IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\BFCAAEHJDB.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_31a03d39eaf3456617715dbd42ad2f694d8d936_e5530a89_b5071b11-faba-4c62-8f2e-6bdb744cb7c5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_main.exe_812666da5b2f51c4c16d2b07f719a7c78639de5_61e28721_73515c69-440e-47be-bb34-66b4d951211c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\libi2p.dll
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\termsrv32.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\7847438767[1].exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\euasv89vr56qz5toefmgc1.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\Temp\1kuzcKGx
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\Temp\FHLBnhuN
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\Temp\KXEmxT2p
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\Temp\Lx9RtFcl
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\Temp\S7evpAMe
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\Temp\fJw4qvYl
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\Temp\g29qQU9G
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\Temp\h0yu5TYE
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\DAEGIDHDHIDG\AAKEGI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DAEGIDHDHIDG\BAKJKF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DAEGIDHDHIDG\ECBGCG
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DAEGIDHDHIDG\EGCFHD
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\DAEGIDHDHIDG\FHIEBK
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
modified
C:\ProgramData\DAEGIDHDHIDG\FHIEBK-shm
data
dropped
C:\ProgramData\DAEGIDHDHIDG\GIIDBG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\DAEGIDHDHIDG\IDGDAA
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DAEGIDHDHIDG\IJKKKF
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\DAEGIDHDHIDG\JDHCBA
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2D28.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Jul 26 09:27:18 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2EDE.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F1E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F4B.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2FB9.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER36C8.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Jul 26 09:28:26 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3801.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3822.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3841.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3880.tmp.txt
data
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ZsL2hKzmRChz.acl
data
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.log
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\config.ini
Generic INItialization configuration [cnccli]
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.log
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.log
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\i2p.conf
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\i2p.su3
data
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\i2p\destinations\5spuxvtyp6bpzxqbodiqxcfongbbqlsamj3w6d54pocgrixn5wfa.dat
data
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\i2p\i2p.log
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\i2p\ntcp2.keys
data
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\i2p\router.info
data
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\i2p\router.keys
data
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\i2p\ssu2.keys
OpenPGP Public Key
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.log
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.log
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.log
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rfxvmt.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.log
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\termsrv32.ini
Generic INItialization configuration [SLPolicy]
dropped
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\update.pkg
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\76561199747278259[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\installer.log
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\K5561pLF
Generic INItialization configuration [SLPolicy]
dropped
C:\Windows\Temp\OjI1jGmI
data
dropped
C:\Windows\Temp\QO8YpEd6
Generic INItialization configuration [cnccli]
dropped
C:\Windows\Temp\TD8r2foe
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\feJ0dymt
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 67 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\ProgramData\BFCAAEHJDB.exe
"C:\ProgramData\BFCAAEHJDB.exe"
malicious
C:\ProgramData\BFCAAEHJDB.exe
C:\ProgramData\BFCAAEHJDB.exe
malicious
C:\Users\user\AppData\Local\Temp\euasv89vr56qz5toefmgc1.exe
C:\Users\user\AppData\Local\Temp\euasv89vr56qz5toefmgc1.exe
malicious
C:\Windows\System32\sc.exe
sc.exe stop RDP-Controller
malicious
C:\Windows\System32\sc.exe
sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore
malicious
C:\Windows\System32\sc.exe
sc.exe failure RDP-Controller reset= 1 actions= restart/10000
malicious
C:\Windows\System32\sc.exe
sc.exe start RDP-Controller
malicious
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\DAEGIDHDHIDG" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5012 -ip 5012
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 3212
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\icacls.exe
icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\icacls.exe
icacls.exe C:\Users\Public /restore C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ZsL2hKzmRChz.acl
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 436 -p 1524 -ip 1524
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1524 -s 1176
There are 16 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://5.75.212.60/sqls.dll
5.75.212.60
malicious
https://5.75.212.60/vcruntime140.dll;
unknown
malicious
https://i2pseed.creativecowpat.net:8443/
unknown
malicious
https://reseed.memcpy.io/
unknown
malicious
https://banana.incognet.io/
unknown
malicious
https://reseed-fr.i2pd.xyz/
unknown
malicious
https://i2p.novg.net/
unknown
malicious
https://i2p.ghativega.in/
unknown
malicious
https://www2.mk16.de/
unknown
malicious
https://steamcommunity.com/profiles/76561199747278259
23.192.247.89
malicious
https://reseed.diva.exchange/
unknown
malicious
http://arpdabl.zapto.org
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://player.vimeo.com
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://reg.i2p/hosts.txtvp/p_lib.c
unknown
http://198.46.178.145/7847438767.exenderbird
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://arpdabl.zaptoJKFHJ
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=B7Vsdo1okyaC&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
http://reg.i2p/hosts.txtcc
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=Iy1ies1ROjUT&l=english
unknown
https://steamcommunity.com/profiles/76561199747278259/badges
unknown
https://5.75.212.60/0
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://s.ytimg.com;
unknown
https://5.75.212.60//
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=_D2Bg4UEaFxK&l=en
unknown
https://store.steampowered.com/privac
unknown
https://5.75.212.60/#
unknown
https://steam.tv/
unknown
http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=3eYWCMu_
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=54OKIvHlOQzF&l=e
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://5.75.212.60/;
unknown
https://5.75.212.60/A
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://mozilla.org0/
unknown
https://t.me/armad2a
unknown
https://5.75.212.60/4
unknown
https://5.75.212.60/5
unknown
https://5.75.212.60/2
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://5.75.212.60/6
unknown
https://5.75.212.60/softokn3.dllnXq
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://steamcommunity.com/profiles/76561199747278259gi_z2Mozilla/5.0
unknown
http://reg.i2p/hosts.txt
unknown
https://sketchfab.com
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://5.75.212.60/H
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
http://reg.i2p/hosts.txt7t
unknown
http://identiguy.i2p/hosts.txt
unknown
https://5.75.212.60/EGIDHDHIDG
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://i2pd.readthedocs.io/en/latest/user-guide/configuration/
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://5.75.212.60art/form-data;
unknown
http://198.46.178.145/7847438767.exe
198.46.178.145
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://5.75.212.60/e
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
http://arpdabl.zapto.KFHJ
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://t.me/armad2ahellosqls.dllsqlite3.dllIn
unknown
https://5.75.212.60/licies
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://5.75.212.60/softokn3.dll
5.75.212.60
https://5.75.212.60/freebl3.dllE
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
23.192.247.89
malicious
arpdabl.zapto.org
77.91.101.71

IPs

IP
Domain
Country
Malicious
45.8.98.78
unknown
Russian Federation
malicious
204.8.84.94
unknown
United States
malicious
23.192.247.89
steamcommunity.com
United States
malicious
82.165.57.155
unknown
Germany
malicious
68.148.96.106
unknown
Canada
malicious
68.53.161.168
unknown
United States
malicious
91.224.234.189
unknown
Russian Federation
malicious
73.62.1.179
unknown
United States
malicious
184.185.247.130
unknown
United States
209.99.203.131
unknown
United States
216.9.179.60
unknown
United States
73.38.186.219
unknown
United States
95.165.139.85
unknown
Russian Federation
173.230.128.232
unknown
United States
24.92.16.253
unknown
United States
139.59.20.27
unknown
Singapore
77.91.101.71
arpdabl.zapto.org
Russian Federation
5.75.212.60
unknown
Germany
91.149.237.69
unknown
Poland
91.92.250.213
unknown
Bulgaria
81.6.45.56
unknown
Switzerland
194.87.219.156
unknown
Russian Federation
75.97.173.28
unknown
United States
91.194.11.174
unknown
Russian Federation
67.166.47.100
unknown
United States
70.18.38.5
unknown
United States
5.64.137.68
unknown
United Kingdom
119.13.124.67
unknown
Australia
68.119.203.48
unknown
United States
130.185.251.21
unknown
Bulgaria
198.46.178.145
unknown
United States
24.124.34.93
unknown
United States
99.252.52.199
unknown
Canada
186.28.6.171
unknown
Colombia
127.0.0.1
unknown
unknown
There are 25 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
\REGISTRY\A\{b0aaec6f-9833-1fce-162e-68039134c90d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProgramId
malicious
\REGISTRY\A\{b0aaec6f-9833-1fce-162e-68039134c90d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
FileId
malicious
\REGISTRY\A\{b0aaec6f-9833-1fce-162e-68039134c90d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LowerCaseLongPath
malicious
\REGISTRY\A\{b0aaec6f-9833-1fce-162e-68039134c90d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LongPathHash
malicious
\REGISTRY\A\{b0aaec6f-9833-1fce-162e-68039134c90d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Name
malicious
\REGISTRY\A\{b0aaec6f-9833-1fce-162e-68039134c90d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
OriginalFileName
malicious
\REGISTRY\A\{b0aaec6f-9833-1fce-162e-68039134c90d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Publisher
malicious
\REGISTRY\A\{b0aaec6f-9833-1fce-162e-68039134c90d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Version
malicious
\REGISTRY\A\{b0aaec6f-9833-1fce-162e-68039134c90d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinFileVersion
malicious
\REGISTRY\A\{b0aaec6f-9833-1fce-162e-68039134c90d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinaryType
malicious
\REGISTRY\A\{b0aaec6f-9833-1fce-162e-68039134c90d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductName
malicious
\REGISTRY\A\{b0aaec6f-9833-1fce-162e-68039134c90d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductVersion
malicious
\REGISTRY\A\{b0aaec6f-9833-1fce-162e-68039134c90d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LinkDate
malicious
\REGISTRY\A\{b0aaec6f-9833-1fce-162e-68039134c90d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinProductVersion
malicious
\REGISTRY\A\{b0aaec6f-9833-1fce-162e-68039134c90d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageFullName
malicious
\REGISTRY\A\{b0aaec6f-9833-1fce-162e-68039134c90d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageRelativeId
malicious
\REGISTRY\A\{b0aaec6f-9833-1fce-162e-68039134c90d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Size
malicious
\REGISTRY\A\{b0aaec6f-9833-1fce-162e-68039134c90d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Language
malicious
\REGISTRY\A\{b0aaec6f-9833-1fce-162e-68039134c90d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Usn
malicious
\REGISTRY\A\{65a34b23-4646-0cad-7683-f0de7193ad71}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
ProgramId
malicious
\REGISTRY\A\{65a34b23-4646-0cad-7683-f0de7193ad71}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
FileId
malicious
\REGISTRY\A\{65a34b23-4646-0cad-7683-f0de7193ad71}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
LowerCaseLongPath
malicious
\REGISTRY\A\{65a34b23-4646-0cad-7683-f0de7193ad71}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
LongPathHash
malicious
\REGISTRY\A\{65a34b23-4646-0cad-7683-f0de7193ad71}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
Name
malicious
\REGISTRY\A\{65a34b23-4646-0cad-7683-f0de7193ad71}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
OriginalFileName
malicious
\REGISTRY\A\{65a34b23-4646-0cad-7683-f0de7193ad71}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
Publisher
malicious
\REGISTRY\A\{65a34b23-4646-0cad-7683-f0de7193ad71}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
Version
malicious
\REGISTRY\A\{65a34b23-4646-0cad-7683-f0de7193ad71}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
BinFileVersion
malicious
\REGISTRY\A\{65a34b23-4646-0cad-7683-f0de7193ad71}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
BinaryType
malicious
\REGISTRY\A\{65a34b23-4646-0cad-7683-f0de7193ad71}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
ProductName
malicious
\REGISTRY\A\{65a34b23-4646-0cad-7683-f0de7193ad71}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
ProductVersion
malicious
\REGISTRY\A\{65a34b23-4646-0cad-7683-f0de7193ad71}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
LinkDate
malicious
\REGISTRY\A\{65a34b23-4646-0cad-7683-f0de7193ad71}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
BinProductVersion
malicious
\REGISTRY\A\{65a34b23-4646-0cad-7683-f0de7193ad71}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
AppxPackageFullName
malicious
\REGISTRY\A\{65a34b23-4646-0cad-7683-f0de7193ad71}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
AppxPackageRelativeId
malicious
\REGISTRY\A\{65a34b23-4646-0cad-7683-f0de7193ad71}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
Size
malicious
\REGISTRY\A\{65a34b23-4646-0cad-7683-f0de7193ad71}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
Language
malicious
\REGISTRY\A\{65a34b23-4646-0cad-7683-f0de7193ad71}\Root\InventoryApplicationFile\main.exe|b70705f32dded429
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\5012
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\5012
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\5012
CreationTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\1524
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\1524
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\1524
CreationTime
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C00B8F360B5F
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 42 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
40A0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
251A000
heap
page read and write
malicious
40D0000
direct allocation
page read and write
malicious
1FC61500000
heap
page read and write
4291000
heap
page read and write
AAF667D000
stack
page read and write
25D4000
heap
page read and write
1E3981D0000
heap
page read and write
29FE000
stack
page read and write
2F069FF000
stack
page read and write
1B503000
heap
page read and write
1E398F86000
heap
page read and write
2F05BFE000
stack
page read and write
2F051FE000
stack
page read and write
3343000
heap
page read and write
90DB17C000
stack
page read and write
6CA60000
unkown
page read and write
4291000
heap
page read and write
27AF000
stack
page read and write
27B35867000
heap
page read and write
1080000
heap
page read and write
434000
unkown
page execute and read and write
191BF000
direct allocation
page readonly
2522000
heap
page read and write
2D22000
direct allocation
page read and write
1B503000
heap
page read and write
1E398FDC000
heap
page read and write
7FFDAC0EC000
unkown
page write copy
2F06FFD000
stack
page read and write
CEE000
unkown
page read and write
7FFDA3891000
unkown
page execute read
1FC611A0000
trusted library allocation
page read and write
4286000
heap
page read and write
1DC75045000
heap
page read and write
4291000
heap
page read and write
D3B000
unkown
page read and write
1168000
heap
page read and write
1B4FE000
heap
page read and write
1977C000
heap
page read and write
1FC61500000
heap
page read and write
D21000
unkown
page read and write
2F073FD000
stack
page read and write
2470000
heap
page read and write
7FFD9409F000
unkown
page read and write
4291000
heap
page read and write
1B557000
heap
page read and write
D96000
unkown
page write copy
326D000
stack
page read and write
19760000
heap
page read and write
401000
unkown
page execute read
CE8000
unkown
page read and write
7FF670370000
unkown
page read and write
2CE7000
direct allocation
page read and write
400000
unkown
page readonly
2C29E7F000
stack
page read and write
27B35B85000
heap
page read and write
12C9F520000
heap
page read and write
1E399027000
heap
page read and write
2D23000
direct allocation
page read and write
264D6530000
heap
page read and write
1B5E7000
heap
page read and write
2F041FD000
stack
page read and write
63D000
unkown
page execute and read and write
13FCF000
stack
page read and write
1E398FD9000
heap
page read and write
4291000
heap
page read and write
250E000
heap
page read and write
4290000
heap
page read and write
14A000
stack
page read and write
1009000
heap
page read and write
52A000
unkown
page execute and read and write
CE3000
unkown
page read and write
1E398FC6000
heap
page read and write
1FC610A0000
heap
page read and write
CDA000
unkown
page read and write
7FF670D88000
unkown
page write copy
197C9000
heap
page read and write
19C000
stack
page read and write
7FF620940000
unkown
page readonly
7FF62095A000
unkown
page write copy
142A0000
remote allocation
page read and write
4291000
heap
page read and write
6C872000
unkown
page readonly
4291000
heap
page read and write
1FC61274000
heap
page read and write
2D9A000
direct allocation
page read and write
EAD22FE000
stack
page read and write
18F3E000
stack
page read and write
1B57D000
heap
page read and write
2F06BF7000
stack
page read and write
4291000
heap
page read and write
417CC000
heap
page read and write
CC5000
unkown
page read and write
4291000
heap
page read and write
2F04FFC000
stack
page read and write
7FFDAC102000
unkown
page readonly
1FC61413000
heap
page read and write
1FC61213000
unkown
page read and write
7FFD94374000
unkown
page write copy
190000
stack
page read and write
FB0000
heap
page read and write
1B54E000
heap
page read and write
BBC00FE000
stack
page read and write
CC1000
unkown
page read and write
7FFD940A4000
unkown
page readonly
90DAB7D000
stack
page read and write
2BD3000
heap
page read and write
4390000
unclassified section
page read and write
6CA5F000
unkown
page write copy
1E398FDC000
heap
page read and write
1E398FCC000
heap
page read and write
25D4000
heap
page read and write
1400C000
stack
page read and write
7FFDAC121000
unkown
page execute read
CD4000
unkown
page read and write
2C6A000
direct allocation
page read and write
3310000
heap
page read and write
25D4000
heap
page read and write
25D4000
heap
page read and write
7FFDAC112000
unkown
page readonly
2F07DFE000
stack
page read and write
1698C000
stack
page read and write
1B50C000
heap
page read and write
BBC007F000
stack
page read and write
4291000
heap
page read and write
2F063FF000
stack
page read and write
18F00000
trusted library allocation
page read and write
40E0000
heap
page read and write
7FF620941000
unkown
page execute read
24FE000
heap
page read and write
1685C000
heap
page read and write
2D93000
direct allocation
page read and write
1AE4F770000
heap
page read and write
1C2587E000
stack
page read and write
63B000
unkown
page execute and read and write
44A4000
heap
page read and write
2F037FE000
stack
page read and write
190000
heap
page read and write
4170000
heap
page read and write
27B35A30000
heap
page read and write
1B54D000
heap
page read and write
27B35820000
heap
page read and write
3D74000
heap
page read and write
1B805000
heap
page read and write
14B000
stack
page read and write
4291000
heap
page read and write
2B20000
heap
page read and write
7FFD94264000
unkown
page read and write
7FF670D87000
unkown
page write copy
1E398574000
heap
page read and write
24EE000
heap
page read and write
2CE9000
direct allocation
page read and write
180000
heap
page read and write
1B566000
heap
page read and write
1FC61270000
heap
page read and write
1B579000
heap
page read and write
18FB8000
direct allocation
page execute read
2CD8000
direct allocation
page read and write
249D000
heap
page execute and read and write
10E3000
heap
page read and write
2C29BBE000
stack
page read and write
139E000
stack
page read and write
1424D000
stack
page read and write
1D4FFE80000
heap
page read and write
20100A90000
heap
page read and write
2529000
heap
page read and write
191BD000
direct allocation
page execute read
168B5000
heap
page read and write
2F047FE000
stack
page read and write
1DC7503F000
heap
page read and write
1B503000
heap
page read and write
2F06DFD000
stack
page read and write
4291000
heap
page read and write
1DC7502B000
heap
page read and write
1D4FFFA5000
heap
page read and write
DA8000
unkown
page readonly
42A0000
heap
page read and write
7FF670361000
unkown
page execute read
27B35B80000
heap
page read and write
D7A000
unkown
page read and write
1B500000
heap
page read and write
1D4FFCB8000
heap
page read and write
FD6000
heap
page read and write
4291000
heap
page read and write
1E397F40000
heap
page read and write
2C7E000
stack
page read and write
1FC61202000
unkown
page read and write
7FFD9409E000
unkown
page write copy
2480000
heap
page read and write
D63000
unkown
page read and write
25D4000
heap
page read and write
CEB000
unkown
page read and write
264D6270000
heap
page read and write
1B560000
heap
page read and write
F54F000
stack
page read and write
1B506000
heap
page read and write
1B4FF000
heap
page read and write
191FF000
direct allocation
page readonly
1E398B72000
heap
page read and write
1C2577F000
stack
page read and write
41FE000
stack
page read and write
2CF1000
direct allocation
page read and write
1E399541000
heap
page read and write
4291000
heap
page read and write
90DB37E000
stack
page read and write
1B4F0000
heap
page read and write
2D3A000
direct allocation
page read and write
7FFD93AC0000
unkown
page readonly
1B55B000
heap
page read and write
1B5A8000
heap
page read and write
1AE4F760000
heap
page read and write
1FC61300000
trusted library allocation
page read and write
1B57E000
heap
page read and write
23AAE000
heap
page read and write
25D4000
heap
page read and write
1E3994F6000
heap
page read and write
1B56D000
heap
page read and write
2D0D000
direct allocation
page read and write
2D84000
direct allocation
page read and write
1E3993F3000
heap
page read and write
1DC74FD0000
heap
page read and write
14002D000
direct allocation
page read and write
19213000
heap
page read and write
43C000
unkown
page readonly
7FFD94377000
unkown
page readonly
4291000
heap
page read and write
1B564000
heap
page read and write
1E398FC8000
heap
page read and write
47AA000
heap
page read and write
D73000
unkown
page read and write
2B31B1D0000
heap
page read and write
7FFDAC0EB000
unkown
page read and write
4291000
heap
page read and write
160000
heap
page read and write
6C85D000
unkown
page readonly
1DC74FC0000
heap
page read and write
4291000
heap
page read and write
168AD000
heap
page read and write
D9C000
unkown
page read and write
F430F7E000
stack
page read and write
2B31B260000
heap
page read and write
4291000
heap
page read and write
2B60000
heap
page read and write
437F000
heap
page read and write
1FC61402000
heap
page read and write
4291000
heap
page read and write
1B807000
heap
page read and write
1B53B000
heap
page read and write
7FF620940000
unkown
page readonly
2B31B4E5000
heap
page read and write
7FF670D8B000
unkown
page readonly
2F071F7000
stack
page read and write
7FFDAC0E0000
unkown
page readonly
2D76000
direct allocation
page read and write
1E399041000
heap
page read and write
2D68000
direct allocation
page read and write
8E927FE000
stack
page read and write
2461000
unkown
page readonly
1FC61502000
heap
page read and write
415E000
stack
page read and write
4294000
heap
page read and write
4291000
heap
page read and write
2CAA000
direct allocation
page read and write
2F03BF6000
stack
page read and write
7FF670360000
unkown
page readonly
4291000
heap
page read and write
D7A000
unkown
page read and write
1B54E000
heap
page read and write
2F039F9000
stack
page read and write
264D6370000
heap
page read and write
191F2000
direct allocation
page read and write
1C0000
heap
page read and write
4291000
heap
page read and write
1B54E000
heap
page read and write
25D4000
heap
page read and write
2B31B4E0000
heap
page read and write
1B57D000
heap
page read and write
CBE000
unkown
page read and write
25D0000
heap
page read and write
264D6390000
heap
page read and write
2F04BFF000
stack
page read and write
2F053FE000
stack
page read and write
1DC75802000
trusted library allocation
page read and write
2F043FE000
stack
page read and write
1FC61513000
heap
page read and write
6CA5E000
unkown
page read and write
2D33000
direct allocation
page read and write
199000
stack
page read and write
1B54D000
heap
page read and write
7FF670360000
unkown
page readonly
1B541000
heap
page read and write
11A8F000
stack
page read and write
1B579000
heap
page read and write
426E000
stack
page read and write
24F3000
heap
page read and write
1684B000
heap
page read and write
2F059FF000
stack
page read and write
1C2567D000
stack
page read and write
20100B38000
heap
page read and write
CE8000
unkown
page read and write
12C9F4C0000
heap
page read and write
4291000
heap
page read and write
1681F000
stack
page read and write
7FF62095E000
unkown
page readonly
CC2000
unkown
page read and write
1E3994B3000
heap
page read and write
1E397F57000
heap
page read and write
6C881000
unkown
page execute read
4291000
heap
page read and write
F430CFB000
stack
page read and write
2F067FF000
stack
page read and write
23A9D000
stack
page read and write
4291000
heap
page read and write
10E0000
heap
page read and write
1B55F000
heap
page read and write
7FFDA38E0000
unkown
page read and write
1B56D000
heap
page read and write
142A0000
remote allocation
page read and write
421000
unkown
page execute read
18A000
stack
page read and write
D94000
unkown
page read and write
1B564000
heap
page read and write
1B560000
heap
page read and write
16840000
heap
page read and write
4291000
heap
page read and write
2F061FF000
stack
page read and write
7FFDAC13D000
unkown
page read and write
188000
stack
page read and write
7FFD94372000
unkown
page read and write
252E000
heap
page read and write
4280000
heap
page read and write
4291000
heap
page read and write
19C4C000
stack
page read and write
41BE000
stack
page read and write
4291000
heap
page read and write
4291000
heap
page read and write
7FFDAC0E8000
unkown
page read and write
4291000
heap
page read and write
1DC75102000
heap
page read and write
251A000
heap
page read and write
1E397F20000
heap
page read and write
1B58C000
heap
page read and write
10A0000
direct allocation
page execute and read and write
2F067FB000
stack
page read and write
D98000
unkown
page read and write
D9C000
unkown
page read and write
4291000
heap
page read and write
1C0000
heap
page read and write
2F069FB000
stack
page read and write
1B75E000
heap
page read and write
CBE000
unkown
page write copy
3D72000
heap
page read and write
2B31B0F0000
heap
page read and write
2F03DFE000
stack
page read and write
2529000
heap
page read and write
1B55F000
heap
page read and write
7FFD9426A000
unkown
page readonly
2D2A000
direct allocation
page read and write
1E0000
heap
page read and write
F4309AE000
stack
page read and write
56E000
unkown
page execute and read and write
D76000
unkown
page read and write
2C29B3C000
stack
page read and write
2CCA000
direct allocation
page read and write
2F071FD000
stack
page read and write
2D48000
direct allocation
page read and write
1DC75000000
heap
page read and write
7FF670D7D000
unkown
page readonly
2F045FE000
stack
page read and write
1D4FFEA0000
heap
page read and write
4291000
heap
page read and write
D64000
unkown
page read and write
9C000
stack
page read and write
32C0000
heap
page read and write
191FD000
direct allocation
page readonly
4291000
heap
page read and write
1E399528000
heap
page read and write
CBE000
unkown
page read and write
2F03BFC000
stack
page read and write
2F03FFD000
stack
page read and write
1E399498000
heap
page read and write
527000
unkown
page execute and read and write
4610000
heap
page read and write
1414E000
stack
page read and write
1E398F9D000
heap
page read and write
7FFDAC0D0000
unkown
page readonly
CD4000
unkown
page read and write
4291000
heap
page read and write
437D000
heap
page read and write
1B503000
heap
page read and write
D6D000
unkown
page read and write
7FFDA38B1000
unkown
page write copy
18ECB000
stack
page read and write
7FF670D7D000
unkown
page readonly
1FC6122B000
heap
page read and write
7FFDAC0A1000
unkown
page execute read
2F067F9000
stack
page read and write
2D0B000
direct allocation
page read and write
19752000
heap
page read and write
2F06FF7000
stack
page read and write
248E000
heap
page read and write
1E398FD1000
heap
page read and write
1DC75002000
heap
page read and write
530000
unkown
page execute and read and write
2D1A000
direct allocation
page read and write
18FB0000
direct allocation
page execute and read and write
7FFDAC0BC000
unkown
page read and write
1E399457000
heap
page read and write
4291000
heap
page read and write
2F077FF000
stack
page read and write
1B56D000
heap
page read and write
45BE000
stack
page read and write
4291000
heap
page read and write
1198000
heap
page read and write
4291000
heap
page read and write
4FBDD000
stack
page read and write
3D43000
heap
page read and write
D70000
unkown
page read and write
142A0000
remote allocation
page read and write
4291000
heap
page read and write
1B536000
heap
page read and write
4291000
heap
page read and write
1FC61302000
trusted library allocation
page read and write
1FC61400000
heap
page read and write
4291000
heap
page read and write
CEE000
unkown
page read and write
7FFDAC0F1000
unkown
page execute read
1E3993C9000
heap
page read and write
1E398B70000
heap
page read and write
25D4000
heap
page read and write
7FFDAC140000
unkown
page read and write
2ABC000
stack
page read and write
428E000
heap
page read and write
264D6350000
heap
page read and write
24B8000
heap
page read and write
18FA0000
heap
page read and write
12C9F750000
heap
page read and write
358FF000
heap
page read and write
4291000
heap
page read and write
1976F000
heap
page read and write
AAF687F000
stack
page read and write
129E000
stack
page read and write
2F057FF000
stack
page read and write
7FF62095E000
unkown
page readonly
1971F000
stack
page read and write
451E57F000
stack
page read and write
1E397F00000
heap
page read and write
2D7D000
direct allocation
page read and write
4291000
heap
page read and write
4291000
heap
page read and write
1B4FF000
heap
page read and write
2F049FE000
stack
page read and write
191C8000
direct allocation
page readonly
451E67E000
stack
page read and write
1B579000
heap
page read and write
25D4000
heap
page read and write
1084000
heap
page read and write
354F000
stack
page read and write
4291000
heap
page read and write
D76000
unkown
page read and write
27B35860000
heap
page read and write
CE5000
unkown
page read and write
EAD23FF000
stack
page read and write
2F077FD000
stack
page read and write
7FF670370000
unkown
page write copy
CF9000
unkown
page read and write
D00F000
stack
page read and write
142DE000
stack
page read and write
7FF670D87000
unkown
page read and write
DA0000
unkown
page write copy
25CE000
stack
page read and write
1B562000
heap
page read and write
1B54C000
heap
page read and write
1E3981D5000
heap
page read and write
2AFE000
stack
page read and write
19920000
trusted library allocation
page read and write
FDC000
heap
page read and write
2DA1000
direct allocation
page read and write
25D4000
heap
page read and write
2461000
unkown
page readonly
1E398FE2000
heap
page read and write
DA6000
unkown
page readonly
2CB2000
direct allocation
page read and write
44A2000
heap
page read and write
2F065FF000
stack
page read and write
1E397F46000
heap
page read and write
90DA5FB000
stack
page read and write
1E397F6A000
heap
page read and write
2C9B000
direct allocation
page read and write
1B54A000
heap
page read and write
2F055FE000
stack
page read and write
4291000
heap
page read and write
1B57D000
heap
page read and write
1FC61200000
unkown
page read and write
1AE4F765000
heap
page read and write
1B54E000
heap
page read and write
4291000
heap
page read and write
2B31B267000
heap
page read and write
2BD0000
heap
page read and write
3B860000
heap
page read and write
1E399032000
heap
page read and write
2C65000
heap
page read and write
2D31000
direct allocation
page read and write
19740000
heap
page read and write
7FF670D8B000
unkown
page readonly
7FF67096C000
unkown
page write copy
90DAD7E000
stack
page read and write
1B58E000
heap
page read and write
4291000
heap
page read and write
2F063FD000
stack
page read and write
90DB07E000
unkown
page readonly
2D8C000
direct allocation
page read and write
1DC75730000
trusted library allocation
page read and write
12C9F740000
heap
page read and write
7FFDA38C0000
unkown
page readonly
D97000
unkown
page read and write
19116000
direct allocation
page execute read
90DB47E000
unkown
page readonly
7FF670D85000
unkown
page read and write
D7F000
unkown
page read and write
2B40000
direct allocation
page execute and read and write
1FC61237000
heap
page read and write
1B5F9000
heap
page read and write
8E927F7000
stack
page read and write
7FF620950000
unkown
page readonly
2C53000
direct allocation
page read and write
7FFDA38AD000
unkown
page read and write
8E92BFF000
stack
page read and write
2D41000
direct allocation
page read and write
7FFDAC0A0000
unkown
page readonly
7FFDA38A4000
unkown
page readonly
27B35830000
heap
page read and write
7FF62095A000
unkown
page read and write
2F06BFF000
stack
page read and write
7FFDAC141000
unkown
page write copy
2F98F000
heap
page read and write
25D4000
heap
page read and write
2CF8000
direct allocation
page read and write
2CE0000
heap
page read and write
2CBF000
stack
page read and write
20100E35000
heap
page read and write
1B509000
heap
page read and write
29A18000
heap
page read and write
7FFD9409D000
unkown
page read and write
2CE7000
heap
page read and write
6C880000
unkown
page readonly
1B597000
heap
page read and write
2F07BFF000
stack
page read and write
2A7C000
stack
page read and write
19782000
heap
page read and write
2D57000
direct allocation
page read and write
4291000
heap
page read and write
4291000
heap
page read and write
451E47D000
stack
page read and write
2C60000
heap
page read and write
2F06FFF000
stack
page read and write
170000
heap
page read and write
7FFDAC0D1000
unkown
page execute read
4291000
heap
page read and write
20100A70000
heap
page read and write
4291000
heap
page read and write
18FB1000
direct allocation
page execute read
AAF677F000
stack
page read and write
264D6395000
heap
page read and write
1D4FFC90000
heap
page read and write
1AE4F790000
heap
page read and write
2F079FD000
stack
page read and write
7FFDAC134000
unkown
page readonly
1E398F79000
heap
page read and write
12C9F527000
heap
page read and write
CE3000
unkown
page read and write
90DAF7E000
stack
page read and write
1B54E000
heap
page read and write
1686D000
heap
page read and write
7FF670361000
unkown
page execute read
CC5000
unkown
page read and write
25D4000
heap
page read and write
7FF620958000
unkown
page read and write
F431079000
stack
page read and write
1977E000
heap
page read and write
1E399455000
heap
page read and write
7FF67096C000
unkown
page write copy
12C9F4D0000
heap
page read and write
1B600000
heap
page read and write
2D1C000
direct allocation
page read and write
6C7E0000
unkown
page readonly
252E000
heap
page read and write
4291000
heap
page read and write
19ACC000
stack
page read and write
1E399413000
heap
page read and write
1E397F8D000
heap
page read and write
7FFDA38C1000
unkown
page execute read
1E3993C4000
heap
page read and write
6CA65000
unkown
page readonly
7FFDAC133000
unkown
page read and write
CF9000
unkown
page read and write
90DAC7E000
unkown
page readonly
BBBFDBB000
stack
page read and write
1B556000
heap
page read and write
1B564000
heap
page read and write
1E39953E000
heap
page read and write
1B585000
heap
page read and write
F43092E000
stack
page read and write
191FA000
direct allocation
page readonly
1B57E000
heap
page read and write
25D4000
heap
page read and write
1B545000
heap
page read and write
1B597000
heap
page read and write
4291000
heap
page read and write
1160000
heap
page read and write
7FFDAC0C0000
unkown
page write copy
2580000
heap
page read and write
2C00000
direct allocation
page execute and read and write
25D4000
heap
page read and write
4291000
heap
page read and write
2F05DFE000
stack
page read and write
264D6447000
heap
page read and write
18C000
stack
page read and write
D06000
unkown
page write copy
7FFDAC0B3000
unkown
page readonly
7FFD93AC1000
unkown
page execute read
EAD237E000
unkown
page readonly
FD0000
heap
page read and write
1FC61513000
heap
page read and write
4291000
heap
page read and write
264D6438000
heap
page read and write
40D0000
trusted library allocation
page read and write
1B56D000
heap
page read and write
2CFF000
direct allocation
page read and write
1D4FFCB0000
heap
page read and write
2C7A000
direct allocation
page read and write
4291000
heap
page read and write
1B55F000
heap
page read and write
1E3993C7000
heap
page read and write
1FC61324000
heap
page read and write
7FFDA38D6000
unkown
page readonly
2F071F9000
stack
page read and write
401000
unkown
page execute read
7FFDAC10B000
unkown
page read and write
7FFDAC0BF000
unkown
page read and write
25D4000
heap
page read and write
20100B30000
heap
page read and write
7FFDAC10E000
unkown
page read and write
264D6430000
heap
page read and write
1AE4F750000
heap
page read and write
18F50000
trusted library allocation
page read and write
2CC3000
direct allocation
page read and write
2D06000
direct allocation
page read and write
25D4000
heap
page read and write
2CC3000
direct allocation
page read and write
3320000
direct allocation
page execute and read and write
2B30000
heap
page read and write
3347000
heap
page read and write
2B31B1F0000
heap
page read and write
1E3993B0000
heap
page read and write
2F069F9000
stack
page read and write
1B536000
heap
page read and write
2F04DFE000
stack
page read and write
4291000
heap
page read and write
7FF67096E000
unkown
page write copy
1D4FFFA0000
heap
page read and write
1E3994A4000
heap
page read and write
25D4000
heap
page read and write
1410C000
stack
page read and write
25D4000
heap
page read and write
2CD1000
direct allocation
page read and write
4291000
heap
page read and write
1B583000
heap
page read and write
1B59F000
heap
page read and write
1C5000
heap
page read and write
D94000
unkown
page read and write
250E000
heap
page read and write
25D4000
heap
page read and write
42B0000
heap
page read and write
7FFDAC120000
unkown
page readonly
1FC610C0000
heap
page read and write
264D644F000
heap
page read and write
440000
unkown
page write copy
344F000
stack
page read and write
2F063F7000
stack
page read and write
16830000
heap
page read and write
2BA0000
direct allocation
page execute and read and write
7FFDAC144000
unkown
page readonly
438000
unkown
page execute and read and write
7FF620941000
unkown
page execute read
7FF670371000
unkown
page write copy
2C8F000
direct allocation
page read and write
339F000
direct allocation
page execute and read and write
20100B41000
heap
page read and write
2D61000
direct allocation
page read and write
2F033FC000
stack
page read and write
2F063F9000
stack
page read and write
F4308AD000
stack
page read and write
D21000
unkown
page read and write
90DAE7E000
unkown
page readonly
25D4000
heap
page read and write
EAD1FED000
stack
page read and write
1AE4F7C0000
heap
page read and write
1FC61315000
trusted library allocation
page read and write
2F05FFB000
stack
page read and write
2CF8000
direct allocation
page read and write
1B536000
heap
page read and write
4291000
heap
page read and write
1B564000
heap
page read and write
2F06BF9000
stack
page read and write
12C9F745000
heap
page read and write
1AE4F7C9000
heap
page read and write
7FF620950000
unkown
page readonly
1E397E20000
heap
page read and write
1FC61502000
heap
page read and write
4220000
heap
page read and write
1B740000
heap
page read and write
2C88000
direct allocation
page read and write
D3B000
unkown
page read and write
2CDA000
direct allocation
page read and write
F430E7F000
stack
page read and write
1B55C000
heap
page read and write
12C9F4F0000
heap
page read and write
20100A60000
heap
page read and write
1B591000
heap
page read and write
2F035FE000
stack
page read and write
4291000
heap
page read and write
6C7E1000
unkown
page execute read
7FF67096E000
unkown
page write copy
1E399535000
heap
page read and write
1E398FD7000
heap
page read and write
430000
unkown
page execute and read and write
1B56D000
heap
page read and write
32DD000
stack
page read and write
1B5A3000
heap
page read and write
20100E30000
heap
page read and write
1E3994A0000
heap
page read and write
90DB27E000
unkown
page readonly
1B564000
heap
page read and write
1DC74FA0000
heap
page read and write
7FFDA38B0000
unkown
page read and write
8E929FE000
stack
page read and write
2F06BFD000
stack
page read and write
400000
unkown
page readonly
6CA1F000
unkown
page readonly
1E3994AE000
heap
page read and write
45FF000
stack
page read and write
14002D000
direct allocation
page read and write
1E398FCE000
heap
page read and write
1DC75013000
heap
page read and write
197C1000
heap
page read and write
D9C000
unkown
page write copy
1E397F4C000
heap
page read and write
607000
unkown
page execute and read and write
2F075FD000
stack
page read and write
6C86E000
unkown
page read and write
1977F000
heap
page read and write
1B552000
heap
page read and write
2D14000
direct allocation
page read and write
7FFDA38E4000
unkown
page write copy
7FFD94099000
unkown
page read and write
4291000
heap
page read and write
7FFDAC10F000
unkown
page write copy
25D4000
heap
page read and write
25D4000
heap
page read and write
7FFDAC0F0000
unkown
page readonly
1E397F71000
heap
page read and write
1A0000
heap
page read and write
1FC61239000
heap
page read and write
4291000
heap
page read and write
7FFD9409A000
unkown
page write copy
7FFDA38E3000
unkown
page read and write
1B5E6000
heap
page read and write
54F000
unkown
page execute and read and write
2BF0000
heap
page read and write
16921000
heap
page read and write
2F039FE000
stack
page read and write
19720000
heap
page read and write
7FFDA3890000
unkown
page readonly
CE6000
unkown
page read and write
248A000
heap
page read and write
1E3981DB000
heap
page read and write
3370000
direct allocation
page execute and read and write
D7F000
unkown
page read and write
There are 770 hidden memdumps, click here to show them.