted library allocation
page read and write
256F3AC6000
heap
page read and write
29591B80000
trusted library allocation
page read and write
24D23750000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
8DEDE7F000
stack
page read and write
25690001000
trusted library allocation
page read and write
2959164E000
trusted library allocation
page read and write
F281BFE000
stack
page read and write
295910D4000
trusted library allocation
page read and write
295F79A1000
heap
page read and write
F2817FA000
stack
page read and write
295F4CC6000
heap
page read and write
29580375000
trusted library allocation
page read and write
295F7610000
trusted library section
page read and write
28A861BA000
heap
page read and write
295F7680000
heap
page read and write
295F74C0000
heap
page read and write
1E2A4610000
heap
page read and write
1E2A49C0000
heap
page read and write
29591176000
trusted library allocation
page read and write
2958042C000
trusted library allocation
page read and write
95A9D9F000
stack
page read and write
7FF848EA6000
trusted library allocation
page read and write
28A861B0000
heap
page read and write
2958078F000
trusted library allocation
page read and write
295808BC000
trusted library allocation
page read and write
7FF848EA6000
trusted library allocation
page read and write
295808A8000
trusted library allocation
page read and write
256F15DF000
heap
page read and write
223A8B3A000
heap
page read and write
19C636CD000
heap
page read and write
235B54C0000
heap
page read and write
1DB68E25000
heap
page read and write
1E2A4640000
heap
page read and write
295807A9000
trusted library allocation
page read and write
24D23488000
heap
page read and write
29580471000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
295F4D38000
heap
page read and write
256F3ECC000
heap
page read and write
2959123E000
trusted library allocation
page read and write
2959165F000
trusted library allocation
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
7FF848FF4000
trusted library allocation
page read and write
1DB68B10000
heap
page read and write
256F1885000
heap
page read and write
2958088F000
trusted library allocation
page read and write
223A8B30000
heap
page read and write
29580693000
trusted library allocation
page read and write
F2FC9FE000
stack
page read and write
7FF848FDD000
trusted library allocation
page read and write
2958035E000
trusted library allocation
page read and write
295803CE000
trusted library allocation
page read and write
295804E3000
trusted library allocation
page read and write
295915FD000
trusted library allocation
page read and write
19C636CE000
heap
page read and write
24D69E90000
heap
page read and write
295806F2000
trusted library allocation
page read and write
295910E6000
trusted library allocation
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
295F4F83000
trusted library allocation
page read and write
29591634000
trusted library allocation
page read and write
F280FF2000
stack
page read and write
29580836000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
295804FA000
trusted library allocation
page read and write
19C636B6000
heap
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
29580555000
trusted library allocation
page read and write
24D6A1B0000
heap
page read and write
295800F4000
trusted library allocation
page read and write
A9D65FE000
stack
page read and write
19C63690000
heap
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
29591B57000
trusted library allocation
page read and write
256F1570000
heap
page read and write
29591B67000
trusted library allocation
page read and write
1DB68E30000
heap
page read and write
2958031A000
trusted library allocation
page read and write
2958084D000
trusted library allocation
page read and write
29591787000
trusted library allocation
page read and write
19C636D1000
heap
page read and write
29580639000
trusted library allocation
page read and write
F2FD1FE000
stack
page read and write
2959171F000
trusted library allocation
page read and write
7FF421630000
trusted library allocation
page execute and read and write
2958081F000
trusted library allocation
page read and write
1A610DD0000
heap
page read and write
295F7243000
heap
page read and write
29580552000
trusted library allocation
page read and write
29591BC9000
trusted library allocation
page read and write
25690011000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
295F4FB3000
heap
page execute and read and write
2B693CD0000
heap
page read and write
295F738E000
heap
page read and write
256F39D8000
heap
page read and write
295915E6000
trusted library allocation
page read and write
295F4EF0000
heap
page read and write
25680288000
trusted library allocation
page read and write
F2FD9FE000
stack
page read and write
F2FE1FE000
stack
page read and write
25680336000
trusted library allocation
page read and write
7FF848E02000
trusted library allocation
page read and write
2958059C000
trusted library allocation
page read and write
29580650000
trusted library allocation
page read and write
295911A6000
trusted library allocation
page read and write
256F15CA000
heap
page read and write
29580331000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
1E2A49C5000
heap
page read and write
295910CE000
trusted library allocation
page read and write
29591687000
trusted library allocation
page read and write
24D23660000
heap
page read and write
24D23580000
heap
page read and write
29580348000
trusted library allocation
page read and write
A9D39F3000
stack
page read and write
295F74D0000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
29591106000
trusted library allocation
page read and write
29580905000
trusted library allocation
page read and write
2958087B000
trusted library allocation
page read and write
29591B70000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
E1CED7E000
stack
page read and write
A9D6DFD000
stack
page read and write
223A8B10000
heap
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
295807BD000
trusted library allocation
page read and write
29580415000
trusted library allocation
page read and write
29580778000
trusted library allocation
page read and write
29580372000
trusted library allocation
page read and write
256F1575000
heap
page read and write
F2FEDFF000
stack
page read and write
638238F000
unkown
page read and write
998BCFE000
unkown
page read and write
29591B9D000
trusted library allocation
page read and write
4F86EFC000
stack
page read and write
19C6369A000
heap
page read and write
2959160F000
trusted library allocation
page read and write
223A8B00000
heap
page read and write
295915D0000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
19C638C5000
heap
page read and write
295911AE000
trusted library allocation
page read and write
29591126000
trusted library allocation
page read and write
2569000D000
trusted library allocation
page read and write
295F739B000
heap
page read and write
295800E9000
trusted library allocation
page read and write
223A8D00000
heap
page read and write
295F4EB0000
heap
page read and write
256F3BC0000
heap
page read and write
2B693EE0000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
1A612825000
heap
page read and write
223A8B38000
heap
page read and write
29580413000
trusted library allocation
page read and write
256F1540000
heap
page read and write
29591BAB000
trusted library allocation
page read and write
295808A5000
trusted library allocation
page read and write
256801F0000
trusted library allocation
page read and write
256F3BB0000
heap
page read and write
4F86FFF000
unkown
page read and write
29580891000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
295807A6000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
29580803000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
29580443000
trusted library allocation
page read and write
1DB68B40000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
29591B64000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
EEF3D1C000
stack
page read and write
295803FC000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
25680001000
trusted library allocation
page read and write
256F1880000
heap
page read and write
256F3160000
heap
page read and write
29591B94000
trusted library allocation
page read and write
5E056FF000
unkown
page read and write
C896C7C000
stack
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
29591727000
trusted library allocation
page read and write
295800EC000
trusted library allocation
page read and write
A9D61FE000
stack
page read and write
1E2A46D8000
heap
page read and write
295806DA000
trusted library allocation
page read and write
7FF84900C000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
28A862B0000
heap
page read and write
295F730E000
heap
page read and write
295804F7000
trusted library allocation
page read and write
5E0567B000
stack
page read and write
256F15E2000
heap
page read and write
EEF3D9F000
stack
page read and write
998BDFF000
stack
page read and write
95AA07F000
stack
page read and write
295804B2000
trusted library allocation
page read and write
295F77D0000
heap
page execute and read and write
1E2A46F2000
heap
page read and write
28A86190000
heap
page read and write
295916F7000
trusted library allocation
page read and write
28A860B0000
heap
page read and write
29591BC7000
trusted library allocation
page read and write
F2FF5FD000
stack
page read and write
256F15D0000
heap
page read and write
29580833000
trusted library allocation
page read and write
2958038C000
trusted library allocation
page read and write
295806C2000
trusted library allocation
page read and write
256F160B000
heap
page read and write
235B51F0000
heap
page read and write
29580345000
trusted library allocation
page read and write
28A86440000
heap
page read and write
29591088000
trusted library allocation
page read and write
2B693CFA000
heap
page read and write
2959003D000
trusted library allocation
page read and write
2958060E000
trusted library allocation
page read and write
1E2A46D0000
heap
page read and write
29591656000
trusted library allocation
page read and write
295F768C000
heap
page read and write
29591B7B000
trusted library allocation
page read and write
256F15AC000
heap
page read and write
29580429000
trusted library allocation
page read and write
295F6A40000
trusted library allocation
page read and write
A9D51FE000
stack
page read and write
256F3320000
trusted library allocation
page read and write
7FF848E1B000
trusted library allocation
page execute and read and write
2568028E000
trusted library allocation
page read and write
7FF848F99000
trusted library allocation
page read and write
C896CFF000
unkown
page read and write
2958074A000
trusted library allocation
page read and write
F2FF1FE000
stack
page read and write
295806CE000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
A9D79FB000
stack
page read and write
295F799F000
heap
page read and write
295F4F80000
trusted library allocation
page read and write
28A861B8000
heap
page read and write
295F72A5000
heap
page read and write
95A9D1C000
stack
page read and write
A9D41FE000
stack
page read and write
E1CEC7C000
stack
page read and write
7FF848FF0000
trusted library allocation
page read and write
2958069B000
trusted library allocation
page read and write
19C63580000
heap
page read and write
295F4C32000
unkown
page readonly
295805B3000
trusted library allocation
page read and write
295F6811000
heap
page read and write
F281FF9000
stack
page read and write
295807D7000
trusted library allocation
page read and write
295F7264000
heap
page read and write
29580485000
trusted library allocation
page read and write
235B54C5000
heap
page read and write
29591B50000
trusted library allocation
page read and write
2958063C000
trusted library allocation
page read and write
A9D45FE000
stack
page read and write
1DB68B20000
heap
page read and write
295804E0000
trusted library allocation
page read and write
A9D4DFE000
stack
page read and write
295F4D2F000
heap
page read and write
2958077B000
trusted library allocation
page read and write
29580524000
trusted library allocation
page read and write
29580569000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
2958074D000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
256F1790000
trusted library allocation
page read and write
295806EC000
trusted library allocation
page read and write
F2FC5F3000
stack
page read and write
7FF848E00000
trusted library allocation
page read and write
256801EE000
trusted library allocation
page read and write
E1CECFF000
stack
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
7FF848FA0000
trusted library allocation
page read and write
295F72B5000
heap
page read and write
29591BA5000
trusted library allocation
page read and write
2B694060000
heap
page read and write
25680054000
trusted library allocation
page read and write
29580702000
trusted library allocation
page read and write
29591B5D000
trusted library allocation
page read and write
235B51B0000
heap
page read and write
295916A7000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
256F188D000
heap
page read and write
295805B0000
trusted library allocation
page read and write
29591B87000
trusted library allocation
page read and write
295F73BD000
heap
page read and write
295F72BC000
heap
page read and write
256F15A6000
heap
page read and write
29580764000
trusted library allocation
page read and write
256F3170000
heap
page read and write
F2823FE000
stack
page read and write
295804CC000
trusted library allocation
page read and write
8DEDB0B000
stack
page read and write
2958050E000
trusted library allocation
page read and write
25680052000
trusted library allocation
page read and write
235B50B0000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
2958053E000
trusted library allocation
page read and write
295806A9000
trusted library allocation
page read and write
29591625000
trusted library allocation
page read and write
295802F0000
trusted library allocation
page read and write
EEF407F000
stack
page read and write
29591B72000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
295F71B6000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
256801F2000
trusted library allocation
page read and write
295803B7000
trusted library allocation
page read and write
A9D3DFE000
stack
page read and write
2959004A000
trusted library allocation
page read and write
29580864000
trusted library allocation
page read and write
29590001000
trusted library allocation
page read and write
256F3A15000
heap
page read and write
19C636BC000
heap
page read and write
24D69FC0000
heap
page read and write
4CBE38C000
stack
page read and write
1A610D90000
heap
page read and write
295F4F40000
trusted library allocation
page read and write
29580622000
trusted library allocation
page read and write
24D6A1B5000
heap
page read and write
295F75D0000
trusted library section
page read and write
F2FCDFE000
stack
page read and write
29590044000
trusted library allocation
page read and write
29580705000
trusted library allocation
page read and write
F2FE5FC000
stack
page read and write
295803E5000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
295F4D04000
heap
page read and write
295806C8000
trusted library allocation
page read and write
29580580000
trusted library allocation
page read and write
295803D1000
trusted library allocation
page read and write
295803BA000
trusted library allocation
page read and write
F2827FD000
stack
page read and write
F2FD5FD000
stack
page read and write
295807EF000
trusted library allocation
page read and write
295F4ED0000
heap
page read and write
235B5190000
heap
page read and write
295F69F0000
trusted library section
page read and write
29580389000
trusted library allocation
page read and write
29580625000
trusted library allocation
page read and write
2958053B000
trusted library allocation
page read and write
19C63660000
heap
page read and write
A9D55FE000
stack
page read and write
295803E8000
trusted library allocation
page read and write
295806E6000
trusted library allocation
page read and write
29590038000
trusted library allocation
page read and write
2959167F000
trusted library allocation
page read and write
638230C000
stack
page read and write
C896D7F000
stack
page read and write
29591B6D000
trusted library allocation
page read and write
2958071D000
trusted library allocation
page read and write
295917BF000
trusted library allocation
page read and write
295F72F6000
heap
page read and write
295804C9000
trusted library allocation
page read and write
256F3037000
heap
page read and write
F2807FB000
stack
page read and write
F2FE9FD000
stack
page read and write
2958045A000
trusted library allocation
page read and write
19C638C0000
heap
page read and write
256F1770000
trusted library allocation
page read and write
4CBE67F000
stack
page read and write
A9D49FC000
stack
page read and write
295F4FB0000
heap
page execute and read and write
4CBE6FF000
stack
page read and write
256F32E0000
heap
page execute and read and write
28A86445000
heap
page read and write
29591196000
trusted library allocation
page read and write
295807C0000
trusted library allocation
page read and write
29580510000
trusted library allocation
page read and write
295808D8000
trusted library allocation
page read and write
295806BA000
trusted library allocation
page read and write
223A8D20000
heap
page read and write
295F78BB000
heap
page read and write
295F7935000
heap
page read and write
295807D4000
trusted library allocation
page read and write
1DB68BA9000
heap
page read and write
2568049F000
trusted library allocation
page read and write
29580736000
trusted library allocation
page read and write
998B94B000
stack
page read and write
2B693EC0000
heap
page read and write
29580457000
trusted library allocation
page read and write
295F74E0000
heap
page read and write
29580792000
trusted library allocation
page read and write
F282FFB000
stack
page read and write
295F4F75000
heap
page read and write
295800F8000
trusted library allocation
page read and write
29580720000
trusted library allocation
page read and write
29591B8D000
trusted library allocation
page read and write
19C636B4000
heap
page read and write
4F870FF000
stack
page read and write
256F1500000
heap
page read and write
295808EC000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
29580527000
trusted library allocation
page read and write
19C637B0000
heap
page read and write
29580919000
trusted library allocation
page read and write
1E2A4620000
heap
page read and write
F2813FD000
stack
page read and write
24D23680000
heap
page read and write
2959170F000
trusted library allocation
page read and write
256F3CF0000
heap
page read and write
2958049E000
trusted library allocation
page read and write
2958046E000
trusted library allocation
page read and write
2958032E000
trusted library allocation
page read and write
256F1850000
heap
page execute and read and write
29580861000
trusted library allocation
page read and write
1A612820000
heap
page read and write
2959000D000
trusted library allocation
page read and write
256F1610000
heap
page read and write
A9D5DFD000
stack
page read and write
24D69EC0000
heap
page read and write
256805DF000
trusted library allocation
page read and write
295F4F70000
heap
page read and write
295F725B000
heap
page read and write
29591B97000
trusted library allocation
page read and write
295F4F60000
trusted library allocation
page read and write
295F4CCC000
heap
page read and write
29591BA0000
trusted library allocation
page read and write
295806D4000
trusted library allocation
page read and write
29591667000
trusted library allocation
page read and write
29580598000
trusted library allocation
page read and write
295F69B0000
heap
page execute and read and write
7FF848E0A000
trusted library allocation
page read and write
295804B5000
trusted library allocation
page read and write
256F39B0000
heap
page read and write
29580734000
trusted library allocation
page read and write
19C636E1000
heap
page read and write
2B693CF0000
heap
page read and write
2959119E000
trusted library allocation
page read and write
2958081C000
trusted library allocation
page read and write
295803A3000
trusted library allocation
page read and write
There are 528 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
file:///C:/Users/user/AppData/Local/Temp/p.html