IOC Report
2OmglUwx83.exe

loading gif

Files

File Path
Type
Category
Malicious
2OmglUwx83.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\0ca24ce5-0f24-4ca6-b87c-11cb41906c23\build2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt19.lst
PostScript document text
dropped
malicious
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache.bin
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\UrlBlock\urlblock_637194112741176080.bin
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x0000000000000013.db
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x0000000000000015.db
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000007.db
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000008.db
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\ExplorerStartupLog_RunOnce.etl
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\build2[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Low\MSIMGSIZ.DAT
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Low\SmartScreenCache.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Shell\DefaultLayouts.xml
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\chrome_installer.log
data
dropped
malicious
C:\Users\user\AppData\Local\dc8ee5c2-8cfe-4224-95e9-01d5d6a62169\2OmglUwx83.exe
MS-DOS executable
dropped
malicious
C:\Users\user\AppData\Local\dc8ee5c2-8cfe-4224-95e9-01d5d6a62169\2OmglUwx83.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\Desktop\DVWHKMNFNN\NWTVCDUMOB.pdf
data
dropped
malicious
C:\Users\user\Desktop\WUTJSCBCFX.docx
data
dropped
malicious
C:\Users\user\Desktop\WUTJSCBCFX\CURQNKVOIX.jpg
data
dropped
malicious
C:\Users\user\Local Settings\Adobe\Acrobat\DC\AdobeSysFnt19.lst.vvyu (copy)
PostScript document text
dropped
malicious
C:\Users\user\Local Settings\Adobe\Acrobat\DC\UserCache.bin.vvyu (copy)
data
dropped
malicious
C:\Users\user\Local Settings\Microsoft\Internet Explorer\MSIMGSIZ.DAT.vvyu (copy)
data
dropped
malicious
C:\Users\user\Local Settings\Microsoft\Internet Explorer\UrlBlock\urlblock_637194112741176080.bin.vvyu (copy)
data
dropped
malicious
C:\Users\user\Local Settings\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x0000000000000013.db.vvyu (copy)
data
dropped
malicious
C:\Users\user\Local Settings\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x0000000000000015.db.vvyu (copy)
data
dropped
malicious
C:\Users\user\Local Settings\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000007.db.vvyu (copy)
data
dropped
malicious
C:\Users\user\Local Settings\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000008.db.vvyu (copy)
data
dropped
malicious
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\ExplorerStartupLog_RunOnce.etl.vvyu (copy)
data
dropped
malicious
C:\Users\user\Local Settings\Microsoft\Windows\Shell\DefaultLayouts.xml.vvyu (copy)
data
dropped
malicious
C:\Users\user\Local Settings\Temp\chrome_installer.log.vvyu (copy)
data
dropped
malicious
C:\Users\user\Local Settings\Temporary Internet Files\Low\MSIMGSIZ.DAT.vvyu (copy)
data
dropped
malicious
C:\Users\user\Local Settings\Temporary Internet Files\Low\SmartScreenCache.dat.vvyu (copy)
data
dropped
malicious
C:\Users\user\Local Settings\dc8ee5c2-8cfe-4224-95e9-01d5d6a62169\2OmglUwx83.exe.vvyu (copy)
MS-DOS executable
dropped
malicious
C:\_readme.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\05322493605623596985969059
SQLite 3.x database, last written using SQLite version 3032001
dropped
C:\ProgramData\26935466222163289633987941
SQLite 3.x database, last written using SQLite version 3032001
dropped
C:\ProgramData\57030713821379500194956248
SQLite 3.x database, last written using SQLite version 3032001
dropped
C:\ProgramData\71094135503925161979660642
SQLite 3.x database, last written using SQLite version 3032001
dropped
C:\ProgramData\74995908947202801370833703
SQLite 3.x database, last written using SQLite version 3032001
dropped
C:\ProgramData\87748271858601039393839930
SQLite 3.x database, last written using SQLite version 3032001
dropped
C:\SystemID\PersonalID.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt19.lst
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheRdr65536.dat
data
dropped
C:\Users\user\AppData\Local\Adobe\Color\ACECache11.lst
data
dropped
C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jcp
data
dropped
C:\Users\user\AppData\Local\Comms\UnistoreDB\USSres00001.jrs
data
dropped
C:\Users\user\AppData\Local\Comms\UnistoreDB\USSres00002.jrs
data
dropped
C:\Users\user\AppData\Local\Comms\UnistoreDB\USStmp.jtx
data
dropped
C:\Users\user\AppData\Local\ConnectedDevicesPlatform\CDPGlobalSettings.cdp
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-active.pma
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma
data
dropped
C:\Users\user\AppData\Local\IconCache.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\unarchiver.exe.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\NGenTask.exe.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\sdiagnhost.exe.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\ngen.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NGenTask.exe.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\ngen.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\IECompatData\iecompatdata.xml
data
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\VersionManager\versionlist.xml
data
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\brndlog.txt
data
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\ie4uinit-ClearIconCache.log
Little-endian UTF-16 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\ie4uinit-UserConfig.log
Little-endian UTF-16 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-black_scale-100.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-black_scale-125.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-black_scale-150.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-black_scale-200.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-black_scale-400.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-white_scale-100.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-white_scale-125.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-white_scale-150.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-white_scale-200.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-white_scale-400.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveMedTile.scale-100.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveMedTile.scale-125.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveMedTile.scale-150.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveMedTile.scale-200.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveMedTile.scale-400.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-black_scale-100.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-black_scale-125.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-black_scale-150.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-black_scale-200.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-black_scale-400.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-white_scale-100.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-white_scale-125.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-white_scale-150.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-white_scale-200.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-white_scale-400.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.scale-100.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.scale-125.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.scale-150.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.scale-200.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.scale-400.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\OneDrive.VisualElementsManifest.xml
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\Resources.pri
data
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\setup\ECSConfig.json
data
dropped
C:\Users\user\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5475cb191e478c39370a215b2da98a37e9dc813d.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\Vault\4BF4C442-9B8A-41A0-B380-DD4A704DDB28\Policy.vpol
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\1033\StructuredQuerySchema.bin
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\ActionCenterCache\windows-systemtoast-securityandmaintenance_29_0.png
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\cversions.1.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\cversions.3.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{278F5142-B905-4D30-88C9-B63C603DA134}.3.ver0x0000000000000001.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\ExplorerStartupLog.etl
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\iconcache_1280.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\iconcache_1920.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\iconcache_2560.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\iconcache_768.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\iconcache_96.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\iconcache_custom_stream.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\iconcache_exif.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\iconcache_sr.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\iconcache_wide.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\iconcache_wide_alternate.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_1280.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_16.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_1920.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_2560.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_768.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_96.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_custom_stream.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_exif.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_sr.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_wide.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_wide_alternate.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\get[1].htm
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\deprecated.cookie
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\UPPS\UPPS.bin
PDP-11 UNIX/RT ldp
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.chk
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V010000B.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V010000C.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V010000D.log
data
modified
C:\Users\user\AppData\Local\Temp\AdobeARM.log
data
dropped
C:\Users\user\AppData\Local\Temp\CR_14C6C.tmp\setup.exe
MS-DOS executable, MZ for MS-DOS
dropped
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
data
dropped
C:\Users\user\AppData\Local\Temp\tmpEAC.tmp
MS-DOS executable
dropped
C:\Users\user\AppData\Local\bowsakkdestx.txt
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Libraries\CameraRoll.library-ms
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Libraries\Documents.library-ms
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Libraries\Music.library-ms
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Libraries\Pictures.library-ms
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Libraries\Videos.library-ms
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Bluetooth File Transfer.LNK
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Desktop (create shortcut).DeskLink
data
dropped
C:\Users\user\Application Data\Microsoft\Windows\Libraries\CameraRoll.library-ms.vvyu (copy)
data
dropped
C:\Users\user\Application Data\Microsoft\Windows\Libraries\Documents.library-ms.vvyu (copy)
data
dropped
C:\Users\user\Application Data\Microsoft\Windows\Libraries\Music.library-ms.vvyu (copy)
data
dropped
C:\Users\user\Application Data\Microsoft\Windows\Libraries\Pictures.library-ms.vvyu (copy)
data
dropped
C:\Users\user\Application Data\Microsoft\Windows\Libraries\Videos.library-ms.vvyu (copy)
data
dropped
C:\Users\user\Cookies\deprecated.cookie.vvyu (copy)
data
dropped
C:\Users\user\Desktop\BPMLNOBVSB.pdf
data
dropped
C:\Users\user\Desktop\BPMLNOBVSB.pdf.vvyu (copy)
data
dropped
C:\Users\user\Desktop\CURQNKVOIX.jpg
data
dropped
C:\Users\user\Desktop\CURQNKVOIX.jpg.vvyu (copy)
data
dropped
C:\Users\user\Desktop\CURQNKVOIX.mp3
data
dropped
C:\Users\user\Desktop\CURQNKVOIX.mp3.vvyu (copy)
data
dropped
C:\Users\user\Desktop\DVWHKMNFNN.docx
data
dropped
C:\Users\user\Desktop\DVWHKMNFNN.docx.vvyu (copy)
data
dropped
C:\Users\user\Desktop\DVWHKMNFNN\DVWHKMNFNN.docx
data
dropped
C:\Users\user\Desktop\DVWHKMNFNN\DVWHKMNFNN.docx.vvyu (copy)
data
dropped
C:\Users\user\Desktop\DVWHKMNFNN\KZWFNRXYKI.mp3
data
dropped
C:\Users\user\Desktop\DVWHKMNFNN\KZWFNRXYKI.mp3.vvyu (copy)
data
dropped
C:\Users\user\Desktop\DVWHKMNFNN\LTKMYBSEYZ.xlsx
data
dropped
C:\Users\user\Desktop\DVWHKMNFNN\LTKMYBSEYZ.xlsx.vvyu (copy)
data
dropped
C:\Users\user\Desktop\DVWHKMNFNN\NWTVCDUMOB.pdf.vvyu (copy)
data
dropped
C:\Users\user\Desktop\DVWHKMNFNN\WUTJSCBCFX.jpg
data
dropped
C:\Users\user\Desktop\DVWHKMNFNN\WUTJSCBCFX.jpg.vvyu (copy)
data
dropped
C:\Users\user\Desktop\DVWHKMNFNN\YPSIACHYXW.png
data
dropped
C:\Users\user\Desktop\DVWHKMNFNN\YPSIACHYXW.png.vvyu (copy)
data
dropped
C:\Users\user\Desktop\JSDNGYCOWY.pdf
data
dropped
C:\Users\user\Desktop\JSDNGYCOWY.pdf.vvyu (copy)
data
dropped
C:\Users\user\Desktop\JSDNGYCOWY.xlsx
data
dropped
C:\Users\user\Desktop\JSDNGYCOWY.xlsx.vvyu (copy)
data
dropped
C:\Users\user\Desktop\KZWFNRXYKI.mp3
data
dropped
C:\Users\user\Desktop\KZWFNRXYKI.mp3.vvyu (copy)
data
dropped
C:\Users\user\Desktop\LTKMYBSEYZ.xlsx
data
dropped
C:\Users\user\Desktop\LTKMYBSEYZ.xlsx.vvyu (copy)
data
dropped
C:\Users\user\Desktop\MXPXCVPDVN.mp3
data
dropped
C:\Users\user\Desktop\MXPXCVPDVN.mp3.vvyu (copy)
data
dropped
C:\Users\user\Desktop\NIKHQAIQAU.jpg
data
dropped
C:\Users\user\Desktop\NIKHQAIQAU.jpg.vvyu (copy)
data
dropped
C:\Users\user\Desktop\NWTVCDUMOB.docx
data
dropped
C:\Users\user\Desktop\NWTVCDUMOB.docx.vvyu (copy)
data
dropped
C:\Users\user\Desktop\NWTVCDUMOB.pdf
data
dropped
C:\Users\user\Desktop\NWTVCDUMOB.pdf.vvyu (copy)
data
dropped
C:\Users\user\Desktop\NWTVCDUMOB\CURQNKVOIX.mp3
data
dropped
C:\Users\user\Desktop\NWTVCDUMOB\CURQNKVOIX.mp3.vvyu (copy)
data
dropped
C:\Users\user\Desktop\NWTVCDUMOB\JSDNGYCOWY.pdf
data
dropped
C:\Users\user\Desktop\NWTVCDUMOB\JSDNGYCOWY.pdf.vvyu (copy)
data
dropped
C:\Users\user\Desktop\NWTVCDUMOB\NIKHQAIQAU.jpg
data
dropped
C:\Users\user\Desktop\NWTVCDUMOB\NIKHQAIQAU.jpg.vvyu (copy)
data
dropped
C:\Users\user\Desktop\NWTVCDUMOB\NWTVCDUMOB.docx
data
dropped
C:\Users\user\Desktop\NWTVCDUMOB\NWTVCDUMOB.docx.vvyu (copy)
data
dropped
C:\Users\user\Desktop\NWTVCDUMOB\RAYHIWGKDI.png
data
dropped
C:\Users\user\Desktop\NWTVCDUMOB\RAYHIWGKDI.png.vvyu (copy)
data
dropped
C:\Users\user\Desktop\NWTVCDUMOB\YPSIACHYXW.xlsx
data
dropped
C:\Users\user\Desktop\NWTVCDUMOB\YPSIACHYXW.xlsx.vvyu (copy)
data
dropped
C:\Users\user\Desktop\RAYHIWGKDI.png
data
dropped
C:\Users\user\Desktop\RAYHIWGKDI.png.vvyu (copy)
data
dropped
C:\Users\user\Desktop\VAMYDFPUND.png
data
dropped
C:\Users\user\Desktop\VAMYDFPUND.png.vvyu (copy)
data
dropped
C:\Users\user\Desktop\WUTJSCBCFX.docx.vvyu (copy)
data
dropped
C:\Users\user\Desktop\WUTJSCBCFX.jpg
data
dropped
C:\Users\user\Desktop\WUTJSCBCFX.jpg.vvyu (copy)
data
dropped
C:\Users\user\Desktop\WUTJSCBCFX\BPMLNOBVSB.pdf
data
dropped
C:\Users\user\Desktop\WUTJSCBCFX\BPMLNOBVSB.pdf.vvyu (copy)
data
dropped
C:\Users\user\Desktop\WUTJSCBCFX\CURQNKVOIX.jpg.vvyu (copy)
data
dropped
C:\Users\user\Desktop\WUTJSCBCFX\JSDNGYCOWY.xlsx
data
dropped
C:\Users\user\Desktop\WUTJSCBCFX\JSDNGYCOWY.xlsx.vvyu (copy)
data
dropped
C:\Users\user\Desktop\WUTJSCBCFX\MXPXCVPDVN.mp3
data
dropped
C:\Users\user\Desktop\WUTJSCBCFX\MXPXCVPDVN.mp3.vvyu (copy)
data
dropped
C:\Users\user\Desktop\WUTJSCBCFX\VAMYDFPUND.png
data
dropped
C:\Users\user\Desktop\WUTJSCBCFX\VAMYDFPUND.png.vvyu (copy)
data
dropped
C:\Users\user\Desktop\WUTJSCBCFX\WUTJSCBCFX.docx
data
dropped
C:\Users\user\Desktop\WUTJSCBCFX\WUTJSCBCFX.docx.vvyu (copy)
data
dropped
C:\Users\user\Desktop\YPSIACHYXW.png
data
dropped
C:\Users\user\Desktop\YPSIACHYXW.png.vvyu (copy)
data
dropped
C:\Users\user\Desktop\YPSIACHYXW.xlsx
data
dropped
C:\Users\user\Desktop\YPSIACHYXW.xlsx.vvyu (copy)
data
dropped
C:\Users\user\Documents\BPMLNOBVSB.pdf
data
dropped
C:\Users\user\Documents\BPMLNOBVSB.pdf.vvyu (copy)
data
dropped
C:\Users\user\Documents\CURQNKVOIX.jpg
data
dropped
C:\Users\user\Documents\CURQNKVOIX.jpg.vvyu (copy)
data
dropped
C:\Users\user\Documents\CURQNKVOIX.mp3
data
dropped
C:\Users\user\Documents\CURQNKVOIX.mp3.vvyu (copy)
data
dropped
C:\Users\user\Documents\DVWHKMNFNN.docx
data
dropped
C:\Users\user\Documents\DVWHKMNFNN.docx.vvyu (copy)
data
dropped
C:\Users\user\Documents\DVWHKMNFNN\DVWHKMNFNN.docx
data
dropped
C:\Users\user\Documents\DVWHKMNFNN\DVWHKMNFNN.docx.vvyu (copy)
data
dropped
C:\Users\user\Documents\DVWHKMNFNN\KZWFNRXYKI.mp3
data
dropped
C:\Users\user\Documents\DVWHKMNFNN\KZWFNRXYKI.mp3.vvyu (copy)
data
dropped
C:\Users\user\Documents\DVWHKMNFNN\LTKMYBSEYZ.xlsx
data
dropped
C:\Users\user\Documents\DVWHKMNFNN\LTKMYBSEYZ.xlsx.vvyu (copy)
data
dropped
C:\Users\user\Documents\DVWHKMNFNN\NWTVCDUMOB.pdf
data
dropped
C:\Users\user\Documents\DVWHKMNFNN\NWTVCDUMOB.pdf.vvyu (copy)
data
dropped
C:\Users\user\Documents\DVWHKMNFNN\WUTJSCBCFX.jpg
data
dropped
C:\Users\user\Documents\DVWHKMNFNN\WUTJSCBCFX.jpg.vvyu (copy)
data
dropped
C:\Users\user\Documents\DVWHKMNFNN\YPSIACHYXW.png
data
dropped
C:\Users\user\Documents\DVWHKMNFNN\YPSIACHYXW.png.vvyu (copy)
data
dropped
C:\Users\user\Documents\JSDNGYCOWY.pdf
data
dropped
C:\Users\user\Documents\JSDNGYCOWY.pdf.vvyu (copy)
data
dropped
C:\Users\user\Documents\JSDNGYCOWY.xlsx
data
dropped
C:\Users\user\Documents\JSDNGYCOWY.xlsx.vvyu (copy)
data
dropped
C:\Users\user\Documents\KZWFNRXYKI.mp3
data
dropped
C:\Users\user\Documents\KZWFNRXYKI.mp3.vvyu (copy)
data
dropped
C:\Users\user\Documents\LTKMYBSEYZ.xlsx
data
dropped
C:\Users\user\Documents\LTKMYBSEYZ.xlsx.vvyu (copy)
data
dropped
C:\Users\user\Documents\MXPXCVPDVN.mp3
data
dropped
C:\Users\user\Documents\MXPXCVPDVN.mp3.vvyu (copy)
data
dropped
C:\Users\user\Documents\NIKHQAIQAU.jpg
data
dropped
C:\Users\user\Documents\NIKHQAIQAU.jpg.vvyu (copy)
data
dropped
C:\Users\user\Documents\NWTVCDUMOB.docx
data
dropped
C:\Users\user\Documents\NWTVCDUMOB.docx.vvyu (copy)
data
dropped
C:\Users\user\Documents\NWTVCDUMOB.pdf
data
dropped
C:\Users\user\Documents\NWTVCDUMOB.pdf.vvyu (copy)
data
dropped
C:\Users\user\Documents\NWTVCDUMOB\CURQNKVOIX.mp3
data
dropped
C:\Users\user\Documents\NWTVCDUMOB\CURQNKVOIX.mp3.vvyu (copy)
data
dropped
C:\Users\user\Documents\NWTVCDUMOB\JSDNGYCOWY.pdf
data
dropped
C:\Users\user\Documents\NWTVCDUMOB\JSDNGYCOWY.pdf.vvyu (copy)
data
dropped
C:\Users\user\Documents\NWTVCDUMOB\NIKHQAIQAU.jpg
data
dropped
C:\Users\user\Documents\NWTVCDUMOB\NIKHQAIQAU.jpg.vvyu (copy)
data
dropped
C:\Users\user\Documents\NWTVCDUMOB\NWTVCDUMOB.docx
data
dropped
C:\Users\user\Documents\NWTVCDUMOB\NWTVCDUMOB.docx.vvyu (copy)
data
dropped
C:\Users\user\Documents\NWTVCDUMOB\RAYHIWGKDI.png
data
dropped
C:\Users\user\Documents\NWTVCDUMOB\RAYHIWGKDI.png.vvyu (copy)
data
dropped
C:\Users\user\Documents\NWTVCDUMOB\YPSIACHYXW.xlsx
data
dropped
C:\Users\user\Documents\NWTVCDUMOB\YPSIACHYXW.xlsx.vvyu (copy)
data
dropped
C:\Users\user\Documents\RAYHIWGKDI.png
data
dropped
C:\Users\user\Documents\RAYHIWGKDI.png.vvyu (copy)
data
dropped
C:\Users\user\Documents\VAMYDFPUND.png
data
dropped
C:\Users\user\Documents\VAMYDFPUND.png.vvyu (copy)
data
dropped
C:\Users\user\Documents\WUTJSCBCFX.docx
data
dropped
C:\Users\user\Documents\WUTJSCBCFX.docx.vvyu (copy)
data
dropped
C:\Users\user\Documents\WUTJSCBCFX.jpg
data
dropped
C:\Users\user\Documents\WUTJSCBCFX.jpg.vvyu (copy)
data
dropped
C:\Users\user\Documents\WUTJSCBCFX\BPMLNOBVSB.pdf
data
dropped
C:\Users\user\Documents\WUTJSCBCFX\BPMLNOBVSB.pdf.vvyu (copy)
data
dropped
C:\Users\user\Documents\WUTJSCBCFX\CURQNKVOIX.jpg
data
dropped
C:\Users\user\Documents\WUTJSCBCFX\CURQNKVOIX.jpg.vvyu (copy)
data
dropped
C:\Users\user\Documents\WUTJSCBCFX\JSDNGYCOWY.xlsx
data
dropped
C:\Users\user\Documents\WUTJSCBCFX\JSDNGYCOWY.xlsx.vvyu (copy)
data
dropped
C:\Users\user\Documents\WUTJSCBCFX\MXPXCVPDVN.mp3
data
dropped
C:\Users\user\Documents\WUTJSCBCFX\MXPXCVPDVN.mp3.vvyu (copy)
data
dropped
C:\Users\user\Documents\WUTJSCBCFX\VAMYDFPUND.png
data
dropped
C:\Users\user\Documents\WUTJSCBCFX\VAMYDFPUND.png.vvyu (copy)
data
dropped
C:\Users\user\Documents\WUTJSCBCFX\WUTJSCBCFX.docx
data
dropped
C:\Users\user\Documents\WUTJSCBCFX\WUTJSCBCFX.docx.vvyu (copy)
data
dropped
C:\Users\user\Documents\YPSIACHYXW.png
data
dropped
C:\Users\user\Documents\YPSIACHYXW.png.vvyu (copy)
data
dropped
C:\Users\user\Documents\YPSIACHYXW.xlsx
data
dropped
C:\Users\user\Documents\YPSIACHYXW.xlsx.vvyu (copy)
data
dropped
C:\Users\user\Downloads\BPMLNOBVSB.pdf
data
dropped
C:\Users\user\Downloads\BPMLNOBVSB.pdf.vvyu (copy)
data
dropped
C:\Users\user\Downloads\CURQNKVOIX.jpg
data
dropped
C:\Users\user\Downloads\CURQNKVOIX.jpg.vvyu (copy)
data
dropped
C:\Users\user\Downloads\CURQNKVOIX.mp3
data
dropped
C:\Users\user\Downloads\CURQNKVOIX.mp3.vvyu (copy)
data
dropped
C:\Users\user\Downloads\DVWHKMNFNN.docx
data
dropped
C:\Users\user\Downloads\DVWHKMNFNN.docx.vvyu (copy)
data
dropped
C:\Users\user\Downloads\JSDNGYCOWY.mp3
data
dropped
C:\Users\user\Downloads\JSDNGYCOWY.mp3.vvyu (copy)
data
dropped
C:\Users\user\Downloads\JSDNGYCOWY.pdf
data
dropped
C:\Users\user\Downloads\JSDNGYCOWY.pdf.vvyu (copy)
data
dropped
C:\Users\user\Downloads\JSDNGYCOWY.xlsx
data
dropped
C:\Users\user\Downloads\JSDNGYCOWY.xlsx.vvyu (copy)
data
dropped
C:\Users\user\Downloads\KZWFNRXYKI.png
data
dropped
C:\Users\user\Downloads\KZWFNRXYKI.png.vvyu (copy)
data
dropped
C:\Users\user\Downloads\LTKMYBSEYZ.xlsx
data
dropped
C:\Users\user\Downloads\LTKMYBSEYZ.xlsx.vvyu (copy)
data
dropped
C:\Users\user\Downloads\MXPXCVPDVN.mp3
data
dropped
C:\Users\user\Downloads\MXPXCVPDVN.mp3.vvyu (copy)
data
dropped
C:\Users\user\Downloads\NIKHQAIQAU.jpg
data
dropped
C:\Users\user\Downloads\NIKHQAIQAU.jpg.vvyu (copy)
data
dropped
C:\Users\user\Downloads\NWTVCDUMOB.docx
data
dropped
C:\Users\user\Downloads\NWTVCDUMOB.docx.vvyu (copy)
data
dropped
C:\Users\user\Downloads\NWTVCDUMOB.pdf
data
dropped
C:\Users\user\Downloads\NWTVCDUMOB.pdf.vvyu (copy)
data
dropped
C:\Users\user\Downloads\RAYHIWGKDI.png
data
dropped
C:\Users\user\Downloads\RAYHIWGKDI.png.vvyu (copy)
data
dropped
C:\Users\user\Downloads\VAMYDFPUND.png
data
dropped
C:\Users\user\Downloads\VAMYDFPUND.png.vvyu (copy)
data
dropped
C:\Users\user\Downloads\WUTJSCBCFX.docx
data
dropped
C:\Users\user\Downloads\WUTJSCBCFX.docx.vvyu (copy)
data
dropped
C:\Users\user\Downloads\WUTJSCBCFX.jpg
data
dropped
C:\Users\user\Downloads\WUTJSCBCFX.jpg.vvyu (copy)
data
dropped
C:\Users\user\Downloads\YPSIACHYXW.xlsx
data
dropped
C:\Users\user\Downloads\YPSIACHYXW.xlsx.vvyu (copy)
data
dropped
C:\Users\user\Favorites\Amazon.url
data
dropped
C:\Users\user\Favorites\Amazon.url.vvyu (copy)
data
dropped
C:\Users\user\Favorites\Bing.url
data
dropped
C:\Users\user\Favorites\Bing.url.vvyu (copy)
data
dropped
C:\Users\user\Favorites\Facebook.url
data
dropped
C:\Users\user\Favorites\Facebook.url.vvyu (copy)
data
dropped
C:\Users\user\Favorites\Google.url
data
dropped
C:\Users\user\Favorites\Google.url.vvyu (copy)
data
dropped
C:\Users\user\Favorites\Live.url
data
dropped
C:\Users\user\Favorites\Live.url.vvyu (copy)
data
dropped
C:\Users\user\Favorites\NYTimes.url
data
dropped
C:\Users\user\Favorites\NYTimes.url.vvyu (copy)
data
dropped
C:\Users\user\Favorites\Reddit.url
data
dropped
C:\Users\user\Favorites\Reddit.url.vvyu (copy)
data
dropped
C:\Users\user\Favorites\Twitter.url
data
dropped
C:\Users\user\Favorites\Twitter.url.vvyu (copy)
data
dropped
C:\Users\user\Favorites\Wikipedia.url
data
dropped
C:\Users\user\Favorites\Wikipedia.url.vvyu (copy)
data
dropped
C:\Users\user\Favorites\Youtube.url
data
dropped
C:\Users\user\Favorites\Youtube.url.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Adobe\Acrobat\DC\AdobeCMapFnt19.lst.vvyu (copy)
PostScript document text
dropped
C:\Users\user\Local Settings\Adobe\Acrobat\DC\IconCacheRdr65536.dat.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Adobe\Color\ACECache11.lst.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Comms\UnistoreDB\USS.jcp.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Comms\UnistoreDB\USSres00001.jrs.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Comms\UnistoreDB\USSres00002.jrs.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Comms\UnistoreDB\USStmp.jtx.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\ConnectedDevicesPlatform\CDPGlobalSettings.cdp.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Google\Chrome\User Data\CrashpadMetrics-active.pma.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Google\Chrome\User Data\CrashpadMetrics.pma.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\IconCache.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\CLR_v2.0_32\UsageLogs\unarchiver.exe.log.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\CLR_v4.0\UsageLogs\NGenTask.exe.log.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\CLR_v4.0\UsageLogs\sdiagnhost.exe.log.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\CLR_v4.0\ngen.log.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\CLR_v4.0_32\UsageLogs\NGenTask.exe.log.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\CLR_v4.0_32\ngen.log.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Internet Explorer\IECompatData\iecompatdata.xml.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Internet Explorer\VersionManager\versionlist.xml.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Internet Explorer\brndlog.txt.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Internet Explorer\ie4uinit-ClearIconCache.log.vvyu (copy)
Little-endian UTF-16 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\Local Settings\Microsoft\Internet Explorer\ie4uinit-UserConfig.log.vvyu (copy)
Little-endian UTF-16 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-black_scale-100.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-black_scale-125.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-black_scale-150.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-black_scale-200.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-black_scale-400.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-white_scale-100.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-white_scale-125.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-white_scale-150.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-white_scale-200.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-white_scale-400.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveMedTile.scale-100.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveMedTile.scale-125.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveMedTile.scale-150.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveMedTile.scale-200.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveMedTile.scale-400.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-black_scale-100.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-black_scale-125.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-black_scale-150.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-black_scale-200.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-black_scale-400.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-white_scale-100.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-white_scale-125.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-white_scale-150.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-white_scale-200.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-white_scale-400.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.scale-100.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.scale-125.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.scale-150.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.scale-200.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.scale-400.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\OneDrive.VisualElementsManifest.xml.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\Resources.pri.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\OneDrive\setup\ECSConfig.json.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\PenWorkspace\DiscoverCacheData.dat.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\TokenBroker\Cache\5475cb191e478c39370a215b2da98a37e9dc813d.tbres.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Vault\4BF4C442-9B8A-41A0-B380-DD4A704DDB28\Policy.vpol.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\1033\StructuredQuerySchema.bin.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\ActionCenterCache\windows-systemtoast-securityandmaintenance_29_0.png.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Caches\cversions.1.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Caches\cversions.3.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Caches\{278F5142-B905-4D30-88C9-B63C603DA134}.3.ver0x0000000000000001.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\ExplorerStartupLog.etl.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\iconcache_1280.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\iconcache_1920.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\iconcache_2560.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\iconcache_768.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\iconcache_96.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\iconcache_custom_stream.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\iconcache_exif.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\iconcache_sr.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\iconcache_wide.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\iconcache_wide_alternate.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\thumbcache_1280.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\thumbcache_16.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\thumbcache_1920.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\thumbcache_2560.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\thumbcache_768.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\thumbcache_96.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\thumbcache_custom_stream.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\thumbcache_exif.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\thumbcache_sr.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\thumbcache_wide.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\Explorer\thumbcache_wide_alternate.db.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\UPPS\UPPS.bin.vvyu (copy)
PDP-11 UNIX/RT ldp
dropped
C:\Users\user\Local Settings\Microsoft\Windows\WebCache\V01.chk.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\WebCache\V010000B.log.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\WebCache\V010000C.log.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Microsoft\Windows\WebCache\V010000D.log.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Temp\AdobeARM.log.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Temp\CR_14C6C.tmp\setup.exe.vvyu (copy)
MS-DOS executable, MZ for MS-DOS
dropped
C:\Users\user\Local Settings\Temp\JavaDeployReg.log.vvyu (copy)
data
dropped
C:\Users\user\Local Settings\Temp\tmpEAC.tmp.vvyu (copy)
MS-DOS executable
dropped
C:\Users\user\Local Settings\bowsakkdestx.txt.vvyu (copy)
data
dropped
C:\Users\user\SendTo\Bluetooth File Transfer.LNK.vvyu (copy)
data
dropped
C:\Users\user\SendTo\Desktop (create shortcut).DeskLink.vvyu (copy)
data
dropped
C:\Users\user\_readme.txt
ASCII text, with CRLF line terminators
dropped
There are 438 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\2OmglUwx83.exe
"C:\Users\user\Desktop\2OmglUwx83.exe"
malicious
C:\Users\user\Desktop\2OmglUwx83.exe
"C:\Users\user\Desktop\2OmglUwx83.exe"
malicious
C:\Users\user\Desktop\2OmglUwx83.exe
"C:\Users\user\Desktop\2OmglUwx83.exe" --Admin IsNotAutoStart IsNotTask
malicious
C:\Users\user\AppData\Local\dc8ee5c2-8cfe-4224-95e9-01d5d6a62169\2OmglUwx83.exe
C:\Users\user\AppData\Local\dc8ee5c2-8cfe-4224-95e9-01d5d6a62169\2OmglUwx83.exe --Task
malicious
C:\Users\user\Desktop\2OmglUwx83.exe
"C:\Users\user\Desktop\2OmglUwx83.exe" --Admin IsNotAutoStart IsNotTask
malicious
C:\Users\user\AppData\Local\dc8ee5c2-8cfe-4224-95e9-01d5d6a62169\2OmglUwx83.exe
C:\Users\user\AppData\Local\dc8ee5c2-8cfe-4224-95e9-01d5d6a62169\2OmglUwx83.exe --Task
malicious
C:\Users\user\AppData\Local\dc8ee5c2-8cfe-4224-95e9-01d5d6a62169\2OmglUwx83.exe
"C:\Users\user\AppData\Local\dc8ee5c2-8cfe-4224-95e9-01d5d6a62169\2OmglUwx83.exe" --AutoStart
malicious
C:\Users\user\AppData\Local\dc8ee5c2-8cfe-4224-95e9-01d5d6a62169\2OmglUwx83.exe
"C:\Users\user\AppData\Local\dc8ee5c2-8cfe-4224-95e9-01d5d6a62169\2OmglUwx83.exe" --AutoStart
malicious
C:\Users\user\AppData\Local\0ca24ce5-0f24-4ca6-b87c-11cb41906c23\build2.exe
"C:\Users\user\AppData\Local\0ca24ce5-0f24-4ca6-b87c-11cb41906c23\build2.exe"
malicious
C:\Users\user\AppData\Local\0ca24ce5-0f24-4ca6-b87c-11cb41906c23\build2.exe
"C:\Users\user\AppData\Local\0ca24ce5-0f24-4ca6-b87c-11cb41906c23\build2.exe"
malicious
C:\Users\user\AppData\Local\dc8ee5c2-8cfe-4224-95e9-01d5d6a62169\2OmglUwx83.exe
"C:\Users\user\AppData\Local\dc8ee5c2-8cfe-4224-95e9-01d5d6a62169\2OmglUwx83.exe" --AutoStart
malicious
C:\Users\user\AppData\Local\dc8ee5c2-8cfe-4224-95e9-01d5d6a62169\2OmglUwx83.exe
"C:\Users\user\AppData\Local\dc8ee5c2-8cfe-4224-95e9-01d5d6a62169\2OmglUwx83.exe" --AutoStart
malicious
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\user\AppData\Local\dc8ee5c2-8cfe-4224-95e9-01d5d6a62169" /deny *S-1-1-0:(OI)(CI)(DE,DC)
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://rgyui.top/dl/build2.exe
151.251.24.5
malicious
http://acacaca.org/test2/get.php?pid=3C8DAB0A318E3BBE55D6418C454BF200&first=true
5.163.244.118
malicious
http://rgyui.top/dl/build2.exe$run
unknown
malicious
http://acacaca.org/files/1/build3.exe
5.163.244.118
malicious
http://acacaca.org/files/1/build3.exerun0d
unknown
malicious
https://we.tl/t-QsoSRIeA
unknown
malicious
https://we.tl/t-QsoSRIeAK6
unknown
malicious
http://acacaca.org/test2/get.php
malicious
http://acacaca.org/files/1/build3.exed5
unknown
malicious
http://rgyui.top/dl/build2.exerunb4e97Bx
unknown
malicious
http://rgyui.top/dl/build2.exe~
unknown
malicious
http://acacaca.org/files/1/build3.exe$run
unknown
malicious
https://api.2ip.ua/geo.jsonrO
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://t.me/
unknown
https://duckduckgo.com/ac/?q=
unknown
https://web.telegram.org
unknown
http://49.12.9.140:1080/2277399138.zipF
unknown
http://49.12.9.140:1080/2277399138.zipJ
unknown
http://www.amazon.com/
unknown
http://49.12.9.140:1080/1Y
unknown
http://www.twitter.com/
unknown
https://t.me/pegasusfly11
unknown
http://49.12.9.140:1080/)
unknown
http://www.openssl.org/support/faq.html
unknown
http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error
unknown
http://49.12.9.140/ppData
unknown
https://mas.to/
unknown
https://t.me/pegasusfly1
149.154.167.99
https://api.2ip.ua/n
unknown
http://49.12.9.140:1080/nS
unknown
http://49.12.9.140:1080/C
unknown
http://49.12.9.140:1080/517
49.12.9.140
http://www.reddit.com/
unknown
http://www.nytimes.com/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://49.12.9.140:1080;Dx66
unknown
http://49.12.9.140/rontdesk
unknown
https://t.me/pegasusfly1https://mas.to/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
unknown
http://49.12.9.140:1080/a
unknown
https://api.2ip.ua/geo.json
162.0.217.254
http://49.12.9.140:1080/n
unknown
http://49.12.9.140/r
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://t.me/pegasusfly1w
unknown
http://49.12.9.140:1080/2277399138.zip
49.12.9.140
http://www.youtube.com/
unknown
http://49.12.9.140:1080/2277399138.zipm
unknown
https://api.2ip.ua/J
unknown
http://49.12.9.140/
unknown
http://www.wikipedia.com/
unknown
http://www.live.com/
unknown
https://t.me/&
unknown
http://49.12.9.140:1080
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://t.me/pegasusfly17&A
unknown
http://49.12.9.140:1080/
49.12.9.140
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.google.com/
unknown
There are 51 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
rgyui.top
151.251.24.5
malicious
acacaca.org
5.163.244.118
malicious
t.me
149.154.167.99
api.2ip.ua
162.0.217.254

IPs

IP
Domain
Country
Malicious
151.251.24.5
rgyui.top
Bulgaria
malicious
5.163.244.118
acacaca.org
Saudi Arabia
malicious
192.168.2.1
unknown
unknown
49.12.9.140
unknown
Germany
162.0.217.254
api.2ip.ua
Canada
149.154.167.99
t.me
United Kingdom

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
SysHelper
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
SysHelper

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2210000
direct allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2290000
direct allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
21F0000
direct allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
22A0000
direct allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2340000
direct allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
27891000
trusted library allocation
page read and write
2F30000
direct allocation
page read and write
1F0000
trusted library allocation
page read and write
18AAA67F000
heap
page read and write
700000
heap
page read and write
610000
direct allocation
page read and write
612000
direct allocation
page read and write
1B0000
remote allocation
page read and write
610000
direct allocation
page read and write
2510000
heap
page read and write
B3E000
stack
page read and write
4E0000
unkown
page readonly
31D6000
trusted library allocation
page read and write
610000
direct allocation
page read and write
F5CE000
stack
page read and write
1B0000
remote allocation
page read and write
2F30000
direct allocation
page read and write
401000
unkown
page execute read
89D000
heap
page read and write
657000
heap
page read and write
2F30000
direct allocation
page read and write
310B4FF000
stack
page read and write
1F0000
trusted library allocation
page read and write
4C4000
unkown
page read and write
69A000
heap
page read and write
8BE000
stack
page read and write
2F30000
direct allocation
page read and write
625000
heap
page read and write
1A87A000
stack
page read and write
90B000
heap
page read and write
4E0000
unkown
page readonly
433000
unkown
page write copy
610000
direct allocation
page read and write
401000
unkown
page execute read
2F30000
direct allocation
page read and write
1F24B25E000
heap
page read and write
2F70000
remote allocation
page read and write
321A000
trusted library allocation
page read and write
433000
unkown
page write copy
2F30000
direct allocation
page read and write
52B000
remote allocation
page execute and read and write
400000
unkown
page readonly
6AF000
heap
page read and write
2C80000
heap
page read and write
2F30000
direct allocation
page read and write
52B000
remote allocation
page execute and read and write
30000
heap
page read and write
610000
direct allocation
page read and write
19E000
stack
page read and write
2F30000
direct allocation
page read and write
400000
unkown
page readonly
2CDE000
stack
page read and write
56E000
stack
page read and write
2F30000
direct allocation
page read and write
1F24B300000
heap
page read and write
31FA000
trusted library allocation
page read and write
AFF000
stack
page read and write
193000
stack
page read and write
28300000
heap
page read and write
2F30000
direct allocation
page read and write
2881A000
trusted library allocation
page read and write
1B0000
remote allocation
page read and write
279A1000
trusted library allocation
page read and write
B0E000
stack
page read and write
1B0000
remote allocation
page read and write
2F30000
direct allocation
page read and write
2F30000
direct allocation
page read and write
6C7000
heap
page read and write
4E0000
unkown
page readonly
2F30000
direct allocation
page read and write
31FB000
trusted library allocation
page read and write
7EF000
stack
page read and write
1B0000
remote allocation
page read and write
2F30000
direct allocation
page read and write
2F30000
direct allocation
page read and write
433000
unkown
page write copy
7AE000
heap
page read and write
3230000
heap
page read and write
2280000
heap
page read and write
15EF0113000
heap
page read and write
705000
heap
page read and write
2E30000
remote allocation
page read and write
29CF000
stack
page read and write
18AAA500000
trusted library allocation
page read and write
46A000
unkown
page readonly
620000
heap
page read and write
1B0000
remote allocation
page read and write
2F30000
direct allocation
page read and write
401000
unkown
page execute read
1A9BE000
stack
page read and write
196000
stack
page read and write
1B0000
remote allocation
page read and write
28AF000
stack
page read and write
6B3000
heap
page read and write
200E000
stack
page read and write
6C0000
heap
page read and write
2F30000
direct allocation
page read and write
1F24B060000
heap
page read and write
2B7D000
stack
page read and write
401000
unkown
page execute read
2F30000
direct allocation
page read and write
326B000
trusted library allocation
page read and write
1B0000
remote allocation
page read and write
22C0000
heap
page read and write
2F70000
heap
page read and write
9312000
trusted library allocation
page read and write
859000
heap
page read and write
310B57F000
stack
page read and write
68E000
stack
page read and write
431000
unkown
page execute read
6D0000
heap
page read and write
31C1000
trusted library allocation
page read and write
590000
heap
page read and write
27880000
trusted library allocation
page read and write
9920000
direct allocation
page read and write
15EF006E000
heap
page read and write
2F30000
direct allocation
page read and write
1F24B252000
heap
page read and write
400000
unkown
page readonly
2B3A000
stack
page read and write
15EF0055000
heap
page read and write
9C000
stack
page read and write
754000
heap
page read and write
193000
stack
page read and write
1B0000
remote allocation
page read and write
401000
unkown
page execute read
9C000
stack
page read and write
2F30000
direct allocation
page read and write
610000
direct allocation
page read and write
8B0000
heap
page read and write
2F30000
direct allocation
page read and write
5A7000
heap
page read and write
71A000
heap
page read and write
57E000
stack
page read and write
4E0000
unkown
page readonly
2F34000
direct allocation
page read and write
29E0000
heap
page read and write
2F30000
direct allocation
page read and write
8EF000
heap
page read and write
52B000
remote allocation
page execute and read and write
27794000
trusted library allocation
page read and write
9359000
trusted library allocation
page read and write
15EEFF30000
heap
page read and write
2490000
heap
page read and write
610000
direct allocation
page read and write
4DA000
unkown
page read and write
15EF0047000
heap
page read and write
2A0F000
stack
page read and write
AFF000
stack
page read and write
21FF7520000
trusted library allocation
page read and write
1B0000
remote allocation
page read and write
6BF000
heap
page read and write
9360000
trusted library allocation
page read and write
400000
unkown
page readonly
5B8000
heap
page read and write
4E0000
unkown
page readonly
B7E000
stack
page read and write
4E0000
unkown
page readonly
810000
heap
page read and write
31D0000
trusted library allocation
page read and write
1B0000
remote allocation
page read and write
2F30000
direct allocation
page read and write
27EA7000
trusted library allocation
page read and write
33C0000
unkown
page read and write
600000
heap
page read and write
4E0000
unkown
page readonly
400000
remote allocation
page execute and read and write
31AA000
stack
page read and write
304D000
stack
page read and write
6C7000
heap
page read and write
2A3D000
stack
page read and write
2360000
heap
page read and write
6096E000
direct allocation
page read and write
21FF66D0000
trusted library allocation
page read and write
15EF0108000
heap
page read and write
19E000
stack
page read and write
707000
heap
page read and write
433000
unkown
page write copy
1B0000
remote allocation
page read and write
2C8B000
stack
page read and write
1B0000
remote allocation
page read and write
3070000
remote allocation
page read and write
B60000
heap
page read and write
818000
heap
page read and write
27997000
trusted library allocation
page read and write
2F30000
direct allocation
page read and write
747000
heap
page read and write
8C0000
heap
page read and write
6BB000
heap
page read and write
8D2000
heap
page read and write
7AF000
heap
page read and write
730000
direct allocation
page read and write
30000
heap
page read and write
610000
direct allocation
page read and write
433000
unkown
page write copy
400000
unkown
page readonly
62B000
direct allocation
page read and write
2F30000
direct allocation
page read and write
8AE000
heap
page read and write
400000
remote allocation
page execute and read and write
540000
heap
page read and write
52B000
remote allocation
page execute and read and write
460000
heap
page read and write
610000
direct allocation
page read and write
31F3000
trusted library allocation
page read and write
26CD0000
trusted library allocation
page read and write
28CE000
stack
page read and write
4C4000
unkown
page read and write
19B000
stack
page read and write
2B7E000
stack
page read and write
20B0000
heap
page read and write
15EF0029000
heap
page read and write
610000
direct allocation
page read and write
401000
unkown
page execute read
2DF3B5B000
stack
page read and write
27793000
trusted library allocation
page read and write
1B0000
remote allocation
page read and write
610000
direct allocation
page read and write
1F24B27F000
heap
page read and write
2F70000
remote allocation
page read and write
6F5000
heap
page read and write
29FF000
stack
page read and write
23D0000
heap
page read and write
2F30000
direct allocation
page read and write
1B0000
remote allocation
page read and write
D2D19FF000
stack
page read and write
31FB000
trusted library allocation
page read and write
7AE000
heap
page read and write
310B47B000
stack
page read and write
6A0000
heap
page read and write
8C4000
heap
page read and write
2F30000
direct allocation
page read and write
707000
heap
page read and write
1B0000
remote allocation
page read and write
650000
heap
page read and write
400000
unkown
page readonly
433000
unkown
page write copy
4E0000
unkown
page readonly
2F70000
remote allocation
page read and write
1F24B29C000
heap
page read and write
2160000
heap
page read and write
2011000
trusted library allocation
page execute and read and write
52B000
remote allocation
page execute and read and write
6E0000
heap
page read and write
6D1000
heap
page read and write
21DF000
stack
page read and write
27790000
trusted library allocation
page read and write
6CC000
heap
page read and write
2F30000
direct allocation
page read and write
6B0000
heap
page read and write
2F32000
direct allocation
page read and write
400000
unkown
page readonly
9375000
trusted library allocation
page read and write
4E0000
unkown
page readonly
15EF0013000
heap
page read and write
610000
direct allocation
page read and write
B20000
heap
page read and write
8D1000
heap
page read and write
431000
unkown
page execute read
64E000
stack
page read and write
401000
unkown
page execute read
2F1F000
stack
page read and write
2280000
heap
page read and write
18AAA640000
heap
page read and write
400000
remote allocation
page execute and read and write
27992000
trusted library allocation
page read and write
52B000
remote allocation
page execute and read and write
278E000
stack
page read and write
2F30000
direct allocation
page read and write
2F30000
direct allocation
page read and write
400000
unkown
page readonly
67E000
heap
page read and write
610000
direct allocation
page read and write
400000
unkown
page readonly
A70000
heap
page read and write
1F24B260000
heap
page read and write
31C0000
trusted library allocation
page read and write
1B0000
remote allocation
page read and write
939E000
trusted library allocation
page read and write
D2D1CFF000
stack
page read and write
650000
heap
page read and write
C1E000
stack
page read and write
431000
unkown
page execute read
648000
heap
page read and write
400000
remote allocation
page execute and read and write
401000
unkown
page execute read
19B000
stack
page read and write
8CC000
heap
page read and write
2F30000
direct allocation
page read and write
400000
unkown
page readonly
433000
unkown
page write copy
8FE000
stack
page read and write
18AAA390000
heap
page read and write
2F30000
direct allocation
page read and write
610000
direct allocation
page read and write
938A000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
2B4A000
stack
page read and write
1B0000
remote allocation
page read and write
1B0000
remote allocation
page read and write
610000
direct allocation
page read and write
27992000
trusted library allocation
page read and write
8CE000
stack
page read and write
2DF437E000
stack
page read and write
196000
stack
page read and write
401000
unkown
page execute read
9375000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
15EF0048000
heap
page read and write
9C000
stack
page read and write
433000
unkown
page write copy
21FF6800000
heap
page read and write
D2D167C000
stack
page read and write
9C000
stack
page read and write
2F30000
direct allocation
page read and write
401000
unkown
page execute read
1F24B269000
heap
page read and write
690000
heap
page read and write
434000
unkown
page write copy
610000
direct allocation
page read and write
6A5000
heap
page read and write
6C0000
direct allocation
page read and write
46A000
unkown
page readonly
431000
unkown
page execute read
2200000
heap
page read and write
9FE000
stack
page read and write
431000
unkown
page execute read
21FF68C8000
heap
page read and write
1F24B308000
heap
page read and write
18D000
stack
page read and write
1B0000
remote allocation
page read and write
6CC000
heap
page read and write
4E0000
unkown
page readonly
2F30000
direct allocation
page read and write
401000
unkown
page execute read
820000
heap
page read and write
30000
heap
page read and write
2A3D000
stack
page read and write
433000
unkown
page write copy
21FF6BC0000
trusted library allocation
page read and write
618000
direct allocation
page read and write
8D1000
heap
page read and write
4E0000
unkown
page readonly
2F30000
direct allocation
page read and write
15EF0100000
heap
page read and write
4E0000
unkown
page readonly
8B6000
heap
page read and write
433000
unkown
page write copy
610000
direct allocation
page read and write
2F30000
direct allocation
page read and write
1B0000
remote allocation
page read and write
15EF0A02000
trusted library allocation
page read and write
31FB000
trusted library allocation
page read and write
6B3000
heap
page read and write
93A4000
trusted library allocation
page read and write
4E0000
unkown
page readonly
2F30000
direct allocation
page read and write
2E31000
heap
page read and write
433000
unkown
page write copy
431000
unkown
page execute read
1A71E000
stack
page read and write
19A000
stack
page read and write
619000
heap
page read and write
28160000
heap
page read and write
3366000
trusted library allocation
page read and write
2A4D000
stack
page read and write
90F000
stack
page read and write
431000
unkown
page execute read
2F30000
direct allocation
page read and write
31D0000
trusted library allocation
page read and write
1B0000
remote allocation
page read and write
401000
unkown
page execute read
674000
trusted library allocation
page execute and read and write
400000
unkown
page readonly
6A8000
heap
page execute and read and write
1F0000
trusted library allocation
page read and write
401000
unkown
page execute read
660000
direct allocation
page read and write
2C7F000
stack
page read and write
1F24AFF0000
heap
page read and write
274F000
stack
page read and write
431000
unkown
page execute read
B9F000
stack
page read and write
401000
unkown
page execute read
2F30000
direct allocation
page read and write
60980000
direct allocation
page readonly
938B000
trusted library allocation
page read and write
7B0000
heap
page read and write
21FF68A0000
trusted library allocation
page read and write
1B0000
remote allocation
page read and write
2F90000
trusted library allocation
page read and write
288F000
stack
page read and write
6097A000
direct allocation
page read and write
4E0000
unkown
page readonly
610000
direct allocation
page read and write
46A000
unkown
page readonly
598000
heap
page read and write
15EF0050000
heap
page read and write
30000
heap
page read and write
400000
unkown
page readonly
5C0000
direct allocation
page read and write
21FF6904000
heap
page read and write
2E30000
remote allocation
page read and write
27FE0000
heap
page read and write
2E31000
heap
page read and write
68E000
stack
page read and write
433000
unkown
page write copy
6B3000
heap
page read and write
4E0000
unkown
page readonly
93F000
stack
page read and write
433000
unkown
page write copy
1B0000
remote allocation
page read and write
2F30000
direct allocation
page read and write
710000
heap
page read and write
2F30000
direct allocation
page read and write
610000
direct allocation
page read and write
2F30000
direct allocation
page read and write
431000
unkown
page execute read
1F24B25C000
heap
page read and write
6CC000
heap
page read and write
909000
heap
page read and write
53E000
stack
page read and write
31F6000
trusted library allocation
page read and write
2F30000
direct allocation
page read and write
6F0000
heap
page read and write
1B0000
remote allocation
page read and write
347C000
stack
page read and write
1F24B261000
heap
page read and write
708000
heap
page read and write
28FE000
stack
page read and write
2F30000
direct allocation
page read and write
4C5000
heap
page read and write
1F24B25D000
heap
page read and write
2F30000
direct allocation
page read and write
610000
direct allocation
page read and write
15EF0071000
heap
page read and write
264E000
stack
page read and write
434000
unkown
page write copy
3243000
trusted library allocation
page read and write
1F24B213000
heap
page read and write
1F0000
trusted library allocation
page read and write
4E0000
unkown
page readonly
936B000
trusted library allocation
page read and write
431000
unkown
page execute read
51A000
remote allocation
page execute and read and write
1F0000
trusted library allocation
page read and write
267F000
stack
page read and write
52B000
remote allocation
page execute and read and write
339A000
trusted library allocation
page read and write
1F24B23C000
heap
page read and write
433000
unkown
page write copy
1A4DE000
stack
page read and write
64E000
stack
page read and write
88F000
stack
page read and write
529000
remote allocation
page execute and read and write
226F000
stack
page read and write
226E000
stack
page read and write
2260000
heap
page read and write
400000
unkown
page readonly
15EF008F000
heap
page read and write
63F000
heap
page read and write
610000
direct allocation
page read and write
5E0E9FB000
stack
page read and write
20E0000
heap
page read and write
610000
direct allocation
page read and write
4E0000
unkown
page readonly
400000
remote allocation
page execute and read and write
431000
unkown
page execute read
1F0000
trusted library allocation
page read and write
2F30000
direct allocation
page read and write
610000
direct allocation
page read and write
15EF0002000
heap
page read and write
21FF692D000
heap
page read and write
2F30000
direct allocation
page read and write
6B8000
heap
page read and write
18AAA3A0000
heap
page read and write
431000
unkown
page execute read
1B0000
remote allocation
page read and write
266E000
stack
page read and write
2C7F000
stack
page read and write
1B0000
remote allocation
page read and write
610000
direct allocation
page read and write
2F36000
direct allocation
page read and write
610000
direct allocation
page read and write
1B0000
remote allocation
page read and write
8BE000
heap
page read and write
6A9000
heap
page read and write
21FF6820000
heap
page read and write
400000
unkown
page readonly
857000
heap
page read and write
6A0000
heap
page read and write
31F3000
trusted library allocation
page read and write
610000
direct allocation
page read and write
2EBE000
stack
page read and write
610000
direct allocation
page read and write
B28000
heap
page read and write
2E1E000
stack
page read and write
A9F000
stack
page read and write
9CE000
stack
page read and write
9C000
stack
page read and write
196000
stack
page read and write
612000
direct allocation
page read and write
8CD000
heap
page read and write
610000
direct allocation
page read and write
18AAA652000
heap
page read and write
D2D1AF7000
stack
page read and write
19E000
stack
page read and write
2B20000
heap
page read and write
400000
unkown
page readonly
4C4000
unkown
page read and write
2F30000
direct allocation
page read and write
2B8D000
stack
page read and write
9D000
stack
page read and write
7CF000
stack
page read and write
1B0000
remote allocation
page read and write
2E20000
remote allocation
page read and write
610000
direct allocation
page read and write
2F30000
direct allocation
page read and write
520000
heap
page read and write
2F70000
heap
page read and write
193000
stack
page read and write
30000
heap
page read and write
1F24B313000
heap
page read and write
30C0000
heap
page read and write
9357000
trusted library allocation
page read and write
2B0F000
stack
page read and write
8A8000
heap
page read and write
31D6000
trusted library allocation
page read and write
431000
unkown
page execute read
1B0000
remote allocation
page read and write
52B000
remote allocation
page execute and read and write
734000
heap
page read and write
52B000
remote allocation
page execute and read and write
28CE000
stack
page read and write
1B0000
remote allocation
page read and write
1F24B160000
trusted library allocation
page read and write
2F30000
direct allocation
page read and write
2F30000
direct allocation
page read and write
2E20000
remote allocation
page read and write
433000
unkown
page write copy
31B0000
trusted library allocation
page read and write
400000
unkown
page readonly
610000
direct allocation
page read and write
262F000
stack
page read and write
9393000
trusted library allocation
page read and write
6C5000
heap
page read and write
2E31000
heap
page read and write
2110000
heap
page read and write
21FF6BB9000
heap
page read and write
2F30000
direct allocation
page read and write
400000
unkown
page readonly
610000
direct allocation
page read and write
2E31000
heap
page read and write
1B0000
remote allocation
page read and write
A0E000
stack
page read and write
5F0000
heap
page read and write
93A4000
trusted library allocation
page read and write
936F000
trusted library allocation
page read and write
2DBE000
stack
page read and write
21FF66C0000
heap
page read and write
400000
remote allocation
page execute and read and write
431000
unkown
page execute read
6EE000
stack
page read and write
78E000
stack
page read and write
610000
direct allocation
page read and write
A1F000
stack
page read and write
2F30000
direct allocation
page read and write
23A0000
heap
page read and write
623000
direct allocation
page read and write
9317000
trusted library allocation
page read and write
2C90000
heap
page read and write
610000
direct allocation
page read and write
1B0000
remote allocation
page read and write
401000
unkown
page execute read
1B0000
remote allocation
page read and write
B0F000
stack
page read and write
31F3000
trusted library allocation
page read and write
2F30000
direct allocation
page read and write
4C7000
heap
page read and write
400000
unkown
page readonly
6B3000
heap
page read and write
610000
direct allocation
page read and write
5FA000
heap
page read and write
31F6000
trusted library allocation
page read and write
2F30000
direct allocation
page read and write
610000
direct allocation
page read and write
2F30000
direct allocation
page read and write
52B000
remote allocation
page execute and read and write
1B0000
remote allocation
page read and write
400000
unkown
page readonly
1B0000
remote allocation
page read and write
1AD60000
unclassified section
page read and write
2F30000
direct allocation
page read and write
71E000
stack
page read and write
5F0000
direct allocation
page execute and read and write
279A0000
trusted library allocation
page read and write
1F24B229000
heap
page read and write
434000
unkown
page write copy
1F24B29E000
heap
page read and write
2F30000
direct allocation
page read and write
1F0000
trusted library allocation
page read and write
92D0000
trusted library allocation
page read and write
18AAA400000
heap
page read and write
31D0000
trusted library allocation
page read and write
400000
unkown
page readonly
60E000
stack
page read and write
4E0000
unkown
page readonly
B10000
heap
page read and write
1B0000
remote allocation
page read and write
431000
unkown
page execute read
15EF003C000
heap
page read and write
431000
unkown
page execute read
401000
unkown
page execute read
1B0000
remote allocation
page read and write
2F30000
direct allocation
page read and write
6096F000
direct allocation
page readonly
15EEFF60000
trusted library allocation
page read and write
21EF000
stack
page read and write
31FA000
trusted library allocation
page read and write
2F30000
direct allocation
page read and write
431000
unkown
page execute read
21F0000
heap
page read and write
9C000
stack
page read and write
4E0000
unkown
page readonly
18AAA622000
heap
page read and write
193000
stack
page read and write
2DF3E7E000
stack
page read and write
52B000
remote allocation
page execute and read and write
8BE000
heap
page read and write
21FF690B000
heap
page read and write
15EF007D000
heap
page read and write
22AE000
stack
page read and write
2F30000
direct allocation
page read and write
431000
unkown
page execute read
8BF000
stack
page read and write
9950000
trusted library allocation
page read and write
28EE000
stack
page read and write
401000
unkown
page execute read
433000
unkown
page write copy
30000
heap
page read and write
2E31000
heap
page read and write
26DD0000
trusted library allocation
page read and write
89D000
heap
page read and write
2F30000
direct allocation
page read and write
610000
direct allocation
page read and write
22CA000
heap
page read and write
1B0000
remote allocation
page read and write
434000
unkown
page write copy
279AA000
trusted library allocation
page read and write
1B0000
remote allocation
page read and write
2F30000
direct allocation
page read and write
32E1000
trusted library allocation
page read and write
337E000
stack
page read and write
280E0000
trusted library allocation
page read and write
6B6000
heap
page read and write
21FF68C0000
heap
page read and write
1A9F0000
remote allocation
page read and write
20CCD000
trusted library allocation
page read and write
610000
direct allocation
page read and write
2F71000
heap
page read and write
33F0000
unkown
page read and write
78D000
heap
page read and write
2DF427B000
stack
page read and write
431000
unkown
page execute read
9C000
stack
page read and write
46A000
unkown
page readonly
310B5F9000
stack
page read and write
431000
unkown
page execute read
2F30000
direct allocation
page read and write
610000
direct allocation
page read and write
433000
unkown
page write copy
3257000
trusted library allocation
page read and write
18AAA64C000
heap
page read and write
2F30000
direct allocation
page read and write
610000
direct allocation
page read and write
433000
unkown
page write copy
2E31000
heap
page read and write
27FE1000
heap
page read and write
33BA000
trusted library allocation
page read and write
21FF690C000
heap
page read and write
4C0000
heap
page read and write
31D0000
trusted library allocation
page read and write
2F30000
direct allocation
page read and write
B3E000
stack
page read and write
2F30000
direct allocation
page read and write
610000
direct allocation
page read and write
2E31000
heap
page read and write
A90000
heap
page read and write
1A8BE000
stack
page read and write
1B0000
remote allocation
page read and write
610000
direct allocation
page read and write
610000
direct allocation
page read and write
529000
remote allocation
page execute and read and write
2F30000
direct allocation
page read and write
18AAA600000
heap
page read and write
431000
unkown
page execute read
2CBE000
stack
page read and write
431000
unkown
page execute read
19E000
stack
page read and write
1B0000
remote allocation
page read and write
1AA2E000
stack
page read and write
433000
unkown
page write copy
60901000
direct allocation
page execute read
4E0000
unkown
page readonly
27BE000
stack
page read and write
58E000
stack
page read and write
401000
unkown
page execute read
9D000
stack
page read and write
57E000
stack
page read and write
610000
direct allocation
page read and write
21FF68B0000
trusted library allocation
page read and write
30000
heap
page read and write
400000
unkown
page readonly
15EEFED0000
heap
page read and write
431000
unkown
page execute read
2DF417B000
stack
page read and write
2DBD000
stack
page read and write
5E0ECFF000
stack
page read and write
60900000
direct allocation
page execute and read and write
27AE000
stack
page read and write
400000
unkown
page readonly
628000
direct allocation
page read and write
2821B000
stack
page read and write
5EE000
stack
page read and write
610000
direct allocation
page read and write
2DDF000
stack
page read and write
2F30000
direct allocation
page read and write
5E0E51F000
stack
page read and write
2F30000
direct allocation
page read and write
30AC000
stack
page read and write
2F30000
direct allocation
page read and write
401000
unkown
page execute read
27991000
trusted library allocation
page read and write
401000
unkown
page execute read
27781000
trusted library allocation
page read and write
2F32000
direct allocation
page read and write
2F30000
direct allocation
page read and write
665000
heap
page read and write
958D000
stack
page read and write
1AB2F000
stack
page read and write
2F70000
remote allocation
page read and write
278E000
stack
page read and write
610000
direct allocation
page read and write
401000
unkown
page execute read
15EF0102000
heap
page read and write
2F30000
direct allocation
page read and write
433000
unkown
page write copy
2330000
heap
page read and write
46A000
unkown
page readonly
2C7A000
stack
page read and write
1B0000
remote allocation
page read and write
88F000
stack
page read and write
1CB000
stack
page read and write
400000
remote allocation
page execute and read and write
431000
unkown
page execute read
18AAA702000
heap
page read and write
93CE000
trusted library allocation
page read and write
401000
unkown
page execute read
2F30000
direct allocation
page read and write
D2D177E000
stack
page read and write
935B000
trusted library allocation
page read and write
1B0000
remote allocation
page read and write
431000
unkown
page execute read
18AAA674000
heap
page read and write
1B0000
remote allocation
page read and write
401000
unkown
page execute read
1F24B302000
heap
page read and write
52B000
remote allocation
page execute and read and write
1A77D000
stack
page read and write
610000
direct allocation
page read and write
400000
unkown
page readonly
4DA000
unkown
page read and write
400000
remote allocation
page execute and read and write
27997000
trusted library allocation
page read and write
2F1E000
stack
page read and write
21FF7780000
trusted library allocation
page read and write
279AA000
trusted library allocation
page read and write
2B7E000
stack
page read and write
433000
unkown
page write copy
401000
unkown
page execute read
2F30000
direct allocation
page read and write
400000
unkown
page readonly
610000
direct allocation
page read and write
5AE000
stack
page read and write
2F30000
direct allocation
page read and write
2DBE000
stack
page read and write
610000
direct allocation
page read and write
279A1000
trusted library allocation
page read and write
27990000
trusted library allocation
page read and write
8F8000
heap
page read and write
C20000
heap
page read and write
5E0E59F000
stack
page read and write
2F30000
direct allocation
page read and write
2F30000
direct allocation
page read and write
5E0E49B000
stack
page read and write
638000
heap
page read and write
52B000
remote allocation
page execute and read and write
2F71000
heap
page read and write
2E30000
remote allocation
page read and write
2F3A000
direct allocation
page read and write
81F000
stack
page read and write
27781000
trusted library allocation
page read and write
1B0000
remote allocation
page read and write
610000
direct allocation
page read and write
310B779000
stack
page read and write
2E31000
heap
page read and write
3070000
remote allocation
page read and write
2E5E000
stack
page read and write
2F70000
remote allocation
page read and write
464000
unkown
page read and write
120000
heap
page read and write
671000
heap
page read and write
400000
unkown
page readonly
4E0000
unkown
page readonly
1B0000
remote allocation
page read and write
222F000
stack
page read and write
2F30000
direct allocation
page read and write
3511000
unkown
page read and write
30000
heap
page read and write
2F30000
direct allocation
page read and write
1B0000
remote allocation
page read and write
31F3000
trusted library allocation
page read and write
2DF407B000
stack
page read and write
434000
unkown
page write copy
2F30000
direct allocation
page read and write
2799D000
trusted library allocation
page read and write
4E0000
unkown
page readonly
2F30000
direct allocation
page read and write
3070000
remote allocation
page read and write
2F30000
direct allocation
page read and write
2F30000
direct allocation
page read and write
431000
unkown
page execute read
1B0000
remote allocation
page read and write
400000
unkown
page readonly
433000
unkown
page write copy
6DF000
stack
page read and write
17B000
stack
page read and write
63C000
heap
page read and write
400000
remote allocation
page execute and read and write
26C30000
trusted library allocation
page read and write
529000
remote allocation
page execute and read and write
2F30000
direct allocation
page read and write
610000
direct allocation
page read and write
400000
remote allocation
page execute and read and write
430000
trusted library allocation
page read and write
433000
unkown
page write copy
31D0000
trusted library allocation
page read and write
6A9000
heap
page read and write
27780000
trusted library allocation
page read and write
2162000
trusted library allocation
page execute and read and write
4E0000
unkown
page readonly
4E0000
unkown
page readonly
7A2000
heap
page read and write
7A9000
heap
page read and write
6F7000
heap
page read and write
63C000
heap
page read and write
BBE000
stack
page read and write
2CBE000
stack
page read and write
78E000
heap
page read and write
610000
direct allocation
page read and write
33A3000
trusted library allocation
page read and write
400000
unkown
page readonly
5F0000
heap
page read and write
4C4000
unkown
page read and write
400000
remote allocation
page execute and read and write
610000
direct allocation
page read and write
936F000
trusted library allocation
page read and write
61C000
direct allocation
page read and write
610000
direct allocation
page read and write
2F30000
direct allocation
page read and write
433000
unkown
page write copy
8A0000
heap
page read and write
2F5F000
stack
page read and write
610000
direct allocation
page read and write
2F30000
direct allocation
page read and write
69E000
stack
page read and write
2E20000
remote allocation
page read and write
18AAA700000
heap
page read and write
2F1F000
stack
page read and write
400000
remote allocation
page execute and read and write
18AAA613000
heap
page read and write
93AB000
trusted library allocation
page read and write
1F24B249000
heap
page read and write
1B0000
remote allocation
page read and write
590000
heap
page read and write
434000
unkown
page write copy
9C000
stack
page read and write
2F70000
heap
page read and write
18AAA602000
heap
page read and write
401000
unkown
page execute read
310B6FF000
stack
page read and write
705000
heap
page read and write
1B0000
remote allocation
page read and write
400000
remote allocation
page execute and read and write
2F30000
direct allocation
page read and write
8CC000
heap
page read and write
401000
unkown
page execute read
401000
unkown
page execute read
2F30000
direct allocation
page read and write
52B000
remote allocation
page execute and read and write
2F30000
direct allocation
page read and write
4DA000
unkown
page read and write
431000
unkown
page execute read
400000
unkown
page readonly
27796000
trusted library allocation
page read and write
1A39F000
stack
page read and write
610000
direct allocation
page read and write
52B000
remote allocation
page execute and read and write
2C7A000
stack
page read and write
2F30000
direct allocation
page read and write
6B3000
heap
page read and write
400000
remote allocation
page execute and read and write
78E000
heap
page read and write
64E000
stack
page read and write
19B000
stack
page read and write
753000
heap
page read and write
529000
remote allocation
page execute and read and write
9BF000
stack
page read and write
19B000
stack
page read and write
610000
direct allocation
page read and write
52B000
remote allocation
page execute and read and write
31D7000
trusted library allocation
page read and write
400000
unkown
page readonly
2B0F000
stack
page read and write
52B000
remote allocation
page execute and read and write
2811E000
stack
page read and write
52B000
remote allocation
page execute and read and write
27991000
trusted library allocation
page read and write
15EF0000000
heap
page read and write
2B7D000
stack
page read and write
2DBE000
stack
page read and write
9FF000
stack
page read and write
431000
unkown
page execute read
400000
remote allocation
page execute and read and write
6097D000
direct allocation
page read and write
21FF7750000
trusted library allocation
page read and write
2F30000
direct allocation
page read and write
280F000
stack
page read and write
1F24B265000
heap
page read and write
2F38000
direct allocation
page read and write
400000
unkown
page readonly
1A9F0000
remote allocation
page read and write
29CF000
stack
page read and write
1B0000
remote allocation
page read and write
610000
direct allocation
page read and write
6B6000
heap
page read and write
2F30000
direct allocation
page read and write
431000
unkown
page execute read
30000
heap
page read and write
52B000
remote allocation
page execute and read and write
529000
remote allocation
page execute and read and write
75F000
stack
page read and write
32CB000
trusted library allocation
page read and write
401000
unkown
page execute read
2CBE000
stack
page read and write
301F000
stack
page read and write
6A9000
heap
page read and write
8BB000
heap
page read and write
18AAA713000
heap
page read and write
1B0000
remote allocation
page read and write
30000
heap
page read and write
431000
unkown
page execute read
660000
heap
page read and write
1F0000
trusted library allocation
page read and write
431000
unkown
page execute read
15EF0088000
heap
page read and write
21FF7760000
heap
page readonly
B19000
heap
page read and write
610000
direct allocation
page read and write
400000
unkown
page readonly
8DA000
heap
page read and write
433000
unkown
page write copy
2F30000
direct allocation
page read and write
1F0000
trusted library allocation
page read and write
9303000
trusted library allocation
page read and write
2F30000
direct allocation
page read and write
2F30000
direct allocation
page read and write
69F000
heap
page read and write
610000
direct allocation
page read and write
400000
unkown
page readonly
9382000
trusted library allocation
page read and write
6C2000
heap
page read and write
4DA000
unkown
page read and write
2816A000
heap
page read and write
2F30000
direct allocation
page read and write
1B0000
remote allocation
page read and write
21FF690B000
heap
page read and write
697000
heap
page read and write
31C1000
trusted library allocation
page read and write
31DB000
trusted library allocation
page read and write
433000
unkown
page write copy
196000
stack
page read and write
336C000
trusted library allocation
page read and write
8AF000
heap
page read and write
696000
trusted library allocation
page execute and read and write
610000
direct allocation
page read and write
2F30000
direct allocation
page read and write
2670000
heap
page read and write
1B0000
remote allocation
page read and write
18AAA66D000
heap
page read and write
19B000
stack
page read and write
196000
stack
page read and write
64E000
stack
page read and write
631000
heap
page read and write
2F30000
direct allocation
page read and write
5A0000
heap
page read and write
2821D000
stack
page read and write
2F30000
direct allocation
page read and write
D2D197B000
stack
page read and write
30000
heap
page read and write
433000
unkown
page write copy
7FF000
trusted library allocation
page execute and read and write
705000
heap
page read and write
2F30000
direct allocation
page read and write
1B0000
remote allocation
page read and write
705000
heap
page read and write
400000
unkown
page readonly
431000
unkown
page execute read
401000
unkown
page execute read
1B0000
remote allocation
page read and write
9D000
stack
page read and write
6BB000
heap
page read and write
2F30000
direct allocation
page read and write
15EEFEC0000
heap
page read and write
277F000
stack
page read and write
2F30000
direct allocation
page read and write
8BA000
heap
page read and write
9C000
stack
page read and write
431000
unkown
page execute read
610000
direct allocation
page read and write
903000
heap
page read and write
6C8000
heap
page read and write
26CF8000
trusted library allocation
page read and write
87E000
stack
page read and write
2F30000
direct allocation
page read and write
6A7000
heap
page read and write
1B0000
remote allocation
page read and write
4DA000
unkown
page read and write
2F30000
direct allocation
page read and write
1B0000
remote allocation
page read and write
7B0000
heap
page read and write
310B67A000
stack
page read and write
6B7000
heap
page read and write
627000
heap
page read and write
2821F000
stack
page read and write
60E000
stack
page read and write
1F24B200000
heap
page read and write
610000
direct allocation
page read and write
4E0000
unkown
page readonly
620000
heap
page read and write
401000
unkown
page execute read
276F000
stack
page read and write
2799D000
trusted library allocation
page read and write
401000
unkown
page execute read
5C2000
heap
page read and write
93C7000
trusted library allocation
page read and write
400000
unkown
page readonly
1F24B000000
heap
page read and write
2F30000
direct allocation
page read and write
5DF000
heap
page read and write
6097B000
direct allocation
page readonly
4E0000
unkown
page readonly
28270000
trusted library allocation
page read and write
2F30000
direct allocation
page read and write
8B2000
heap
page read and write
30000
heap
page read and write
15EF006E000
heap
page read and write
288F000
stack
page read and write
21FF6BB5000
heap
page read and write
4C4000
unkown
page read and write
433000
unkown
page write copy
A0F000
stack
page read and write
252E000
stack
page read and write
290F000
stack
page read and write
610000
direct allocation
page read and write
2A0E000
stack
page read and write
4E0000
unkown
page readonly
21FF6890000
trusted library allocation
page read and write
31D7000
trusted library allocation
page read and write
A5E000
stack
page read and write
2C8E000
stack
page read and write
433000
unkown
page write copy
9BF000
stack
page read and write
610000
direct allocation
page read and write
610000
direct allocation
page read and write
612000
direct allocation
page read and write
2FEE000
stack
page read and write
400000
unkown
page readonly
93B1000
trusted library allocation
page read and write
2F70000
remote allocation
page read and write
80E000
stack
page read and write
1B0000
remote allocation
page read and write
2B3A000
stack
page read and write
932B000
trusted library allocation
page read and write
740000
heap
page read and write
936F000
trusted library allocation
page read and write
431000
unkown
page execute read
9375000
trusted library allocation
page read and write
8BE000
heap
page read and write
2F30000
direct allocation
page read and write
1F0000
trusted library allocation
page read and write
4E0000
unkown
page readonly
5E0EAF7000
stack
page read and write
1A5DF000
stack
page read and write
610000
direct allocation
page read and write
1F24BA02000
trusted library allocation
page read and write
401000
unkown
page execute read
627000
heap
page read and write
1AC5D000
trusted library allocation
page read and write
5E0EBFD000
stack
page read and write
6F7000
heap
page read and write
2F30000
direct allocation
page read and write
21FF77D0000
trusted library allocation
page read and write
21FF7770000
trusted library allocation
page read and write
2E1E000
stack
page read and write
6AE000
stack
page read and write
8D1000
heap
page read and write
431000
unkown
page execute read
31F7000
trusted library allocation
page read and write
1B0000
remote allocation
page read and write
2E30000
heap
page read and write
2F30000
direct allocation
page read and write
2F71000
heap
page read and write
1A61E000
stack
page read and write
640000
heap
page read and write
2F30000
direct allocation
page read and write
18AAAE02000
trusted library allocation
page read and write
8CD000
heap
page read and write
2F30000
direct allocation
page read and write
6C7000
heap
page read and write
828000
heap
page read and write
6BB000
heap
page read and write
1B0000
remote allocation
page read and write
2F30000
direct allocation
page read and write
21FF6BB0000
heap
page read and write
2F30000
direct allocation
page read and write
18AAA628000
heap
page read and write
610000
direct allocation
page read and write
D2D1BFF000
stack
page read and write
1F0000
trusted library allocation
page read and write
2F30000
direct allocation
page read and write
400000
unkown
page readonly
1F24B25B000
heap
page read and write
401000
unkown
page execute read
2B20000
heap
page read and write
28BF000
stack
page read and write
64E000
stack
page read and write
5B0000
heap
page read and write
52B000
remote allocation
page execute and read and write
45C000
unkown
page read and write
2F30000
direct allocation
page read and write
62A000
direct allocation
page read and write
610000
direct allocation
page read and write
4E0000
unkown
page readonly
401000
unkown
page execute read
31C1000
trusted library allocation
page read and write
31F3000
trusted library allocation
page read and write
431000
unkown
page execute read
193000
stack
page read and write
1B0000
remote allocation
page read and write
8CC000
heap
page read and write
29EF000
stack
page read and write
29F0000
heap
page read and write
1A9F0000
remote allocation
page read and write
1B0000
remote allocation
page read and write
2F30000
direct allocation
page read and write
21FF68D0000
heap
page read and write
46A000
unkown
page readonly
274F000
stack
page read and write
401000
unkown
page execute read
2F30000
direct allocation
page read and write
1A49F000
stack
page read and write
9372000
trusted library allocation
page read and write
6C5000
heap
page read and write
2290000
heap
page read and write
4E0000
unkown
page readonly
433000
unkown
page write copy
401000
unkown
page execute read
610000
direct allocation
page read and write
31F3000
trusted library allocation
page read and write
D2D16FE000
stack
page read and write
9307000
trusted library allocation
page read and write
There are 1207 hidden memdumps, click here to show them.