IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files\RDP Wrapper\rdpwrap.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\AFHDGDGIID.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\GIIIIJDHJE.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\IDBAFHDGDG.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\66f5d9ab0d4c7_rdp[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\66f5db9e54794_vfkagks[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\66f5dbaca34ac_lfdnsafnds[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RDPWInst.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files\RDP Wrapper\rdpwrap.ini
Generic INItialization configuration [SLPolicy]
dropped
C:\ProgramData\BFBKFHIDHIIJ\CBAKJE
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\BFBKFHIDHIIJ\EBFHJE
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BFBKFHIDHIIJ\EBFHJE-shm
data
dropped
C:\ProgramData\BFBKFHIDHIIJ\EHDHID
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BFBKFHIDHIIJ\GDAAKK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BFBKFHIDHIIJ\GIEHJK
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\BFBKFHIDHIIJ\IDHIEB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BFBKFHIDHIIJ\IJECAE
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BFBKFHIDHIIJ\JJJJEB
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BFBKFHIDHIIJ\JJJJEB-shm
data
dropped
C:\ProgramData\BFBKFHIDHIIJ\KKFCFB
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BFBKFHIDHIIJ\KKKJEB
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\FCGCGDHJEGHJ\DAAFII
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\FCGCGDHJEGHJ\EHDHDH
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AFHDGDGIID.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GIIIIJDHJE.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\IDBAFHDGDG.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
ASCII text, with very long lines (65536), with no line terminators
modified
C:\Windows\System32\rfxvmt.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 29 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\IDBAFHDGDG.exe
"C:\ProgramData\IDBAFHDGDG.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\GIIIIJDHJE.exe
"C:\ProgramData\GIIIIJDHJE.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\AFHDGDGIID.exe
"C:\ProgramData\AFHDGDGIID.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net user
malicious
C:\Windows\SysWOW64\net.exe
net user
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c "C:\Users\user\AppData\Local\Temp\RDPWInst.exe" -i
malicious
C:\Users\user\AppData\Local\Temp\RDPWInst.exe
C:\Users\user\AppData\Local\Temp\RDPWInst.exe -i
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BFBKFHIDHIIJ" & exit
malicious
C:\Windows\System32\netsh.exe
netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net user RDPUser_fec8106a DlRcmVQWc0I6 /add
malicious
C:\Windows\SysWOW64\net.exe
net user RDPUser_fec8106a DlRcmVQWc0I6 /add
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net localgroup
malicious
C:\Windows\SysWOW64\net.exe
net localgroup
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
malicious
C:\Windows\SysWOW64\netsh.exe
netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net localgroup "Administrators" RDPUser_fec8106a /add
malicious
C:\Windows\SysWOW64\net.exe
net localgroup "Administrators" RDPUser_fec8106a /add
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net localgroup "Remote Desktop Users" RDPUser_fec8106a /add
malicious
C:\Windows\SysWOW64\net.exe
net localgroup "Remote Desktop Users" RDPUser_fec8106a /add
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 user
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
C:\Windows\System32\drivers\rdpvideominiport.sys
C:\Windows\System32\drivers\rdpdr.sys
C:\Windows\System32\drivers\tsusbhub.sys
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 user RDPUser_fec8106a DlRcmVQWc0I6 /add
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 localgroup
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 localgroup "Administrators" RDPUser_fec8106a /add
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 localgroup "Remote Desktop Users" RDPUser_fec8106a /add
There are 33 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://5.75.211.162/CGDHJEGHJ
unknown
malicious
https://5.75.211.162/V3
unknown
malicious
stogeneratmns.shop
malicious
http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exe1kkkk1220577http://147.45.44.104/prog/66f5db9e
unknown
malicious
https://5.75.211.162/sqlp.dllI
unknown
malicious
https://reinforcenh.shop/api
172.67.208.139
malicious
https://5.75.211.162/vcruntime140.dll
5.75.211.162
malicious
wallkedsleeoi.shop
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://stogeneratmns.shop/
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
fragnantbui.shop
malicious
offensivedzvju.shop
malicious
https://stogeneratmns.shop/api1
unknown
malicious
https://stogeneratmns.shop:443/api
unknown
malicious
https://steamcommunity.com/profiles/76561199780418869
104.102.49.254
malicious
https://reinforcenh.shop/apiO
unknown
malicious
https://5.75.211.162/softokn3.dll
5.75.211.162
malicious
https://stogeneratmns.shop/api
188.114.97.3
malicious
https://ghostreedmnu.shop/api
188.114.97.3
malicious
https://5.75.211.162/
5.75.211.162
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/profiles/76561199780418869G
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=B0lGn8MokmdT&l=e
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.0
unknown
https://5.75.211.162/sqlp.dllB
unknown
https://5.75.211.162/sqlp.dllV
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://s.ytimg.com;
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://fragnantbui.shop/
unknown
https://steamcommunity.com/profiles/76561199780418869.
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=WnGP
unknown
http://cowod.hoptoFIEHJDB
unknown
http://www.entrust.net/rpa03
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.ecosia.org/newtab/
unknown
https://www.youtube.com/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exe
147.45.44.104
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://5.75.211.162AEBFC
unknown
https://www.google.com/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://5.75.211.162a
unknown
https://help.steampowered.com/en/
unknown
https://community.akamai.steamstatic.com/
unknown
https://5.75.211.162/g
unknown
https://steamcommunity.com/profiles/76561199780418869/inventory/
unknown
https://5.75.211.162/mozglue.dllX
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=nSnUuYf7g6U1&a
unknown
https://steamcommunity.com/L
unknown
https://drawzhotdog.shop:443/api:
unknown
http://147.45.44.104/prog/66f5db9e54794_vfkagks.exem-data;
unknown
https://fragnantbui.shop:443/api
unknown
https://5.75.211.162/:3#
unknown
https://5.75.211.162/freebl3.dlll
unknown
https://steamcommunity.com/I
unknown
http://147.45.44.104
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exeata;
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://raw.githubusercontent.com/stascorp/rdpwrap/master/res/rdpwrap.iniU
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://reinforcenh.shop/.itb
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199780418869
unknown
http://aia.entrust.net/ts1-chain256.cer01
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
http://hansgborn.eu
unknown
https://5.75.211.1620.5938.132
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://api.steampowered.com/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
http://api.ipify.orgd
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
http://cowod.hopto.org
unknown
http://hansgborn.eud
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fragnantbui.shop
188.114.96.3
malicious
gutterydhowi.shop
104.21.4.136
malicious
cowod.hopto.org
45.132.206.251
malicious
offensivedzvju.shop
188.114.96.3
malicious
drawzhotdog.shop
172.67.162.108
malicious
ghostreedmnu.shop
188.114.97.3
malicious
ballotnwu.site
172.67.128.144
malicious
wallkedsleeoi.shop
104.21.36.139
malicious
hansgborn.eu
188.114.96.3
malicious
steamcommunity.com
104.102.49.254
malicious
stogeneratmns.shop
188.114.97.3
malicious
reinforcenh.shop
172.67.208.139
malicious
vozmeatillu.shop
188.114.97.3
malicious
api.ipify.org
104.26.13.205
There are 4 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
8.46.123.33
unknown
United States
malicious
45.132.206.251
cowod.hopto.org
Russian Federation
malicious
172.67.208.139
reinforcenh.shop
United States
malicious
104.21.4.136
gutterydhowi.shop
United States
malicious
188.114.97.3
ghostreedmnu.shop
European Union
malicious
172.67.162.108
drawzhotdog.shop
United States
malicious
172.67.128.144
ballotnwu.site
United States
malicious
104.21.36.139
wallkedsleeoi.shop
United States
malicious
188.114.96.3
fragnantbui.shop
European Union
malicious
104.102.49.254
steamcommunity.com
United States
malicious
5.75.211.162
unknown
Germany
malicious
147.45.44.104
unknown
Russian Federation
239.255.255.250
unknown
Reserved
104.26.13.205
api.ipify.org
United States
There are 4 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\Licensing Core
EnableConcurrentSessions
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters
ServiceDll
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server
fDenyTSConnections
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AFHDGDGIID_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AFHDGDGIID_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AFHDGDGIID_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AFHDGDGIID_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AFHDGDGIID_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AFHDGDGIID_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AFHDGDGIID_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AFHDGDGIID_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AFHDGDGIID_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AFHDGDGIID_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AFHDGDGIID_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AFHDGDGIID_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AFHDGDGIID_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AFHDGDGIID_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
AllowMultipleTSSessions
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tsusbhub\Parameters\Wdf
WdfMajorVersion
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tsusbhub\Parameters\Wdf
WdfMinorVersion
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{191a5137-7c9d-43c0-a943-de4411f424f7}\##?#TS_USB_HUB_Enumerator#UMB#2&30d3618&0&TS_USB_HUB#{191a5137-7c9d-43c0-a943-de4411f424f7}
DeviceInstance
There are 26 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
450000
unkown
page readonly
malicious
7EC000
heap
page read and write
malicious
450000
unkown
page readonly
malicious
B92000
unkown
page readonly
malicious
400000
remote allocation
page execute and read and write
malicious
2F51000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3485000
trusted library allocation
page read and write
malicious
3D45000
trusted library allocation
page read and write
malicious
2DC0000
heap
page read and write
120DD000
stack
page read and write
30FC000
trusted library allocation
page read and write
2900000
heap
page read and write
3452000
trusted library allocation
page read and write
AB5000
heap
page read and write
1F896000
direct allocation
page execute read
1075000
heap
page read and write
2F4E000
stack
page read and write
2006E000
stack
page read and write
2BE0000
heap
page read and write
74D000
stack
page read and write
8D0000
heap
page read and write
820000
heap
page read and write
CED000
heap
page read and write
E0E000
stack
page read and write
1FC08000
direct allocation
page execute read
2D10000
heap
page read and write
3017000
trusted library allocation
page read and write
3039000
trusted library allocation
page read and write
2DAF000
stack
page read and write
4F8000
stack
page read and write
3A0000
heap
page read and write
B10000
heap
page read and write
4E3E000
stack
page read and write
D2F000
stack
page read and write
5E5B000
heap
page read and write
30A5000
heap
page read and write
5ABE000
stack
page read and write
92C000
stack
page read and write
700000
heap
page read and write
A60000
trusted library allocation
page read and write
138D000
trusted library allocation
page execute and read and write
33BD000
heap
page read and write
23FE000
unkown
page read and write
304E000
stack
page read and write
6C0E000
stack
page read and write
19933000
heap
page read and write
EFE000
heap
page read and write
563000
remote allocation
page execute and read and write
560000
heap
page read and write
6E6000
heap
page read and write
A10000
direct allocation
page read and write
1373000
trusted library allocation
page execute and read and write
D37000
trusted library allocation
page execute and read and write
2B6D000
stack
page read and write
D3B000
trusted library allocation
page execute and read and write
AB8000
direct allocation
page read and write
2BAD000
stack
page read and write
26DF000
stack
page read and write
698D000
stack
page read and write
116E000
heap
page read and write
4BC000
stack
page read and write
24DB000
direct allocation
page read and write
7BF000
heap
page read and write
1724C000
stack
page read and write
3398000
heap
page read and write
5BD000
stack
page read and write
2950000
heap
page read and write
9C000
stack
page read and write
2F90000
heap
page read and write
195FB000
heap
page read and write
2F10000
heap
page read and write
2E40000
heap
page read and write
2FD9000
heap
page read and write
3481000
trusted library allocation
page read and write
1FDC5000
direct allocation
page execute read
382F000
stack
page read and write
BA4000
unkown
page readonly
2D3E000
stack
page read and write
400000
unkown
page readonly
2D18000
heap
page read and write
55FE000
stack
page read and write
2EF7000
heap
page read and write
2CDF000
stack
page read and write
2360000
heap
page read and write
C10000
heap
page read and write
32FF000
unkown
page read and write
D5B000
heap
page read and write
597E000
stack
page read and write
2F5E000
stack
page read and write
36CE000
stack
page read and write
CA0000
heap
page read and write
970000
heap
page read and write
2AA8000
heap
page read and write
50E000
remote allocation
page execute and read and write
3310000
heap
page read and write
B2A000
trusted library allocation
page execute and read and write
193DE000
heap
page read and write
CBA000
heap
page read and write
5F7E000
stack
page read and write
2DB5000
heap
page read and write
8EF000
stack
page read and write
2EFD000
stack
page read and write
31DF000
stack
page read and write
2D43000
trusted library allocation
page read and write
9AD000
stack
page read and write
2F90000
heap
page read and write
3464000
trusted library allocation
page read and write
13A2000
trusted library allocation
page read and write
28BE000
stack
page read and write
B41000
direct allocation
page read and write
33B1000
trusted library allocation
page read and write
6C360000
unkown
page read and write
33B5000
heap
page read and write
2483000
trusted library allocation
page read and write
750000
heap
page read and write
9E1000
heap
page read and write
5E8F000
heap
page read and write
22E2000
heap
page read and write
97A000
heap
page read and write
303F000
trusted library allocation
page read and write
2511000
direct allocation
page read and write
44B000
unkown
page read and write
14BCE000
stack
page read and write
2DBC000
heap
page read and write
13AB000
trusted library allocation
page execute and read and write
990000
heap
page read and write
29E0000
heap
page read and write
31DF000
stack
page read and write
5A7E000
stack
page read and write
1AC000
stack
page read and write
3033000
trusted library allocation
page read and write
6C31F000
unkown
page readonly
1FDD4000
direct allocation
page execute read
55A000
remote allocation
page execute and read and write
30BB000
heap
page read and write
24AF000
stack
page read and write
2EFD000
stack
page read and write
900000
heap
page read and write
A14000
direct allocation
page read and write
B58000
heap
page read and write
44C000
unkown
page write copy
A1C000
stack
page read and write
36B5000
heap
page read and write
338E000
stack
page read and write
25EE000
stack
page read and write
33D5000
trusted library allocation
page read and write
3123000
heap
page read and write
2CD8000
trusted library allocation
page read and write
B48000
direct allocation
page read and write
6840000
heap
page read and write
88E000
stack
page read and write
302F000
trusted library allocation
page read and write
33C5000
trusted library allocation
page read and write
1973E000
stack
page read and write
590000
heap
page read and write
E55000
heap
page read and write
1DD000
stack
page read and write
19A8C000
stack
page read and write
DE1000
heap
page read and write
4DA000
remote allocation
page execute and read and write
2520000
direct allocation
page read and write
1410000
heap
page read and write
1160000
heap
page read and write
2B32000
heap
page read and write
1010F000
stack
page read and write
1983C000
heap
page read and write
368F000
unkown
page read and write
CF8000
stack
page read and write
137D000
trusted library allocation
page execute and read and write
2A2E000
unkown
page read and write
AC7000
direct allocation
page read and write
1F738000
direct allocation
page execute read
11CE000
stack
page read and write
7FC20000
direct allocation
page read and write
33BE000
trusted library allocation
page read and write
2AA0000
heap
page read and write
5FFE000
stack
page read and write
2481000
trusted library allocation
page execute and read and write
5E53000
heap
page read and write
2F8F000
stack
page read and write
2340000
trusted library allocation
page execute and read and write
303B000
trusted library allocation
page read and write
2FC8000
heap
page read and write
22B0000
heap
page read and write
3015000
trusted library allocation
page read and write
1211D000
stack
page read and write
7B0000
heap
page read and write
8F0000
trusted library allocation
page read and write
820000
heap
page read and write
1483B000
stack
page read and write
2BC0000
heap
page read and write
44D000
unkown
page write copy
3365000
heap
page read and write
1FE26000
direct allocation
page readonly
33B7000
trusted library allocation
page read and write
4C34D000
stack
page read and write
615E000
stack
page read and write
662E000
unkown
page read and write
1426000
heap
page read and write
3320000
heap
page read and write
1410000
trusted library allocation
page execute and read and write
74F000
stack
page read and write
B5D000
heap
page read and write
AD5000
direct allocation
page read and write
33E1000
heap
page read and write
9A0000
heap
page read and write
2960000
heap
page read and write
8AC000
heap
page read and write
12CF000
stack
page read and write
135F000
stack
page read and write
30A0000
heap
page read and write
B3C000
stack
page read and write
2BDD000
stack
page read and write
197CE000
heap
page read and write
B20000
heap
page read and write
1070000
heap
page read and write
5A1000
remote allocation
page execute and read and write
FA0000
trusted library allocation
page read and write
9610000
unclassified section
page read and write
467000
remote allocation
page execute and read and write
2B93000
heap
page read and write
2E40000
heap
page read and write
1F730000
direct allocation
page execute and read and write
EAB000
trusted library allocation
page execute and read and write
A87000
trusted library allocation
page execute and read and write
2AED000
stack
page read and write
3390000
heap
page read and write
A8B000
trusted library allocation
page execute and read and write
3456000
trusted library allocation
page read and write
22C0000
heap
page read and write
32A0000
heap
page read and write
463000
remote allocation
page execute and read and write
9C8000
heap
page read and write
A54000
trusted library allocation
page read and write
19442000
heap
page read and write
199DC000
heap
page read and write
36B0000
heap
page read and write
1934F000
stack
page read and write
1380000
trusted library allocation
page read and write
15E000
unkown
page readonly
33E7000
trusted library allocation
page read and write
33E3000
trusted library allocation
page read and write
100000
unkown
page readonly
1067000
heap
page read and write
197D5000
heap
page read and write
832000
unkown
page readonly
16E0E000
stack
page read and write
B73000
heap
page read and write
C70000
heap
page read and write
2980000
heap
page read and write
19AFD000
stack
page read and write
25D02000
heap
page read and write
2CA0000
heap
page read and write
1FE0D000
direct allocation
page execute read
2350000
trusted library allocation
page read and write
6C181000
unkown
page execute read
DED000
stack
page read and write
1370000
trusted library allocation
page read and write
2ECE000
stack
page read and write
B14000
trusted library allocation
page read and write
AEE000
stack
page read and write
32F0000
heap
page read and write
59C000
stack
page read and write
90E000
stack
page read and write
3037000
trusted library allocation
page read and write
51D000
stack
page read and write
19830000
heap
page read and write
2B1C000
heap
page read and write
19C9C000
heap
page read and write
33B6000
heap
page read and write
4E8000
remote allocation
page execute and read and write
920000
heap
page read and write
3330000
heap
page read and write
A13000
heap
page read and write
2BC7A000
heap
page read and write
19930000
heap
page read and write
357F000
stack
page read and write
33C0000
heap
page read and write
2E40000
heap
page read and write
2B0E000
unkown
page read and write
D4F000
heap
page read and write
2EBD000
stack
page read and write
34BA000
trusted library allocation
page read and write
294E000
stack
page read and write
445000
unkown
page write copy
FC0000
heap
page read and write
6A0000
heap
page read and write
AA0000
heap
page read and write
2FC0000
heap
page read and write
AAE000
stack
page read and write
5A1000
remote allocation
page execute and read and write
7FD00000
direct allocation
page read and write
94E000
stack
page read and write
11A0000
heap
page read and write
60FE000
stack
page read and write
5C0000
heap
page read and write
6C172000
unkown
page readonly
6C0E1000
unkown
page execute read
2B35000
heap
page read and write
291D000
stack
page read and write
2B95000
heap
page read and write
3080000
heap
page read and write
3100000
heap
page read and write
48DD000
stack
page read and write
628000
heap
page read and write
240F000
stack
page read and write
2E3D000
stack
page read and write
27D0000
heap
page execute and read and write
3462000
trusted library allocation
page read and write
102000
unkown
page readonly
652E000
unkown
page read and write
329F000
stack
page read and write
333D000
stack
page read and write
2EF0000
heap
page read and write
300E000
unkown
page read and write
AF0000
heap
page read and write
EA7000
trusted library allocation
page execute and read and write
2BE0000
heap
page read and write
33CB000
heap
page read and write
800000
heap
page read and write
1F97F000
direct allocation
page readonly
33A5000
heap
page read and write
103E000
stack
page read and write
3458000
trusted library allocation
page read and write
2EF0000
heap
page read and write
AB0000
heap
page read and write
2DFE000
stack
page read and write
25AD000
stack
page read and write
870000
heap
page read and write
6C0E0000
unkown
page readonly
900000
heap
page read and write
2470000
heap
page execute and read and write
1BC000
stack
page read and write
3031000
trusted library allocation
page read and write
51F000
remote allocation
page execute and read and write
1981F000
stack
page read and write
45D000
remote allocation
page execute and read and write
304E000
stack
page read and write
303D000
trusted library allocation
page read and write
302F000
stack
page read and write
666E000
stack
page read and write
2ED0000
heap
page read and write
286F000
unkown
page read and write
A80000
heap
page read and write
2DB0000
heap
page read and write
2D0F000
unkown
page read and write
3370000
heap
page read and write
19B000
stack
page read and write
30B0000
heap
page read and write
9E0000
heap
page read and write
33B0000
heap
page read and write
670000
remote allocation
page execute and read and write
63A000
remote allocation
page execute and read and write
1392000
trusted library allocation
page read and write
918000
heap
page read and write
E80000
trusted library allocation
page read and write
3099000
trusted library allocation
page read and write
A64000
trusted library allocation
page read and write
102E000
stack
page read and write
37E1000
trusted library allocation
page read and write
27E1000
trusted library allocation
page execute and read and write
3408000
trusted library allocation
page read and write
E73000
trusted library allocation
page execute and read and write
4CE000
remote allocation
page execute and read and write
E10000
heap
page read and write
625F000
stack
page read and write
32BD000
stack
page read and write
D2B000
heap
page read and write
14CCF000
stack
page read and write
D01000
heap
page read and write
7B0000
heap
page read and write
14D0D000
stack
page read and write
6C16E000
unkown
page read and write
32FD000
stack
page read and write
6A0000
heap
page read and write
AF2000
direct allocation
page read and write
6100000
trusted library allocation
page read and write
1060000
heap
page read and write
30AF000
stack
page read and write
9EE000
stack
page read and write
E9A000
trusted library allocation
page execute and read and write
5D3E000
stack
page read and write
9E9000
heap
page read and write
229E000
stack
page read and write
AF5000
heap
page read and write
1168000
heap
page read and write
620000
heap
page read and write
A4E000
stack
page read and write
656000
heap
page read and write
91A000
heap
page read and write
2B92000
heap
page read and write
1264D000
stack
page read and write
88D000
heap
page read and write
666000
heap
page read and write
152F000
stack
page read and write
2DE0000
trusted library allocation
page read and write
2E50000
heap
page read and write
E50000
heap
page read and write
1465D000
stack
page read and write
B38000
heap
page read and write
2E3D000
stack
page read and write
2B5D000
stack
page read and write
401000
unkown
page execute read
19362000
heap
page read and write
FFE000
stack
page read and write
30FE000
stack
page read and write
9EF000
stack
page read and write
1F93F000
direct allocation
page readonly
445000
unkown
page read and write
6D4E000
stack
page read and write
272D000
stack
page read and write
1989D000
heap
page read and write
19B80000
heap
page read and write
345A000
trusted library allocation
page read and write
2FA0000
heap
page read and write
AF9000
direct allocation
page read and write
1FD66000
direct allocation
page execute read
6EE000
stack
page read and write
45F6E000
stack
page read and write
CAA000
heap
page read and write
29D0000
heap
page read and write
563000
remote allocation
page execute and read and write
28FD000
stack
page read and write
62E000
heap
page read and write
B1E000
stack
page read and write
1420000
heap
page read and write
1FE46000
direct allocation
page read and write
194BB000
stack
page read and write
6B0E000
stack
page read and write
3340000
heap
page read and write
593E000
stack
page read and write
900000
heap
page read and write
B32000
stack
page read and write
54DE000
stack
page read and write
2E8E000
stack
page read and write
A2D000
stack
page read and write
30C8000
heap
page read and write
37B54000
heap
page read and write
669000
heap
page read and write
283D000
stack
page read and write
543E000
stack
page read and write
2F10000
heap
page read and write
3121000
heap
page read and write
2A30000
heap
page read and write
33E5000
heap
page read and write
CD1000
heap
page read and write
63A000
remote allocation
page execute and read and write
2FA7000
trusted library allocation
page read and write
122D000
heap
page read and write
B10000
trusted library allocation
page read and write
2BBE000
stack
page read and write
AEB000
direct allocation
page read and write
329F000
stack
page read and write
AF0000
heap
page read and write
24B1000
direct allocation
page read and write
D55000
heap
page read and write
2F97000
trusted library allocation
page read and write
69CC000
stack
page read and write
193D6000
heap
page read and write
2F30000
heap
page read and write
639D000
stack
page read and write
810000
heap
page read and write
2DDE000
heap
page read and write
345C000
trusted library allocation
page read and write
2C1F000
stack
page read and write
688E000
stack
page read and write
770000
heap
page read and write
1998B000
stack
page read and write
BC000
stack
page read and write
2BF0000
heap
page read and write
56FE000
stack
page read and write
4C8000
remote allocation
page execute and read and write
2B7C000
heap
page read and write
1FD95000
direct allocation
page execute read
2B5D000
stack
page read and write
3330000
heap
page read and write
1937D000
heap
page read and write
1FE13000
direct allocation
page readonly
22CB000
heap
page read and write
22E3000
heap
page read and write
E00000
heap
page read and write
2BCF000
stack
page read and write
34C0000
heap
page read and write
B80000
heap
page read and write
C60000
heap
page read and write
2AC0000
heap
page read and write
B08000
direct allocation
page read and write
1FE3B000
direct allocation
page readonly
DD000
stack
page read and write
2E00000
trusted library section
page read and write
5FBE000
stack
page read and write
3050000
heap
page read and write
195BB000
stack
page read and write
96E000
stack
page read and write
22A0000
heap
page read and write
2BD000
stack
page read and write
3466000
trusted library allocation
page read and write
29CE000
unkown
page read and write
199DA000
heap
page read and write
3097000
trusted library allocation
page read and write
1FE2B000
direct allocation
page readonly
2DC3000
heap
page read and write
2990000
heap
page read and write
CCE000
heap
page read and write
3454000
trusted library allocation
page read and write
1FDD6000
direct allocation
page execute read
147DF000
stack
page read and write
910000
heap
page read and write
F33000
heap
page read and write
6C35F000
unkown
page write copy
2DAC000
stack
page read and write
4EF000
remote allocation
page execute and read and write
E74000
trusted library allocation
page read and write
32A0000
heap
page read and write
270E000
stack
page read and write
7FD70000
direct allocation
page read and write
2DDE000
heap
page read and write
310C000
heap
page read and write
5B8000
stack
page read and write
6A9E000
stack
page read and write
6C4E000
stack
page read and write
7CB000
heap
page read and write
19915000
heap
page read and write
1F731000
direct allocation
page execute read
33D000
stack
page read and write
875000
heap
page read and write
1936C000
heap
page read and write
840000
heap
page read and write
D65000
heap
page read and write
6ED000
heap
page read and write
584000
remote allocation
page execute and read and write
33A6000
trusted library allocation
page read and write
19B3E000
stack
page read and write
3EE000
stack
page read and write
8FDF000
stack
page read and write
46B000
remote allocation
page execute and read and write
DCB000
heap
page read and write
5E8C000
heap
page read and write
59D000
stack
page read and write
338E000
unkown
page read and write
AB0000
heap
page read and write
4D4000
remote allocation
page execute and read and write
16D7C000
stack
page read and write
910000
heap
page read and write
A2E000
stack
page read and write
2D41000
trusted library allocation
page execute and read and write
301A000
trusted library allocation
page read and write
2F9E000
stack
page read and write
E03000
heap
page read and write
AF0000
trusted library allocation
page read and write
1FE0F000
direct allocation
page readonly
2EBD000
stack
page read and write
25AD000
stack
page read and write
FA0000
heap
page read and write
5E59000
heap
page read and write
2EF0000
heap
page read and write
B65000
heap
page read and write
9B10000
heap
page read and write
460000
remote allocation
page execute and read and write
2DB0000
heap
page read and write
30B0000
heap
page read and write
193CD000
heap
page read and write
5E5D000
heap
page read and write
2BBE000
stack
page read and write
2B5F000
unkown
page read and write
2CBF000
stack
page read and write
3068000
heap
page read and write
6C180000
unkown
page readonly
504D000
stack
page read and write
E3C000
stack
page read and write
1FC000
stack
page read and write
340F000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
14B8E000
stack
page read and write
308F000
stack
page read and write
2BD0000
heap
page read and write
34AA000
trusted library allocation
page read and write
2D4E000
stack
page read and write
A53000
trusted library allocation
page execute and read and write
1390000
trusted library allocation
page read and write
B30000
heap
page read and write
B00000
heap
page read and write
1360000
trusted library allocation
page read and write
B3E000
heap
page read and write
D1F000
heap
page read and write
33B0000
heap
page read and write
5CFE000
stack
page read and write
302D000
trusted library allocation
page read and write
BEE000
stack
page read and write
19832000
heap
page read and write
506000
remote allocation
page execute and read and write
9E5000
heap
page read and write
1FDDA000
direct allocation
page execute read
3460000
trusted library allocation
page read and write
31BEE000
heap
page read and write
92D000
heap
page read and write
317F000
stack
page read and write
64E000
heap
page read and write
ED0000
trusted library allocation
page execute and read and write
1374000
trusted library allocation
page read and write
1FDCD000
direct allocation
page execute read
E86000
trusted library allocation
page read and write
5BFE000
stack
page read and write
8D8000
heap
page read and write
8CE000
heap
page read and write
A7A000
trusted library allocation
page execute and read and write
EF0000
heap
page read and write
A4E000
stack
page read and write
83F000
stack
page read and write
1040000
heap
page execute and read and write
246E000
stack
page read and write
32F5000
heap
page read and write
3DACD000
heap
page read and write
5BBE000
stack
page read and write
1FC4A000
direct allocation
page execute read
B0F000
direct allocation
page read and write
A50000
heap
page read and write
AC0000
direct allocation
page read and write
646E000
stack
page read and write
8A1000
heap
page read and write
9DC000
stack
page read and write
2D30000
heap
page read and write
33E3000
heap
page read and write
E60000
trusted library allocation
page read and write
2F0E000
stack
page read and write
31C0000
heap
page read and write
1F97A000
direct allocation
page readonly
77A000
heap
page read and write
2CAE000
stack
page read and write
13C0000
trusted library allocation
page read and write
297D000
stack
page read and write
F24000
heap
page read and write
820000
heap
page read and write
369F000
stack
page read and write
24BC000
direct allocation
page read and write
7FDE0000
direct allocation
page read and write
1AE000
stack
page read and write
582000
remote allocation
page execute and read and write
ADC000
direct allocation
page read and write
D46000
heap
page read and write
790000
heap
page read and write
4F6000
remote allocation
page execute and read and write
3060000
heap
page read and write
401000
unkown
page execute read
DA1000
heap
page read and write
9510000
heap
page read and write
5E84000
heap
page read and write
5E6E000
heap
page read and write
140E000
stack
page read and write
1F972000
direct allocation
page read and write
1194000
heap
page read and write
CC5000
heap
page read and write
2CFE000
stack
page read and write
30D1000
heap
page read and write
3F51000
trusted library allocation
page read and write
B70000
heap
page read and write
52D000
remote allocation
page execute and read and write
3035000
trusted library allocation
page read and write
139A000
trusted library allocation
page execute and read and write
35DF000
stack
page read and write
2CFD000
stack
page read and write
6C365000
unkown
page readonly
6C35E000
unkown
page read and write
6ACA000
stack
page read and write
2B90000
heap
page read and write
6E0000
heap
page read and write
9B20000
heap
page read and write
3041000
trusted library allocation
page read and write
108E000
stack
page read and write
45BE000
stack
page read and write
2910000
heap
page read and write
1F93D000
direct allocation
page execute read
73E000
stack
page read and write
4FE000
remote allocation
page execute and read and write
EF8000
heap
page read and write
287D000
stack
page read and write
B03000
trusted library allocation
page execute and read and write
26EF000
stack
page read and write
ACE000
stack
page read and write
53D000
stack
page read and write
AAF000
stack
page read and write
19862000
heap
page read and write
19460000
heap
page read and write
D60000
heap
page read and write
27E3000
trusted library allocation
page read and write
B16000
trusted library allocation
page read and write
2E00000
heap
page read and write
2BFF000
stack
page read and write
30C0000
heap
page read and write
146DE000
stack
page read and write
6D8E000
stack
page read and write
22E5000
heap
page read and write
2760000
heap
page read and write
570000
heap
page read and write
3F0000
heap
page read and write
13A7000
trusted library allocation
page execute and read and write
1938E000
heap
page read and write
197B0000
heap
page read and write
37E5000
trusted library allocation
page read and write
345E000
trusted library allocation
page read and write
3340000
heap
page read and write
2B70000
heap
page read and write
3210000
heap
page read and write
467000
remote allocation
page execute and read and write
1FD91000
heap
page read and write
CD7000
heap
page read and write
1F948000
direct allocation
page readonly
2DB0000
heap
page execute and read and write
516000
remote allocation
page execute and read and write
9A0000
heap
page read and write
48C0000
heap
page read and write
2A50000
heap
page read and write
1187000
heap
page read and write
2930000
heap
page read and write
323D000
stack
page read and write
642E000
stack
page read and write
FA5E000
stack
page read and write
3D41000
trusted library allocation
page read and write
95DF000
stack
page read and write
9520000
heap
page read and write
1FE36000
direct allocation
page readonly
4C00B000
stack
page read and write
910000
heap
page read and write
307F000
unkown
page read and write
528000
remote allocation
page execute and read and write
DFA000
heap
page read and write
2F10000
heap
page read and write
29F0000
heap
page read and write
2F60000
heap
page read and write
5B0000
heap
page read and write
1985E000
heap
page read and write
2B10000
heap
page read and write
A80000
heap
page read and write
463000
remote allocation
page execute and read and write
FB5F000
stack
page read and write
ACE000
direct allocation
page read and write
B60000
heap
page read and write
A3C000
stack
page read and write
A37000
direct allocation
page read and write
A66000
trusted library allocation
page read and write
6C15D000
unkown
page readonly
1984D000
heap
page read and write
2A3F000
stack
page read and write
2BCF000
stack
page read and write
13CE000
stack
page read and write
1396000
trusted library allocation
page execute and read and write
549E000
stack
page read and write
3720000
heap
page read and write
3360000
heap
page read and write
5B5000
heap
page read and write
1FC6B000
stack
page read and write
AAE000
stack
page read and write
B0F000
stack
page read and write
300E000
stack
page read and write
282D000
stack
page read and write
32AF000
unkown
page read and write
30D5000
heap
page read and write
10C0000
heap
page read and write
11A3000
heap
page read and write
2CA5000
heap
page read and write
33FF000
stack
page read and write
900000
heap
page read and write
EE0000
trusted library allocation
page read and write
44BE000
stack
page read and write
FB0000
heap
page read and write
2E08000
heap
page read and write
C5E000
stack
page read and write
32FE000
stack
page read and write
8FC000
stack
page read and write
13A0000
trusted library allocation
page read and write
317F000
stack
page read and write
1FC73000
direct allocation
page execute read
6830000
heap
page read and write
5E40000
heap
page read and write
3390000
heap
page read and write
3215000
heap
page read and write
33BB000
trusted library allocation
page read and write
11E0000
heap
page read and write
55D000
remote allocation
page execute and read and write
4C2000
remote allocation
page execute and read and write
DAE000
stack
page read and write
1FE6F000
heap
page read and write
400000
unkown
page readonly
FB9D000
stack
page read and write
709E000
stack
page read and write
D4C000
heap
page read and write
F1C000
heap
page read and write
91E000
heap
page read and write
321E000
stack
page read and write
321E000
stack
page read and write
54F0000
heap
page execute and read and write
64BE000
unkown
page read and write
98E000
stack
page read and write
94E000
stack
page read and write
DF0000
trusted library allocation
page execute and read and write
F35000
stack
page read and write
E84000
trusted library allocation
page read and write
582000
remote allocation
page execute and read and write
CB0000
heap
page read and write
6E8E000
stack
page read and write
830000
unkown
page readonly
5E3E000
stack
page read and write
9A5000
heap
page read and write
2250000
trusted library allocation
page read and write
2FCD000
stack
page read and write
6A5E000
stack
page read and write
B90000
unkown
page readonly
DEE000
heap
page read and write
5FE000
stack
page read and write
898000
heap
page read and write
4C10C000
stack
page read and write
55E000
remote allocation
page execute and read and write
A15000
heap
page read and write
7DD000
heap
page read and write
629E000
stack
page read and write
2F5E000
unkown
page read and write
446000
unkown
page write copy
19C8D000
stack
page read and write
649000
heap
page read and write
2E20000
trusted library allocation
page read and write
447000
unkown
page read and write
2E4F000
stack
page read and write
361E000
stack
page read and write
2F98000
heap
page read and write
9C10000
unclassified section
page read and write
AA0000
heap
page read and write
5E7E000
heap
page read and write
78E000
stack
page read and write
172DE000
stack
page read and write
46B000
remote allocation
page execute and read and write
8BF000
stack
page read and write
1FE42000
direct allocation
page read and write
4E1000
remote allocation
page execute and read and write
B04000
trusted library allocation
page read and write
2F70000
heap
page read and write
6B0000
heap
page read and write
1F97D000
direct allocation
page readonly
337D000
stack
page read and write
2C5E000
stack
page read and write
There are 830 hidden memdumps, click here to show them.