Loading ...

Play interactive tourEdit tour

Analysis Report Ue0N2amgcH

Overview

General Information

Sample Name:Ue0N2amgcH (renamed file extension from none to exe)
Analysis ID:381781
MD5:ccb2db4a8a284f62db7002be470ac542
SHA1:b2bdb5ed1ff743117cdf8500a498e247febbb6ec
SHA256:4fb04b099a37aeae2f58685b8fb08bca298f8f68d5dfc45ceb9fa398e9f109ea
Tags:zeus1
Infos:

Most interesting Screenshot:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
Allocates memory in foreign processes
Changes memory attributes in foreign processes to executable or writable
Contains functionality to change the desktop window for a process (likely to hide graphical interactions)
Creates an undocumented autostart registry key
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider

Classification

Startup

  • System is w10x64
  • Ue0N2amgcH.exe (PID: 6080 cmdline: 'C:\Users\user\Desktop\Ue0N2amgcH.exe' MD5: CCB2DB4A8A284F62DB7002BE470AC542)
    • winlogon.exe (PID: 560 cmdline: MD5: F9017F2DC455AD373DF036F5817A8870)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Windows Processes Suspicious Parent DirectoryShow sources
Source: Process startedAuthor: vburov: Data: Command: , CommandLine: , CommandLine|base64offset|contains: , Image: C:\Windows\System32\winlogon.exe, NewProcessName: C:\Windows\System32\winlogon.exe, OriginalFileName: C:\Windows\System32\winlogon.exe, ParentCommandLine: 'C:\Users\user\Desktop\Ue0N2amgcH.exe' , ParentImage: C:\Users\user\Desktop\Ue0N2amgcH.exe, ParentProcessId: 6080, ProcessCommandLine: , ProcessId: 560

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus / Scanner detection for submitted sampleShow sources
Source: Ue0N2amgcH.exeAvira: detected
Antivirus detection for dropped fileShow sources
Source: C:\Windows\SysWOW64\sdra64.exeAvira: detection malicious, Label: TR/Dropper.Gen
Multi AV Scanner detection for submitted fileShow sources
Source: Ue0N2amgcH.exeVirustotal: Detection: 90%Perma Link
Source: Ue0N2amgcH.exeReversingLabs: Detection: 100%
Machine Learning detection for dropped fileShow sources
Source: C:\Windows\SysWOW64\sdra64.exeJoe Sandbox ML: detected
Machine Learning detection for sampleShow sources
Source: Ue0N2amgcH.exeJoe Sandbox ML: detected
Source: 0.1.Ue0N2amgcH.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen3
Source: 0.0.Ue0N2amgcH.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_0040DE73 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,
Source: Ue0N2amgcH.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_0040A077 PathCombineW,FindFirstFileW,PathMatchSpecW,PathCombineW,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_00411039 FindFirstFileW,FindClose,FindFirstFileW,FindClose,CreateMutexW,MoveFileExW,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_0040F89A PathCombineW,FindFirstFileW,PathCombineW,PathCombineW,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_004040B8 PathCombineW,FindFirstFileW,PathCombineW,WaitForSingleObject,RtlEnterCriticalSection,PathMatchSpecW,PathCombineW,wnsprintfW,WaitForSingleObject,RtlLeaveCriticalSection,Sleep,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_00406EBD ExpandEnvironmentStringsW,FindFirstFileW,PathRemoveFileSpecW,PathCombineW,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_0040B44D RtlAllocateHeap,CreateEventW,InternetQueryOptionA,InternetSetStatusCallback,InternetSetOptionA,InternetReadFileExA,GetLastError,DispatchMessageW,PeekMessageW,MsgWaitForMultipleObjects,ResetEvent,InternetSetOptionA,InternetSetStatusCallback,CloseHandle,InternetQueryOptionA,InternetCrackUrlA,GetSystemTime,wnsprintfW,GetSystemTime,InternetQueryOptionA,GetUrlCacheEntryInfoW,RtlEnterCriticalSection,RtlLeaveCriticalSection,
Source: Ue0N2amgcH.exe, 00000000.00000002.464238365.00000000023F3000.00000004.00000040.sdmpString found in binary or memory: https://onlineeast#.bankofamerica.com/cgi-bin/ias/
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_0040554F GetClipboardData,GlobalFix,GlobalUnWire,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_004056B3 GetTickCount,GetCurrentProcessId,wnsprintfW,GetKeyState,GetKeyState,GetKeyboardState,ToUnicode,WideCharToMultiByte,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_00406C0D NtQueryInformationProcess,CreateToolhelp32Snapshot,Thread32First,Thread32Next,CloseHandle,NtCreateThread,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_0040528A NtQueryDirectoryFile,NtQueryObject,lstrcmpiW,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_00409697 CreateFileW,NtQueryObject,lstrcpyW,CloseHandle,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_00409CF9 GetProcAddress,LoadLibraryA,GetProcAddress,FreeLibrary,GetForegroundWindow,GetWindowThreadProcessId,OpenProcess,OpenProcessToken,CloseHandle,DuplicateTokenEx,LoadLibraryA,GetProcAddress,GetProcAddress,CreateProcessAsUserW,CloseHandle,CloseHandle,CreateProcessW,CloseHandle,CloseHandle,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_0040A16B ExitWindowsEx,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeFile created: C:\Windows\SysWOW64\sdra64.exeJump to behavior
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_00412014
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_0040DFED
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_0040DD80
Source: Ue0N2amgcH.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
Source: Ue0N2amgcH.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: sdra64.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: mal100.evad.winEXE@1/2@0/0
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_00403DAD CertOpenSystemStoreW,PFXExportCertStore,PFXExportCertStore,GetSystemTime,wnsprintfW,CertDuplicateCertificateContext,CertDeleteCRLFromStore,CertEnumCertificatesInStore,CertCloseStore,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_0040F0FC OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,FindCloseChangeNotification,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_00405808 CreateToolhelp32Snapshot,Process32FirstW,lstrcmpiW,Process32NextW,FindCloseChangeNotification,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMutant created: \Sessions\1\BaseNamedObjects\_AVIRA_21099
Source: Ue0N2amgcH.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: Ue0N2amgcH.exeVirustotal: Detection: 90%
Source: Ue0N2amgcH.exeReversingLabs: Detection: 100%
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeFile read: C:\Users\user\Desktop\Ue0N2amgcH.exeJump to behavior

Data Obfuscation:

barindex
Detected unpacking (changes PE section rights)Show sources
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeUnpacked PE file: 0.2.Ue0N2amgcH.exe.400000.0.unpack .text:ER;.rdata:R;.data:W; vs .text:ER;.data:W;.reloc:R;.data1:W;
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_004093CD LoadLibraryA,GetProcAddress,
Source: initial sampleStatic PE information: section name: .text entropy: 7.30372755134
Source: initial sampleStatic PE information: section name: .text entropy: 7.30372755134
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeFile created: C:\Windows\SysWOW64\sdra64.exeJump to dropped file
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeFile created: C:\Windows\SysWOW64\sdra64.exeJump to dropped file

Boot Survival:

barindex
Creates an undocumented autostart registry key Show sources
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon userinitJump to behavior
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_00407D61 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadCursorW,GetIconInfo,GetCursorPos,DrawIcon,lstrcmpiW,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeDropped PE file which has not been started: C:\Windows\SysWOW64\sdra64.exeJump to dropped file
Source: C:\Users\user\Desktop\Ue0N2amgcH.exe TID: 4168Thread sleep count: 193 > 30
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_0040A077 PathCombineW,FindFirstFileW,PathMatchSpecW,PathCombineW,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_00411039 FindFirstFileW,FindClose,FindFirstFileW,FindClose,CreateMutexW,MoveFileExW,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_0040F89A PathCombineW,FindFirstFileW,PathCombineW,PathCombineW,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_004040B8 PathCombineW,FindFirstFileW,PathCombineW,WaitForSingleObject,RtlEnterCriticalSection,PathMatchSpecW,PathCombineW,wnsprintfW,WaitForSingleObject,RtlLeaveCriticalSection,Sleep,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_00406EBD ExpandEnvironmentStringsW,FindFirstFileW,PathRemoveFileSpecW,PathCombineW,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeProcess information queried: ProcessInformation
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_00405171 LdrGetProcedureAddress,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_004093CD LoadLibraryA,GetProcAddress,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_00409475 HeapCreate,GetProcessHeap,RtlAllocateHeap,GetCurrentProcessId,IsBadHugeReadPtr,GetUserDefaultUILanguage,GetUserNameW,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeProcess token adjusted: Debug

HIPS / PFW / Operating System Protection Evasion:

barindex
Allocates memory in foreign processesShow sources
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 400000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 400000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 401000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 412000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 414000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 416000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C940000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C940000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C941000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C952000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C954000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C956000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C960000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C960000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C961000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C972000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C974000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C976000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C980000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C980000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C981000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C992000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C994000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C996000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C9A0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C9A0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C9A1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C9B2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C9B4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C9B6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C9C0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C9C0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C9C1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C9D2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C9D4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C9D6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C9E0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C9E0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C9E1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C9F2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C9F4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: C9F6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA00000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA00000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA01000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA12000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA14000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA16000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA20000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA20000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA21000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA32000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA34000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA36000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA40000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA40000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA41000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA52000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA54000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA56000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA60000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA60000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA61000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA72000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA74000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA76000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA80000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA80000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA81000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA92000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA94000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CA96000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CAA0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CAA0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CAA1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CAB2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CAB4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CAB6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CAC0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CAC0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CAC1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CAD2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CAD4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CAD6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CAE0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CAE0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CAE1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CAF2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CAF4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CAF6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB00000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB00000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB01000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB12000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB14000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB16000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB20000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB20000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB21000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB32000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB34000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB36000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB40000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB40000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB41000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB52000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB54000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB56000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB60000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB60000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB61000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB72000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB74000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB76000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB80000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB80000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB81000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB92000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB94000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CB96000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CBA0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CBA0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CBA1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CBB2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CBB4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CBB6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CBC0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CBC0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CBC1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CBD2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CBD4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CBD6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CBE0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CBE0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CBE1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CBF2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CBF4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CBF6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC00000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC00000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC01000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC12000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC14000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC16000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC20000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC20000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC21000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC32000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC34000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC36000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC40000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC40000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC41000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC52000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC54000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC56000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC60000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC60000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC61000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC72000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC74000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC76000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC80000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC80000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC81000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC92000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC94000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CC96000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CCA0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CCA0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CCA1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CCB2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CCB4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CCB6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CCC0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CCC0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CCC1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CCD2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CCD4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CCD6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CCE0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CCE0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CCE1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CCF2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CCF4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CCF6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD00000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD00000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD01000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD12000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD14000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD16000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD20000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD20000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD21000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD32000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD34000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD36000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD40000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD40000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD41000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD52000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD54000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD56000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD60000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD60000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD61000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD72000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD74000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD76000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD80000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD80000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD81000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD92000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD94000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CD96000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CDA0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CDA0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CDA1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CDB2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CDB4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CDB6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CDC0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CDC0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CDC1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CDD2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CDD4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CDD6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CDE0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CDE0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CDE1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CDF2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CDF4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CDF6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE00000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE00000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE01000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE12000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE14000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE16000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE20000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE20000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE21000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE32000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE34000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE36000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE40000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE40000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE41000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE52000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE54000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE56000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE60000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE60000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE61000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE72000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE74000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE76000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE80000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE80000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE81000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE92000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE94000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CE96000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CEA0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CEA0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CEA1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CEB2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CEB4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CEB6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CEC0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CEC0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CEC1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CED2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CED4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CED6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CEE0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CEE0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CEE1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CEF2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CEF4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CEF6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF00000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF00000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF01000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF12000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF14000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF16000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF20000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF20000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF21000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF32000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF34000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF36000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF40000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF40000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF41000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF52000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF54000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF56000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF60000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF60000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF61000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF72000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF74000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF76000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF80000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF80000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF81000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF92000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF94000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CF96000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CFA0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CFA0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CFA1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CFB2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CFB4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CFB6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CFC0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CFC0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CFC1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CFD2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CFD4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CFD6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CFE0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CFE0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CFE1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CFF2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CFF4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: CFF6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D000000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D000000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D001000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D012000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D014000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D016000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D020000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D020000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D021000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D032000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D034000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D036000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D040000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D040000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D041000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D052000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D054000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D056000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D060000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D060000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D061000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D072000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D074000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D076000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D080000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D080000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D081000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D092000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D094000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D096000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D0A0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D0A0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D0A1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D0B2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D0B4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D0B6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D0C0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D0C0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D0C1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D0D2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D0D4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D0D6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D0E0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D0E0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D0E1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D0F2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D0F4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D0F6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D100000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D100000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D101000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D112000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D114000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D116000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D120000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D120000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D121000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D132000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D134000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D136000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D140000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D140000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D141000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D152000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D154000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D156000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D160000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D160000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D161000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D172000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D174000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D176000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D180000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D180000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D181000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D192000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D194000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D196000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D1A0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D1A0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D1A1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D1B2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D1B4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D1B6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D1C0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D1C0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D1C1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D1D2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D1D4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D1D6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D1E0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D1E0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D1E1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D1F2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D1F4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D1F6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D200000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D200000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D201000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D212000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D214000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D216000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D220000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D220000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D221000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D232000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D234000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D236000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D240000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D240000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D241000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D252000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D254000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D256000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D260000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D260000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D261000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D272000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D274000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D276000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D280000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D280000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D281000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D292000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D294000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D296000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D2A0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D2A0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D2A1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D2B2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D2B4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D2B6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D2C0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D2C0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D2C1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D2D2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D2D4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D2D6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D2E0000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D2E0000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D2E1000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D2F2000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D2F4000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D2F6000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D300000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D300000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D301000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D312000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D314000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D316000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D320000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D320000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D321000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D332000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D334000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D336000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D340000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D340000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D341000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D352000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D354000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D356000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D360000 protect: page no access
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D360000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D361000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D372000 protect: page read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory allocated: C:\Windows\System32\winlogon.exe base: D374000 protect: page read and write
Changes memory attributes in foreign processes to executable or writableShow sources
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: 400000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: 401000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: 412000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: 414000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: 416000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C940000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C941000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C952000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C954000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C956000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C960000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C961000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C972000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C974000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C976000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C980000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C981000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C992000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C994000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C996000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C9A0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C9A1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C9B2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C9B4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C9B6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C9C0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C9C1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C9D2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C9D4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C9D6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C9E0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C9E1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C9F2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C9F4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: C9F6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA00000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA01000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA12000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA14000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA16000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA20000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA21000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA32000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA34000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA36000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA40000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA41000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA52000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA54000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA56000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA60000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA61000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA72000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA74000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA76000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA80000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA81000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA92000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA94000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CA96000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CAA0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CAA1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CAB2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CAB4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CAB6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CAC0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CAC1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CAD2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CAD4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CAD6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CAE0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CAE1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CAF2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CAF4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CAF6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB00000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB01000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB12000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB14000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB16000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB20000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB21000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB32000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB34000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB36000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB40000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB41000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB52000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB54000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB56000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB60000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB61000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB72000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB74000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB76000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB80000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB81000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB92000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB94000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CB96000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CBA0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CBA1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CBB2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CBB4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CBB6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CBC0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CBC1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CBD2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CBD4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CBD6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CBE0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CBE1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CBF2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CBF4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CBF6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC00000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC01000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC12000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC14000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC16000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC20000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC21000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC32000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC34000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC36000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC40000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC41000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC52000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC54000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC56000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC60000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC61000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC72000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC74000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC76000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC80000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC81000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC92000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC94000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CC96000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CCA0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CCA1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CCB2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CCB4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CCB6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CCC0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CCC1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CCD2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CCD4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CCD6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CCE0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CCE1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CCF2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CCF4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CCF6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD00000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD01000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD12000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD14000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD16000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD20000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD21000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD32000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD34000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD36000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD40000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD41000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD52000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD54000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD56000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD60000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD61000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD72000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD74000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD76000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD80000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD81000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD92000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD94000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CD96000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CDA0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CDA1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CDB2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CDB4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CDB6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CDC0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CDC1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CDD2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CDD4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CDD6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CDE0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CDE1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CDF2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CDF4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CDF6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE00000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE01000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE12000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE14000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE16000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE20000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE21000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE32000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE34000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE36000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE40000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE41000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE52000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE54000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE56000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE60000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE61000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE72000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE74000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE76000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE80000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE81000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE92000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE94000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CE96000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CEA0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CEA1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CEB2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CEB4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CEB6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CEC0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CEC1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CED2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CED4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CED6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CEE0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CEE1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CEF2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CEF4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CEF6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF00000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF01000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF12000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF14000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF16000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF20000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF21000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF32000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF34000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF36000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF40000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF41000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF52000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF54000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF56000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF60000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF61000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF72000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF74000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF76000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF80000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF81000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF92000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF94000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CF96000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CFA0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CFA1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CFB2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CFB4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CFB6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CFC0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CFC1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CFD2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CFD4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CFD6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CFE0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CFE1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CFF2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CFF4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: CFF6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D000000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D001000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D012000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D014000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D016000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D020000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D021000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D032000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D034000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D036000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D040000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D041000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D052000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D054000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D056000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D060000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D061000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D072000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D074000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D076000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D080000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D081000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D092000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D094000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D096000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D0A0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D0A1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D0B2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D0B4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D0B6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D0C0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D0C1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D0D2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D0D4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D0D6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D0E0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D0E1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D0F2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D0F4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D0F6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D100000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D101000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D112000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D114000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D116000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D120000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D121000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D132000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D134000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D136000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D140000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D141000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D152000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D154000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D156000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D160000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D161000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D172000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D174000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D176000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D180000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D181000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D192000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D194000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D196000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D1A0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D1A1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D1B2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D1B4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D1B6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D1C0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D1C1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D1D2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D1D4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D1D6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D1E0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D1E1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D1F2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D1F4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D1F6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D200000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D201000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D212000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D214000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D216000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D220000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D221000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D232000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D234000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D236000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D240000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D241000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D252000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D254000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D256000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D260000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D261000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D272000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D274000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D276000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D280000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D281000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D292000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D294000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D296000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D2A0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D2A1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D2B2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D2B4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D2B6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D2C0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D2C1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D2D2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D2D4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D2D6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D2E0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D2E1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D2F2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D2F4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D2F6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D300000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D301000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D312000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D314000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D316000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D320000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D321000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D332000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D334000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D336000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D340000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D341000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D352000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D354000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D356000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D360000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D361000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D372000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D374000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D376000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D380000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D381000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D392000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D394000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D396000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D3A0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D3A1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D3B2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D3B4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D3B6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D3C0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D3C1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D3D2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D3D4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D3D6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D3E0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D3E1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D3F2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D3F4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D3F6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D400000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D401000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D412000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D414000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D416000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D420000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D421000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D432000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D434000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D436000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D440000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D441000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D452000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D454000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D456000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D460000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D461000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D472000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D474000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D476000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D480000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D481000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D492000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D494000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D496000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D4A0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D4A1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D4B2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D4B4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D4B6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D4C0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D4C1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D4D2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D4D4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D4D6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D4E0000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D4E1000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D4F2000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D4F4000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D4F6000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D500000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D501000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D512000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D514000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D516000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D520000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D521000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D532000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D534000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D536000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D540000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D541000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D552000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D554000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D556000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D560000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D561000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D572000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D574000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D576000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D580000 protect: page readonly
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D581000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D592000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D594000 protect: page execute and read and write
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory protected: C:\Windows\System32\winlogon.exe base: D596000 protect: page execute and read and write
Contains functionality to change the desktop window for a process (likely to hide graphical interactions)Show sources
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_00409EE6 OpenWindowStationA,SetProcessWindowStation,OpenDesktopA,SetThreadDesktop,CloseDesktop,CloseWindowStation,
Injects a PE file into a foreign processesShow sources
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C940000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C960000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C980000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C9A0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C9C0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C9E0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA00000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA20000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA40000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA60000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA80000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CAA0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CAC0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CAE0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB00000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB20000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB40000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB60000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB80000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CBA0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CBC0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CBE0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC00000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC20000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC40000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC60000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC80000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CCA0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CCC0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CCE0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD00000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD20000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD40000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD60000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD80000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CDA0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CDC0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CDE0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE00000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE20000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE40000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE60000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE80000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CEA0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CEC0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CEE0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF00000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF20000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF40000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF60000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF80000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CFA0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CFC0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CFE0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D000000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D020000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D040000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D060000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D080000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D0A0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D0C0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D0E0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D100000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D120000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D140000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D160000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D180000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D1A0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D1C0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D1E0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D200000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D220000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D240000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D260000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D280000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D2A0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D2C0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D2E0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D300000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D320000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D340000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D360000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D380000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D3A0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D3C0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D3E0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D400000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D420000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D440000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D460000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D480000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D4A0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D4C0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D4E0000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D500000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D520000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D540000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D560000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D580000 value starts with: 4D5A
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D5A0000 value starts with: 4D5A
Writes to foreign memory regionsShow sources
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: 400000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: 401000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: 412000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: 414000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: 416000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C940000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C941000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C952000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C954000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C956000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C960000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C961000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C972000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C974000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C976000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C980000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C981000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C992000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C994000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C996000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C9A0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C9A1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C9B2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C9B4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C9B6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C9C0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C9C1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C9D2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C9D4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C9D6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C9E0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C9E1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C9F2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C9F4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: C9F6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA00000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA01000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA12000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA14000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA16000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA20000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA21000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA32000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA34000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA36000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA40000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA41000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA52000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA54000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA56000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA60000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA61000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA72000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA74000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA76000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA80000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA81000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA92000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA94000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CA96000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CAA0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CAA1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CAB2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CAB4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CAB6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CAC0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CAC1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CAD2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CAD4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CAD6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CAE0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CAE1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CAF2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CAF4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CAF6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB00000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB01000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB12000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB14000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB16000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB20000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB21000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB32000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB34000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB36000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB40000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB41000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB52000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB54000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB56000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB60000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB61000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB72000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB74000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB76000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB80000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB81000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB92000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB94000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CB96000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CBA0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CBA1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CBB2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CBB4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CBB6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CBC0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CBC1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CBD2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CBD4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CBD6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CBE0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CBE1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CBF2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CBF4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CBF6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC00000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC01000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC12000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC14000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC16000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC20000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC21000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC32000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC34000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC36000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC40000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC41000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC52000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC54000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC56000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC60000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC61000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC72000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC74000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC76000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC80000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC81000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC92000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC94000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CC96000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CCA0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CCA1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CCB2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CCB4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CCB6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CCC0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CCC1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CCD2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CCD4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CCD6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CCE0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CCE1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CCF2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CCF4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CCF6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD00000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD01000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD12000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD14000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD16000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD20000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD21000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD32000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD34000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD36000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD40000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD41000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD52000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD54000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD56000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD60000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD61000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD72000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD74000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD76000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD80000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD81000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD92000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD94000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CD96000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CDA0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CDA1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CDB2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CDB4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CDB6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CDC0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CDC1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CDD2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CDD4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CDD6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CDE0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CDE1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CDF2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CDF4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CDF6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE00000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE01000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE12000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE14000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE16000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE20000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE21000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE32000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE34000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE36000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE40000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE41000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE52000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE54000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE56000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE60000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE61000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE72000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE74000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE76000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE80000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE81000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE92000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE94000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CE96000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CEA0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CEA1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CEB2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CEB4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CEB6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CEC0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CEC1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CED2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CED4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CED6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CEE0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CEE1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CEF2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CEF4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CEF6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF00000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF01000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF12000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF14000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF16000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF20000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF21000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF32000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF34000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF36000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF40000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF41000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF52000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF54000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF56000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF60000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF61000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF72000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF74000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF76000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF80000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF81000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF92000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF94000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CF96000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CFA0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CFA1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CFB2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CFB4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CFB6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CFC0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CFC1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CFD2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CFD4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CFD6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CFE0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CFE1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CFF2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CFF4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: CFF6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D000000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D001000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D012000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D014000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D016000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D020000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D021000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D032000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D034000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D036000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D040000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D041000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D052000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D054000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D056000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D060000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D061000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D072000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D074000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D076000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D080000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D081000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D092000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D094000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D096000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D0A0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D0A1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D0B2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D0B4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D0B6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D0C0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D0C1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D0D2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D0D4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D0D6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D0E0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D0E1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D0F2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D0F4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D0F6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D100000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D101000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D112000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D114000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D116000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D120000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D121000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D132000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D134000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D136000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D140000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D141000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D152000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D154000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D156000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D160000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D161000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D172000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D174000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D176000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D180000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D181000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D192000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D194000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D196000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D1A0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D1A1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D1B2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D1B4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D1B6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D1C0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D1C1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D1D2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D1D4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D1D6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D1E0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D1E1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D1F2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D1F4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D1F6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D200000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D201000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D212000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D214000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D216000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D220000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D221000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D232000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D234000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D236000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D240000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D241000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D252000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D254000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D256000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D260000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D261000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D272000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D274000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D276000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D280000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D281000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D292000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D294000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D296000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D2A0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D2A1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D2B2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D2B4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D2B6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D2C0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D2C1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D2D2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D2D4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D2D6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D2E0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D2E1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D2F2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D2F4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D2F6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D300000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D301000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D312000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D314000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D316000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D320000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D321000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D332000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D334000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D336000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D340000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D341000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D352000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D354000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D356000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D360000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D361000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D372000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D374000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D376000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D380000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D381000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D392000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D394000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D396000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D3A0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D3A1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D3B2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D3B4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D3B6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D3C0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D3C1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D3D2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D3D4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D3D6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D3E0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D3E1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D3F2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D3F4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D3F6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D400000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D401000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D412000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D414000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D416000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D420000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D421000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D432000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D434000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D436000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D440000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D441000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D452000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D454000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D456000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D460000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D461000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D472000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D474000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D476000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D480000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D481000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D492000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D494000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D496000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D4A0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D4A1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D4B2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D4B4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D4B6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D4C0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D4C1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D4D2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D4D4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D4D6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D4E0000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D4E1000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D4F2000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D4F4000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D4F6000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D500000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D501000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D512000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D514000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D516000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D520000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D521000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D532000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D534000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D536000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D540000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D541000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D552000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D554000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D556000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D560000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D561000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D572000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D574000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D576000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D580000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D581000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D592000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D594000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeMemory written: C:\Windows\System32\winlogon.exe base: D596000
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_004105E8 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,
Source: Ue0N2amgcH.exe, 00000000.00000002.463822693.0000000000D90000.00000002.00000001.sdmp, winlogon.exe, 00000002.00000000.198836928.000002388D3F0000.00000002.00000001.sdmpBinary or memory string: Program Manager
Source: Ue0N2amgcH.exe, 00000000.00000002.463822693.0000000000D90000.00000002.00000001.sdmp, winlogon.exe, 00000002.00000000.198836928.000002388D3F0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: Ue0N2amgcH.exe, 00000000.00000002.463822693.0000000000D90000.00000002.00000001.sdmp, winlogon.exe, 00000002.00000000.198836928.000002388D3F0000.00000002.00000001.sdmpBinary or memory string: Progman
Source: Ue0N2amgcH.exe, 00000000.00000002.463822693.0000000000D90000.00000002.00000001.sdmp, winlogon.exe, 00000002.00000000.198836928.000002388D3F0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_00409115 RtlAllocateHeap,CreateNamedPipeW,CreateEventW,CreateEventW,CloseHandle,CloseHandle,CloseHandle,WaitForSingleObject,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_0040B44D RtlAllocateHeap,CreateEventW,InternetQueryOptionA,InternetSetStatusCallback,InternetSetOptionA,InternetReadFileExA,GetLastError,DispatchMessageW,PeekMessageW,MsgWaitForMultipleObjects,ResetEvent,InternetSetOptionA,InternetSetStatusCallback,CloseHandle,InternetQueryOptionA,InternetCrackUrlA,GetSystemTime,wnsprintfW,GetSystemTime,InternetQueryOptionA,GetUrlCacheEntryInfoW,RtlEnterCriticalSection,RtlLeaveCriticalSection,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_00409475 HeapCreate,GetProcessHeap,RtlAllocateHeap,GetCurrentProcessId,IsBadHugeReadPtr,GetUserDefaultUILanguage,GetUserNameW,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_0040D054 GetTimeZoneInformation,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_004106B9 GetTickCount,GetVersionExW,GetUserDefaultUILanguage,GetModuleFileNameW,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_0040E457 socket,bind,closesocket,
Source: C:\Users\user\Desktop\Ue0N2amgcH.exeCode function: 0_2_0040E2D4 socket,bind,listen,closesocket,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1Native API1Valid Accounts1Valid Accounts1Masquerading2Input Capture11System Time Discovery2Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
Default AccountsScheduled Task/JobRegistry Run Keys / Startup Folder1Access Token Manipulation11Valid Accounts1LSASS MemorySecurity Software Discovery1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Application Shimming1Process Injection42Virtualization/Sandbox Evasion1Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Registry Run Keys / Startup Folder1Access Token Manipulation11NTDSProcess Discovery3Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptApplication Shimming1Process Injection42LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsInstall Root Certificate1DCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemSystem Information Discovery3Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
Ue0N2amgcH.exe90%VirustotalBrowse
Ue0N2amgcH.exe100%ReversingLabsWin32.Trojan.Zeus
Ue0N2amgcH.exe100%AviraTR/Crypt.ZPACK.Gen
Ue0N2amgcH.exe100%Joe Sandbox ML

Dropped Files

SourceDetectionScannerLabelLink
C:\Windows\SysWOW64\sdra64.exe100%AviraTR/Dropper.Gen
C:\Windows\SysWOW64\sdra64.exe100%Joe Sandbox ML

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
2.2.winlogon.exe.111a0000.580.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.d6a0000.108.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.11e80000.683.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.d1a0000.68.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.10c20000.536.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.d8a0000.124.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.11360000.594.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.fa60000.394.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.12600000.743.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.10760000.498.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.127c0000.757.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.d740000.113.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.f440000.345.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.12da0000.804.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.10fc0000.565.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.11780000.627.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.12d20000.800.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.d1c0000.69.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.124c0000.733.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.10800000.503.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.eaa0000.268.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.e060000.186.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.fae0000.398.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.100c0000.445.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.12ac0000.781.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.dfa0000.180.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.f260000.330.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.11ac0000.653.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.11180000.579.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.e5e0000.230.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.e480000.219.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.fa40000.393.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.11060000.570.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.dfe0000.182.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.fa80000.395.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.106c0000.493.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.11ce0000.670.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.e660000.234.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.e7c0000.245.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.11220000.584.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.ed20000.288.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.f920000.384.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.10de0000.550.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.fd20000.416.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.ebe0000.278.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.d5a0000.100.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.fb80000.403.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.11080000.571.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.11ea0000.684.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.efa0000.308.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.d2e0000.78.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.f420000.344.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.f540000.353.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.12a00000.775.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.12700000.751.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.12b40000.785.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.122a0000.716.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.f580000.355.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.e7e0000.246.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.11f20000.688.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.c960000.2.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.e360000.210.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.d960000.130.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.10160000.450.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.e6e0000.238.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.10da0000.548.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.f9e0000.390.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.f9a0000.388.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.db00000.143.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.11640000.617.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.10c00000.535.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.11920000.640.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.eac0000.269.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.10f20000.560.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.10e60000.554.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.cfe0000.54.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.ce40000.41.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.10620000.488.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.d040000.57.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.e9a0000.260.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.12360000.722.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.11c60000.666.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.10f60000.562.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.11140000.577.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.10960000.514.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.11b40000.657.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.ca00000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.102c0000.461.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.128e0000.766.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.d880000.123.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.11d60000.674.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.cbc0000.21.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.10720000.496.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.d7a0000.116.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.df20000.176.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.efe0000.310.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.10680000.491.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.114a0000.604.unpack100%AviraTR/Crypt.XPACK.GenDownload File
2.2.winlogon.exe.11ba0000.660.unpack100%AviraTR/Crypt.XPACK.GenDownload File

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
https://onlineeast#.bankofamerica.com/cgi-bin/ias/0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

No contacted domains info

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
https://onlineeast#.bankofamerica.com/cgi-bin/ias/Ue0N2amgcH.exe, 00000000.00000002.464238365.00000000023F3000.00000004.00000040.sdmpfalse
  • Avira URL Cloud: safe
low

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:381781
Start date:05.04.2021
Start time:02:57:32
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 6m 25s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:Ue0N2amgcH (renamed file extension from none to exe)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:27
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:1
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal100.evad.winEXE@1/2@0/0
EGA Information:Failed
HDC Information:
  • Successful, ratio: 98.7% (good quality ratio 93.4%)
  • Quality average: 83.9%
  • Quality standard deviation: 27.7%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
Warnings:
Show All
  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtWriteVirtualMemory calls found.

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\Windows\SysWOW64\sdra64.exe
Process:C:\Users\user\Desktop\Ue0N2amgcH.exe
File Type:PE32 executable (GUI) Intel 80386, for MS Windows
Category:modified
Size (bytes):439808
Entropy (8bit):7.486506470434463
Encrypted:false
SSDEEP:12288:tKLKS3ugwI5Z1BRzmWwP05WLNl6ZHkMR0xiDkAMf:tKLyg9vDRzmHP05Y6+iDkV
MD5:66E599A0E60235530CE34127717CBD69
SHA1:7E42442474AD8BAF2BD39EDBCD771728879194BF
SHA-256:6DFB5E87C7226012F130032F4F8F9B9A3C1193843A11F0C1418CA3654AD78A83
SHA-512:B7A0D723BD45E7037E1C53CC6E0FBC13906F3DDE598A9FCEAE8BA4057FD859B2416A4D37129568C306BE810E43D2FB5644EF66656BAC1C8202C06056CE55F245
Malicious:true
Antivirus:
  • Antivirus: Avira, Detection: 100%
  • Antivirus: Joe Sandbox ML, Detection: 100%
Reputation:low
Preview: MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......77uQsV..sV..sV..V.).LV...0M.\V..`8..DV..mQ.."V...a...V.......V..j....V..RichsV..................................................................................PE..L...b..G.....................X....................@..........................p..................................................d....................................................................................................................text............................... ..`.rdata..............................@..@.data....P..........................@...........................................................................................................................................................................................................................................................................................................................................................
C:\Windows\SysWOW64\sdra64.exe:Zone.Identifier
Process:C:\Users\user\Desktop\Ue0N2amgcH.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):26
Entropy (8bit):3.95006375643621
Encrypted:false
SSDEEP:3:ggPYV:rPYV
MD5:187F488E27DB4AF347237FE461A079AD
SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
Malicious:true
Reputation:high, very likely benign file
Preview: [ZoneTransfer]....ZoneId=0

Static File Info

General

File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.18265444554369
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:Ue0N2amgcH.exe
File size:60928
MD5:ccb2db4a8a284f62db7002be470ac542
SHA1:b2bdb5ed1ff743117cdf8500a498e247febbb6ec
SHA256:4fb04b099a37aeae2f58685b8fb08bca298f8f68d5dfc45ceb9fa398e9f109ea
SHA512:1472e175170bb13173963b479cd90e304b58554908b27caa0e813c47eaf8f85ac3783ce9240cab70a2d6349840ea5069cf44196695f64fdddf1a68ba1ce68f29
SSDEEP:768:dtwaDQxDzRaaLoXfZ1yjpenwgb4uDAv5RhahPUCrjtrSfnnd8LCPCct8WL6pPlBa:puRuXzjh4k2gUgoPdNLYPba
File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......77uQsV..sV..sV..V.).LV...0M.\V..`8..DV..mQ.."V...a...V.......V..j....V..RichsV.................................................

File Icon

Icon Hash:00828e8e8686b000

Static PE Info

General

Entrypoint:0x4081b7
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
DLL Characteristics:TERMINAL_SERVER_AWARE
Time Stamp:0x47DCEE62 [Sun Mar 16 09:54:42 2008 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:41da589848b0ea7c32b44ddd22d7ade5

Entrypoint Preview

Instruction
call 00007FC730833680h
xor edi, edi
mov esi, dword ptr [esp]
add esp, 04h
retn 0024h
xor esi, esi
push 00000000h
push 00BC7A6Dh
push 00000004h
push 00000000h
push 00CCBE13h
push 00000007h
push 00000000h
call dword ptr [00410084h]
and eax, 000000FDh
xor edx, edx
mov dl, al
add esi, edx
cmp esi, 3FFCD967h
jnl 00007FC730833674h
jmp 00007FC730833643h
mov bl, dl
xor eax, eax
mov eax, 0000F607h
add eax, 00088C23h
sub eax, 00088B52h
mov ecx, edx
sub esp, 04h
mov dword ptr [esp], ecx
sub esp, 04h
mov dword ptr [esp], 00000040h
sub esp, 04h
mov dword ptr [esp], 00003000h
push eax
push 00000000h
call dword ptr [0041007Ch]
pop ecx
mov ecx, esi
mov esi, dword ptr [esp]
mov edi, eax
add esi, 00000103h
sub esp, 04h
mov dword ptr [esp], eax
mov ecx, 000001DBh
mov edx, CE0E523Dh
mov ebp, 00000000h
mov bh, byte ptr [esi]
add bh, dl
sub esi, 000B54D0h
add esi, 000B54D1h
add bh, bl
mov byte ptr [edi], bh
inc edi
sub esp, 04h
mov dword ptr [esp], edx
push ecx
push 00000000h
push 00000007h
push 00000005h
push 00000000h
push 00000000h
push 008AF758h

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x100f00x64.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x100000xa0.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xe1f00xe200False0.886874308628data7.30372755134IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rdata0x100000x5080x600False0.509765625data4.76117916035IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x110000x50cb0x200False0.087890625data0.483984725135IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ

Imports

DLLImport
ole32.dllStgOpenStorageOnILockBytes, ReadClassStg, CoQueryProxyBlanket, OleLoad, PropVariantClear, WriteStringStream, StgCreateDocfileOnILockBytes, CoRegisterMessageFilter, CoGetCallerTID, StgOpenStorage
SHLWAPI.dllUrlIsNoHistoryW, PathGetArgsW, PathMakePrettyW, wnsprintfW, SHRegSetUSValueA, PathRemoveArgsA, SHQueryInfoKeyA, StrToIntA, PathIsUNCA
KERNEL32.dllWriteConsoleW, CopyFileExW, GetAtomNameA, SetConsoleCursorPosition, OpenSemaphoreW, EnumCalendarInfoExA, IsBadHugeWritePtr, SetConsoleActiveScreenBuffer, CreateDirectoryExA, SetNamedPipeHandleState, VirtualAlloc, VirtualProtect, CreateFileA
ADVAPI32.dllBuildImpersonateExplicitAccessWithNameA, CryptGenRandom, CryptDestroyHash, SetEntriesInAuditListA

Network Behavior

No network behavior found

Code Manipulations

Statistics

Behavior

Click to jump to process

System Behavior

General

Start time:02:58:17
Start date:05/04/2021
Path:C:\Users\user\Desktop\Ue0N2amgcH.exe
Wow64 process (32bit):true
Commandline:'C:\Users\user\Desktop\Ue0N2amgcH.exe'
Imagebase:0x400000
File size:60928 bytes
MD5 hash:CCB2DB4A8A284F62DB7002BE470AC542
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:02:58:18
Start date:05/04/2021
Path:C:\Windows\System32\winlogon.exe
Wow64 process (32bit):false
Commandline:
Imagebase:0x7ff739090000
File size:677376 bytes
MD5 hash:F9017F2DC455AD373DF036F5817A8870
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

Disassembly

Code Analysis

Reset < >