IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files\RDP Wrapper\rdpwrap.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\BGDGHJEHJJ.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\BKJKEBGDHD.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\GIJEGDAKEH.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\66f5db9e54794_vfkagks[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\66f5dbaca34ac_lfdnsafnds[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\66f5de72d9ebd_rdp[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RDPWInst.exe
PE32 executable (console) Intel 80386, for MS Windows
modified
malicious
C:\Program Files\RDP Wrapper\rdpwrap.ini
Generic INItialization configuration [SLPolicy]
dropped
C:\ProgramData\BAFIEGIECGCB\BAFIEG
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\ECBGHCGCBKFI\AAEBAF
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\ECBGHCGCBKFI\BKECFI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\ECBGHCGCBKFI\CAFBGH
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\ECBGHCGCBKFI\CFBAKK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\ECBGHCGCBKFI\FBGCAA
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\ECBGHCGCBKFI\FBKECF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\ECBGHCGCBKFI\FBKECF-shm
data
dropped
C:\ProgramData\ECBGHCGCBKFI\GCGDHJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\ECBGHCGCBKFI\IJKFII
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\ECBGHCGCBKFI\JDAFBK
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\ECBGHCGCBKFI\JKECGH
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\ECBGHCGCBKFI\JKECGH-shm
data
dropped
C:\ProgramData\ECBGHCGCBKFI\KKJDGD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BGDGHJEHJJ.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BKJKEBGDHD.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GIJEGDAKEH.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
data
dropped
C:\Windows\System32\rfxvmt.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 29 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\BGDGHJEHJJ.exe
"C:\ProgramData\BGDGHJEHJJ.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\GIJEGDAKEH.exe
"C:\ProgramData\GIJEGDAKEH.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\BKJKEBGDHD.exe
"C:\ProgramData\BKJKEBGDHD.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net user
malicious
C:\Windows\SysWOW64\net.exe
net user
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c "C:\Users\user\AppData\Local\Temp\RDPWInst.exe" -i
malicious
C:\Users\user\AppData\Local\Temp\RDPWInst.exe
C:\Users\user\AppData\Local\Temp\RDPWInst.exe -i
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\ECBGHCGCBKFI" & exit
malicious
C:\Windows\System32\netsh.exe
netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net user RDPUser_7fdfafe0 wpaeOjzjqF4B /add
malicious
C:\Windows\SysWOW64\net.exe
net user RDPUser_7fdfafe0 wpaeOjzjqF4B /add
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net localgroup "Remote Desktop Users" RDPUser_7fdfafe0 /add
malicious
C:\Windows\SysWOW64\net.exe
net localgroup "Remote Desktop Users" RDPUser_7fdfafe0 /add
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net localgroup
malicious
C:\Windows\SysWOW64\net.exe
net localgroup
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
malicious
C:\Windows\SysWOW64\netsh.exe
netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net localgroup "Administrators" RDPUser_7fdfafe0 /add
malicious
C:\Windows\SysWOW64\net.exe
net localgroup "Administrators" RDPUser_7fdfafe0 /add
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 user
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
C:\Windows\System32\drivers\rdpvideominiport.sys
C:\Windows\System32\drivers\rdpdr.sys
C:\Windows\System32\drivers\tsusbhub.sys
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 user RDPUser_7fdfafe0 wpaeOjzjqF4B /add
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 localgroup "Remote Desktop Users" RDPUser_7fdfafe0 /add
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 localgroup
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 localgroup "Administrators" RDPUser_7fdfafe0 /add
There are 35 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exe1kkkk1220804http://147.45.44.104/prog/66f5db9e
unknown
malicious
stogeneratmns.shop
malicious
reinforcenh.shop
malicious
https://5.75.211.162/mozglue.dll
5.75.211.162
malicious
https://hansgborn.eu/receive.php
188.114.97.3
malicious
https://steamcommunity.com/profiles/76561199780418869/badges
unknown
malicious
https://5.75.211.162/freebl3.dll
5.75.211.162
malicious
https://reinforcenh.shop/api
104.21.77.130
malicious
ghostreedmnu.shop
malicious
https://5.75.211.162/vcruntime140.dll
5.75.211.162
malicious
https://reinforcenh.shop/
unknown
malicious
wallkedsleeoi.shop
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://vozmeatillu.shop/api
188.114.97.3
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
fragnantbui.shop
malicious
https://offensivedzvju.shop/api
188.114.96.3
malicious
offensivedzvju.shop
malicious
drawzhotdog.shop
malicious
vozmeatillu.shop
malicious
https://drawzhotdog.shop/api
172.67.162.108
malicious
https://gutterydhowi.shop/api
104.21.4.136
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://api.ipify.orgd
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
http://cowod.hopto.JKFCAF
unknown
http://cowod.hopto.org
unknown
http://hansgborn.eud
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=B0lGn8MokmdT&l=e
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
http://stascorp.com/load/1-1-0-62
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
http://cowod.hopto.
unknown
https://5.75.211.162h;
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.0
unknown
https://5.75.211.162
unknown
http://api.ipify.org/
172.67.74.152
http://cowod.hopto
unknown
https://5.75.211.162/F_
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://ballotnwu.site/apik
unknown
https://5.75.211.162GIJDH
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://store.steampowered.com/privac
unknown
https://help.steampowered
unknown
https://t.me/ae5ed
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://5.75.211.162.exe
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://mozilla.org0/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=WnGP
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://steamcommunity.com/f
unknown
https://5.75.211.162/C
unknown
http://www.entrust.net/rpa03
unknown
https://5.75.211.162/B
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://github.com/lontivero/Open.Nat/issuesOAlso
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://cowod.hoptoHJKFCAF
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://hansgborn.eu/receive.phpd
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exe
147.45.44.104
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
http://stascorp.comDVarFileInfo$
unknown
https://5.75.211.162/;_
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
http://cowod.hopto.orgCAF
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://steamcommunity.com/profiles/76561199780418869z
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
http://cowod.BKFIDHJKFCAF
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://www.entrust.net/rpa0
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
http://147.45.44.104/prog/66f55533ca7d6_RDPWInst.exe
147.45.44.104
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
http://ocsp.entrust.net03
unknown
http://ocsp.entrust.net02
unknown
https://5.75.211.162/msvcp140.dllh
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fragnantbui.shop
188.114.97.3
malicious
gutterydhowi.shop
104.21.4.136
malicious
cowod.hopto.org
45.132.206.251
malicious
offensivedzvju.shop
188.114.96.3
malicious
drawzhotdog.shop
172.67.162.108
malicious
ghostreedmnu.shop
188.114.97.3
malicious
ballotnwu.site
172.67.128.144
malicious
wallkedsleeoi.shop
172.67.194.216
malicious
hansgborn.eu
188.114.97.3
malicious
steamcommunity.com
104.102.49.254
malicious
stogeneratmns.shop
188.114.97.3
malicious
reinforcenh.shop
104.21.77.130
malicious
vozmeatillu.shop
188.114.97.3
malicious
api.ipify.org
172.67.74.152
There are 4 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.77.130
reinforcenh.shop
United States
malicious
8.46.123.33
unknown
United States
malicious
45.132.206.251
cowod.hopto.org
Russian Federation
malicious
104.21.4.136
gutterydhowi.shop
United States
malicious
188.114.97.3
fragnantbui.shop
European Union
malicious
172.67.162.108
drawzhotdog.shop
United States
malicious
172.67.128.144
ballotnwu.site
United States
malicious
188.114.96.3
offensivedzvju.shop
European Union
malicious
104.102.49.254
steamcommunity.com
United States
malicious
5.75.211.162
unknown
Germany
malicious
172.67.194.216
wallkedsleeoi.shop
United States
malicious
147.45.44.104
unknown
Russian Federation
239.255.255.250
unknown
Reserved
172.67.74.152
api.ipify.org
United States
There are 4 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\Licensing Core
EnableConcurrentSessions
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters
ServiceDll
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server
fDenyTSConnections
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKJKEBGDHD_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKJKEBGDHD_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKJKEBGDHD_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKJKEBGDHD_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKJKEBGDHD_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKJKEBGDHD_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKJKEBGDHD_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKJKEBGDHD_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKJKEBGDHD_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKJKEBGDHD_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKJKEBGDHD_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKJKEBGDHD_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKJKEBGDHD_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKJKEBGDHD_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
AllowMultipleTSSessions
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tsusbhub\Parameters\Wdf
WdfMajorVersion
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tsusbhub\Parameters\Wdf
WdfMinorVersion
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{191a5137-7c9d-43c0-a943-de4411f424f7}\##?#TS_USB_HUB_Enumerator#UMB#2&30d3618&0&TS_USB_HUB#{191a5137-7c9d-43c0-a943-de4411f424f7}
DeviceInstance
There are 26 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3AB5000
trusted library allocation
page read and write
malicious
450000
unkown
page readonly
malicious
400000
remote allocation
page execute and read and write
malicious
450000
unkown
page readonly
malicious
AD2000
unkown
page readonly
malicious
2EE1000
trusted library allocation
page read and write
malicious
38F5000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3008000
trusted library allocation
page read and write
32DE000
stack
page read and write
5D9D000
heap
page read and write
1400000
heap
page read and write
1A3EE000
heap
page read and write
19F3E000
heap
page read and write
130000
heap
page read and write
2E3E000
stack
page read and write
5EC000
stack
page read and write
6C59E000
unkown
page read and write
E8A000
trusted library allocation
page execute and read and write
D7F000
stack
page read and write
59EE000
stack
page read and write
980000
heap
page read and write
171F000
heap
page read and write
72E000
stack
page read and write
7FC20000
direct allocation
page read and write
93F000
stack
page read and write
3015000
trusted library allocation
page read and write
63AF000
stack
page read and write
FE8000
heap
page read and write
14BC000
stack
page read and write
2E1F000
stack
page read and write
376F000
unkown
page read and write
446000
unkown
page write copy
28FF000
stack
page read and write
85A000
heap
page read and write
F3E000
stack
page read and write
29E0000
heap
page read and write
A10000
heap
page read and write
150A000
heap
page read and write
4D4000
remote allocation
page execute and read and write
F90000
heap
page read and write
960000
heap
page read and write
2F27000
trusted library allocation
page read and write
463000
remote allocation
page execute and read and write
20343000
direct allocation
page execute read
2BBE000
stack
page read and write
2050B000
direct allocation
page readonly
2DF0000
heap
page read and write
7A8000
heap
page read and write
77D000
stack
page read and write
22D0000
direct allocation
page read and write
2C90000
heap
page read and write
1A0000
heap
page read and write
10C4000
heap
page read and write
5B2000
unkown
page readonly
2DF0000
heap
page read and write
239D000
stack
page read and write
F2C000
stack
page read and write
10A1000
heap
page read and write
12E0000
trusted library allocation
page read and write
1A250000
heap
page read and write
7FD70000
direct allocation
page read and write
2FBD000
trusted library allocation
page read and write
12C4000
trusted library allocation
page read and write
495D000
stack
page read and write
2790000
heap
page read and write
10CC000
heap
page read and write
1096000
heap
page read and write
A4F000
stack
page read and write
2055F000
direct allocation
page readonly
2FFF000
unkown
page read and write
180000
heap
page read and write
2C40000
heap
page read and write
2031A000
direct allocation
page execute read
26FF000
unkown
page read and write
147E000
stack
page read and write
12B0000
trusted library allocation
page read and write
1216000
heap
page read and write
4D02D000
stack
page read and write
11D000
stack
page read and write
6C5B0000
unkown
page readonly
D73000
trusted library allocation
page execute and read and write
19F3F000
stack
page read and write
970000
heap
page read and write
20495000
direct allocation
page execute read
2049D000
direct allocation
page execute read
4F6000
remote allocation
page execute and read and write
2C8F000
stack
page read and write
1115000
heap
page read and write
2FBF000
trusted library allocation
page read and write
204E3000
direct allocation
page readonly
29FE000
stack
page read and write
5B2D000
stack
page read and write
562D000
stack
page read and write
6C510000
unkown
page readonly
20436000
direct allocation
page execute read
11F0000
heap
page read and write
2DE5000
heap
page read and write
107DF000
stack
page read and write
5F2E000
stack
page read and write
1792C000
stack
page read and write
314F000
stack
page read and write
2794000
heap
page read and write
2B70000
heap
page read and write
35B0000
heap
page read and write
10FC000
stack
page read and write
6FD000
stack
page read and write
32C0000
heap
page read and write
CD000
stack
page read and write
6B8E000
stack
page read and write
5DE000
stack
page read and write
545E000
stack
page read and write
273E000
stack
page read and write
1573000
heap
page read and write
24D3000
direct allocation
page read and write
14B0000
heap
page read and write
530000
heap
page read and write
445000
unkown
page write copy
535E000
stack
page read and write
318E000
stack
page read and write
63A000
remote allocation
page execute and read and write
1797000
heap
page read and write
33FE000
stack
page read and write
2720000
heap
page read and write
2A02000
heap
page read and write
572E000
stack
page read and write
3300000
heap
page read and write
2401000
direct allocation
page read and write
1796C000
stack
page read and write
950000
heap
page read and write
BF0000
trusted library allocation
page read and write
148E000
stack
page read and write
2D90000
heap
page read and write
26CE000
stack
page read and write
FDD000
stack
page read and write
C80000
heap
page read and write
F20000
heap
page execute and read and write
204B6000
direct allocation
page execute read
B28000
heap
page read and write
592000
unkown
page readonly
2A80000
heap
page read and write
1683000
heap
page read and write
2AC0000
heap
page read and write
63FE000
unkown
page read and write
B78000
heap
page read and write
36F0000
heap
page read and write
2FCB000
trusted library allocation
page read and write
6C795000
unkown
page readonly
239C000
direct allocation
page read and write
776E000
stack
page read and write
2DDE000
stack
page read and write
400000
unkown
page readonly
1782000
heap
page read and write
3027000
trusted library allocation
page read and write
3308000
heap
page read and write
EEC000
stack
page read and write
3885000
trusted library allocation
page read and write
2DA0000
heap
page read and write
1330000
heap
page read and write
275E000
unkown
page read and write
1EE000
stack
page read and write
23B9000
direct allocation
page read and write
3045000
trusted library allocation
page read and write
78F000
stack
page read and write
3039000
trusted library allocation
page read and write
7A0000
heap
page read and write
2DB0000
trusted library section
page read and write
B4E000
stack
page read and write
55A000
remote allocation
page execute and read and write
E76000
trusted library allocation
page read and write
590000
heap
page read and write
5AEF000
stack
page read and write
3408000
heap
page read and write
3019000
trusted library allocation
page read and write
EFB000
trusted library allocation
page execute and read and write
2D5D000
stack
page read and write
B6A000
heap
page read and write
28A0000
heap
page read and write
88C000
stack
page read and write
39D000
stack
page read and write
BC0000
heap
page read and write
45D000
remote allocation
page execute and read and write
3E7FD000
heap
page read and write
A25000
heap
page read and write
287F000
stack
page read and write
19F10000
heap
page read and write
23C8000
direct allocation
page read and write
2F20000
heap
page read and write
2CDF000
unkown
page read and write
31EF000
unkown
page read and write
1A267000
heap
page read and write
400000
unkown
page readonly
23CF000
direct allocation
page read and write
FFD000
heap
page read and write
B96000
heap
page read and write
19F12000
heap
page read and write
2E50000
heap
page read and write
73D000
stack
page read and write
1450000
heap
page read and write
FFF000
heap
page read and write
E9B000
trusted library allocation
page execute and read and write
6CCE000
stack
page read and write
CA0000
trusted library allocation
page execute and read and write
35BE000
stack
page read and write
1F0000
heap
page read and write
1639000
heap
page read and write
1739000
heap
page read and write
121E000
heap
page read and write
582000
remote allocation
page execute and read and write
2CDD000
stack
page read and write
3400000
heap
page read and write
1CE000
stack
page read and write
D5E000
stack
page read and write
104F000
stack
page read and write
20516000
direct allocation
page read and write
A50000
heap
page read and write
B20000
heap
page read and write
17C5000
heap
page read and write
12FC000
stack
page read and write
3C16000
heap
page read and write
2CA0000
heap
page read and write
1A050000
heap
page read and write
2FCD000
trusted library allocation
page read and write
506000
remote allocation
page execute and read and write
12EA000
trusted library allocation
page execute and read and write
2062D000
stack
page read and write
1525D000
stack
page read and write
BA4000
heap
page read and write
1023000
heap
page read and write
1150000
heap
page read and write
1A3F5000
heap
page read and write
A00000
heap
page read and write
178F000
heap
page read and write
4DA000
remote allocation
page execute and read and write
3140000
heap
page read and write
12C0000
trusted library allocation
page read and write
32F0000
heap
page read and write
6C790000
unkown
page read and write
61DE000
stack
page read and write
8F8000
stack
page read and write
2378000
direct allocation
page read and write
FAF000
stack
page read and write
178F000
heap
page read and write
988000
stack
page read and write
2F45000
heap
page read and write
26A3C000
heap
page read and write
179F000
heap
page read and write
1D0000
heap
page read and write
5C2E000
stack
page read and write
12F2000
trusted library allocation
page read and write
2408000
direct allocation
page read and write
1542D000
stack
page read and write
357C000
heap
page read and write
5DAE000
heap
page read and write
12E2000
trusted library allocation
page read and write
278C000
heap
page read and write
AF0000
heap
page read and write
A3E000
stack
page read and write
2F41000
heap
page read and write
19F6D000
heap
page read and write
2DC0000
heap
page read and write
563000
remote allocation
page execute and read and write
29EA000
heap
page read and write
1580000
heap
page read and write
1190000
heap
page read and write
609E000
stack
page read and write
3595000
heap
page read and write
EAE000
stack
page read and write
463000
remote allocation
page execute and read and write
1650000
heap
page read and write
293D000
stack
page read and write
1A010000
heap
page read and write
3EE1000
trusted library allocation
page read and write
EFE000
stack
page read and write
1043000
heap
page read and write
50E000
stack
page read and write
DD0000
heap
page read and write
B20000
heap
page read and write
FF0000
heap
page read and write
9BE000
stack
page read and write
7A8000
stack
page read and write
D60000
trusted library allocation
page read and write
5A1000
remote allocation
page execute and read and write
1A21E000
stack
page read and write
2D3D000
stack
page read and write
204DF000
direct allocation
page readonly
12D0000
trusted library allocation
page read and write
2FA7000
trusted library allocation
page read and write
12F2000
stack
page read and write
30D0000
heap
page read and write
278D000
stack
page read and write
5D8A000
heap
page read and write
8B0000
heap
page read and write
7FD00000
direct allocation
page read and write
1598000
heap
page read and write
51F000
remote allocation
page execute and read and write
321E000
stack
page read and write
2D55000
heap
page read and write
C7E000
stack
page read and write
598000
heap
page read and write
A1F1000
heap
page read and write
2980000
heap
page read and write
15F3000
heap
page read and write
2D1E000
stack
page read and write
2387000
direct allocation
page read and write
2FFD000
stack
page read and write
19B000
stack
page read and write
46B000
remote allocation
page execute and read and write
F30000
trusted library allocation
page execute and read and write
C17000
trusted library allocation
page execute and read and write
27B0000
trusted library allocation
page read and write
14CB000
stack
page read and write
32D0000
heap
page read and write
D6F000
stack
page read and write
D90000
heap
page read and write
33FE000
stack
page read and write
204AA000
direct allocation
page execute read
47F000
stack
page read and write
2A3D000
stack
page read and write
2FA0000
heap
page read and write
401000
unkown
page execute read
34C0000
heap
page read and write
2AC0000
heap
page read and write
BE0000
heap
page read and write
2055D000
direct allocation
page execute read
1528D000
stack
page read and write
A7F000
stack
page read and write
1727000
heap
page read and write
7E0000
heap
page read and write
BE3000
trusted library allocation
page execute and read and write
59AF000
stack
page read and write
28F1000
trusted library allocation
page execute and read and write
204A4000
direct allocation
page execute read
3C10000
heap
page read and write
2AE0000
heap
page read and write
2C90000
heap
page read and write
180000
heap
page read and write
2CFE000
stack
page read and write
30FF000
stack
page read and write
29EF000
unkown
page read and write
12C3000
trusted library allocation
page execute and read and write
172A000
heap
page read and write
B30000
heap
page read and write
19F1C000
heap
page read and write
2C9A6000
heap
page read and write
143E000
stack
page read and write
3593000
heap
page read and write
6770000
heap
page read and write
2CAD000
stack
page read and write
FA0000
heap
page read and write
34BF000
stack
page read and write
B2E000
heap
page read and write
28F3000
trusted library allocation
page read and write
2890000
trusted library allocation
page execute and read and write
2ECE000
stack
page read and write
19F2C000
heap
page read and write
1310000
heap
page read and write
172E000
heap
page read and write
EDE000
stack
page read and write
32A0000
heap
page read and write
3AB1000
trusted library allocation
page read and write
46C9F000
stack
page read and write
D80000
trusted library allocation
page read and write
9C1E000
stack
page read and write
27AF000
heap
page read and write
11FA000
heap
page read and write
6040000
trusted library allocation
page read and write
2600000
heap
page read and write
A20000
heap
page read and write
32912000
heap
page read and write
231D000
stack
page read and write
FE9000
stack
page read and write
576E000
stack
page read and write
12CD000
trusted library allocation
page execute and read and write
12E6000
trusted library allocation
page execute and read and write
36F5000
heap
page read and write
105C000
heap
page read and write
67CC000
stack
page read and write
5A1000
remote allocation
page execute and read and write
447000
unkown
page read and write
1A31E000
unkown
page read and write
306A000
trusted library allocation
page read and write
1626000
heap
page read and write
9F5000
heap
page read and write
1500000
heap
page read and write
12F7000
trusted library allocation
page execute and read and write
9F0000
heap
page read and write
63A000
remote allocation
page execute and read and write
4C2000
remote allocation
page execute and read and write
333D000
stack
page read and write
2610000
heap
page read and write
2C8E000
unkown
page read and write
1555000
heap
page read and write
3022000
trusted library allocation
page read and write
2F5D000
stack
page read and write
12F0000
trusted library allocation
page read and write
9F0000
heap
page read and write
2380000
direct allocation
page read and write
29D0000
heap
page read and write
32EF000
stack
page read and write
3410000
heap
page read and write
20AC7000
heap
page read and write
730000
heap
page read and write
6DD0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
15C5000
heap
page read and write
12DD000
trusted library allocation
page execute and read and write
1021000
heap
page read and write
4A5D000
stack
page read and write
107CE000
stack
page read and write
1529E000
stack
page read and write
3150000
heap
page read and write
19F7D000
heap
page read and write
EF5000
stack
page read and write
A40000
heap
page read and write
140E000
stack
page read and write
2BFF000
stack
page read and write
2C9F000
stack
page read and write
317F000
trusted library allocation
page read and write
6A0000
heap
page read and write
4FDD000
stack
page read and write
F70000
heap
page read and write
A2E0000
unclassified section
page read and write
38BB000
trusted library allocation
page read and write
29E4000
heap
page read and write
2059D000
direct allocation
page readonly
AD0000
unkown
page readonly
1250000
heap
page read and write
C90000
heap
page read and write
2E1E000
stack
page read and write
3198000
trusted library allocation
page read and write
20351000
direct allocation
page execute read
6780000
heap
page read and write
5C0000
heap
page read and write
32E0000
heap
page read and write
D74000
trusted library allocation
page read and write
2ABF000
stack
page read and write
EF7000
trusted library allocation
page execute and read and write
6C78E000
unkown
page read and write
619E000
stack
page read and write
19F86000
heap
page read and write
C0A000
trusted library allocation
page execute and read and write
46B000
remote allocation
page execute and read and write
2D98000
heap
page read and write
2680000
heap
page read and write
2F4F000
stack
page read and write
361E000
stack
page read and write
35B5000
heap
page read and write
20512000
direct allocation
page read and write
770000
heap
page read and write
52D000
remote allocation
page execute and read and write
2B90000
heap
page read and write
2DD0000
heap
page execute and read and write
2CDE000
stack
page read and write
144E000
stack
page read and write
F40000
heap
page read and write
297E000
stack
page read and write
29CC000
heap
page read and write
20350000
direct allocation
page execute and read and write
2C7F000
stack
page read and write
4CDEC000
stack
page read and write
2780000
heap
page read and write
335F000
stack
page read and write
850000
heap
page read and write
70F000
stack
page read and write
33EE000
stack
page read and write
2DD0000
heap
page read and write
277E000
stack
page read and write
55E000
remote allocation
page execute and read and write
F75000
heap
page read and write
3037000
trusted library allocation
page read and write
66EE000
stack
page read and write
24F0000
direct allocation
page read and write
1110000
heap
page read and write
CE5000
heap
page read and write
7B7000
heap
page read and write
4EF000
remote allocation
page execute and read and write
2FD1000
trusted library allocation
page read and write
305D000
stack
page read and write
88D000
stack
page read and write
636D000
stack
page read and write
4F0000
unkown
page readonly
FEC000
stack
page read and write
8F0000
heap
page read and write
586E000
stack
page read and write
9F5000
heap
page read and write
19EFF000
stack
page read and write
17E000
unkown
page read and write
4F2000
unkown
page readonly
29C0000
heap
page read and write
30E8000
heap
page read and write
2660000
heap
page read and write
2CDE000
stack
page read and write
179F000
heap
page read and write
27F0000
heap
page read and write
19F7E000
heap
page read and write
2990000
heap
page read and write
12D0E000
stack
page read and write
2C4E000
stack
page read and write
3430000
heap
page read and write
590000
unkown
page readonly
1A1A3000
heap
page read and write
5E06000
heap
page read and write
368E000
stack
page read and write
6A0A000
stack
page read and write
27EC000
stack
page read and write
1015000
heap
page read and write
12CD000
stack
page read and write
467000
remote allocation
page execute and read and write
67D000
stack
page read and write
CB8000
heap
page read and write
5D70000
heap
page read and write
19F52000
heap
page read and write
B64000
trusted library allocation
page read and write
1320000
trusted library allocation
page execute and read and write
445000
unkown
page read and write
401000
unkown
page execute read
19F83000
heap
page read and write
BE4000
trusted library allocation
page read and write
2D70000
heap
page read and write
2E50000
heap
page read and write
83F000
stack
page read and write
13D000
stack
page read and write
353D000
stack
page read and write
363E000
stack
page read and write
3316000
heap
page read and write
26E0000
heap
page read and write
7A0000
heap
page read and write
A70000
heap
page read and write
528000
remote allocation
page execute and read and write
6EE000
stack
page read and write
1539F000
stack
page read and write
65AF000
stack
page read and write
7A5000
heap
page read and write
12A2000
heap
page read and write
2DEE000
unkown
page read and write
357F000
stack
page read and write
5EEF000
stack
page read and write
14C0000
trusted library allocation
page read and write
28C0000
trusted library allocation
page read and write
CB0000
heap
page read and write
6C78F000
unkown
page write copy
20568000
direct allocation
page readonly
23AD000
stack
page read and write
2FAA000
trusted library allocation
page read and write
16CD000
heap
page read and write
437000
remote allocation
page execute and read and write
CBE000
heap
page read and write
17EE000
heap
page read and write
97E000
stack
page read and write
2FC3000
trusted library allocation
page read and write
690000
heap
page read and write
2C3E000
stack
page read and write
BF4000
trusted library allocation
page read and write
4A8E000
stack
page read and write
CBF000
stack
page read and write
F90000
heap
page read and write
323D000
stack
page read and write
204A6000
direct allocation
page execute read
F70000
trusted library allocation
page read and write
F60000
heap
page read and write
34D0000
heap
page read and write
2F38000
trusted library allocation
page read and write
2DDF000
stack
page read and write
179BE000
stack
page read and write
FBE000
stack
page read and write
788000
heap
page read and write
1A553000
heap
page read and write
2C3D000
stack
page read and write
19FF1000
heap
page read and write
8A0000
heap
page read and write
F50000
heap
page read and write
6C5A2000
unkown
page readonly
28D0000
heap
page read and write
2D51000
heap
page read and write
23B2000
direct allocation
page read and write
38F1000
trusted library allocation
page read and write
4A0000
heap
page read and write
5490000
heap
page execute and read and write
B63000
trusted library allocation
page execute and read and write
2A04000
heap
page read and write
2FC1000
trusted library allocation
page read and write
14D0000
heap
page read and write
173E000
heap
page read and write
1587000
heap
page read and write
1A06B000
stack
page read and write
2D53000
heap
page read and write
19F8D000
heap
page read and write
12D4D000
stack
page read and write
1296000
heap
page read and write
1A2D0000
heap
page read and write
2881000
trusted library allocation
page execute and read and write
2D90000
heap
page read and write
1A0AB000
stack
page read and write
2930000
heap
page read and write
780000
heap
page read and write
4CE000
remote allocation
page execute and read and write
8BE000
stack
page read and write
163F000
heap
page read and write
369F000
stack
page read and write
2744000
heap
page read and write
A78000
heap
page read and write
7FDE0000
direct allocation
page read and write
1242000
heap
page read and write
10C1000
heap
page read and write
2F2C000
heap
page read and write
12FB000
trusted library allocation
page execute and read and write
2FBD000
stack
page read and write
130E000
stack
page read and write
5B0000
unkown
page readonly
C1B000
trusted library allocation
page execute and read and write
3049000
trusted library allocation
page read and write
582000
remote allocation
page execute and read and write
CF4000
heap
page read and write
50E000
remote allocation
page execute and read and write
73F000
stack
page read and write
D86000
trusted library allocation
page read and write
B7E000
stack
page read and write
B4D000
heap
page read and write
55D000
remote allocation
page execute and read and write
152DE000
stack
page read and write
2FCF000
trusted library allocation
page read and write
8F5000
heap
page read and write
6C8E000
stack
page read and write
2371000
direct allocation
page read and write
19F88000
heap
page read and write
BD0000
trusted library allocation
page read and write
584000
remote allocation
page execute and read and write
1068E000
stack
page read and write
3449000
trusted library allocation
page read and write
2DE0000
heap
page read and write
1078F000
stack
page read and write
34BE000
unkown
page read and write
2D2D000
stack
page read and write
9CAF000
stack
page read and write
2EDE000
stack
page read and write
33A0000
heap
page read and write
CDD000
heap
page read and write
2AB3000
trusted library allocation
page read and write
3835000
heap
page read and write
2E60000
heap
page read and write
202D8000
direct allocation
page execute read
6C511000
unkown
page execute read
2FC9000
trusted library allocation
page read and write
2511000
direct allocation
page read and write
2AB1000
trusted library allocation
page execute and read and write
6C74F000
unkown
page readonly
467000
remote allocation
page execute and read and write
3970000
heap
page read and write
168E000
heap
page read and write
6C58D000
unkown
page readonly
510000
heap
page read and write
B7C000
stack
page read and write
14E8000
trusted library allocation
page read and write
BB2000
heap
page read and write
AE4000
unkown
page readonly
3C1D000
heap
page read and write
301D000
trusted library allocation
page read and write
B9B000
heap
page read and write
28DD000
stack
page read and write
1337000
heap
page read and write
9F0000
heap
page read and write
B70000
heap
page read and write
EEA000
trusted library allocation
page execute and read and write
2D3C000
heap
page read and write
6C5B1000
unkown
page execute read
4710000
heap
page read and write
A250000
unclassified section
page read and write
B55000
heap
page read and write
20358000
direct allocation
page execute read
2B9E000
stack
page read and write
1237000
heap
page read and write
325F000
stack
page read and write
460000
remote allocation
page execute and read and write
16A2000
heap
page read and write
38886000
heap
page read and write
19F5C000
heap
page read and write
1160000
heap
page read and write
167B000
heap
page read and write
30E0000
heap
page read and write
2FA5000
trusted library allocation
page read and write
B64000
heap
page read and write
4E8000
remote allocation
page execute and read and write
386F000
stack
page read and write
B7E000
heap
page read and write
2BD0000
heap
page read and write
204FB000
direct allocation
page readonly
4C8000
remote allocation
page execute and read and write
2520000
direct allocation
page read and write
3071000
trusted library allocation
page read and write
F3E000
stack
page read and write
27AF000
heap
page read and write
3400000
heap
page read and write
23AB000
direct allocation
page read and write
5460000
trusted library allocation
page read and write
32B0000
heap
page read and write
238E000
direct allocation
page read and write
19FBD000
heap
page read and write
690D000
stack
page read and write
BD000
stack
page read and write
29B0000
heap
page read and write
2F1D000
stack
page read and write
9C000
stack
page read and write
A150000
heap
page read and write
297F000
unkown
page read and write
563000
remote allocation
page execute and read and write
34E0000
heap
page read and write
153EE000
stack
page read and write
6DCC000
stack
page read and write
FEE000
heap
page read and write
BF0000
heap
page read and write
1A004000
heap
page read and write
31D0000
heap
page read and write
28EE000
stack
page read and write
331A000
heap
page read and write
3C0D000
stack
page read and write
165A000
heap
page read and write
BBE000
stack
page read and write
2A90000
heap
page read and write
CFE000
stack
page read and write
2D77000
heap
page read and write
1A1AD000
stack
page read and write
229D000
stack
page read and write
2C00000
heap
page read and write
DDC000
stack
page read and write
C5D000
stack
page read and write
2FC5000
trusted library allocation
page read and write
E97000
trusted library allocation
page execute and read and write
5C6E000
stack
page read and write
62DD000
stack
page read and write
1A535000
heap
page read and write
2DE0000
heap
page read and write
4CCEC000
stack
page read and write
3830000
heap
page read and write
207EB000
stack
page read and write
327D000
stack
page read and write
1E0000
heap
page read and write
153DF000
stack
page read and write
2E50000
heap
page read and write
2059F000
direct allocation
page readonly
2710000
heap
page read and write
B50000
trusted library allocation
page read and write
20465000
direct allocation
page execute read
2BDE000
unkown
page read and write
FF6000
heap
page read and write
363E000
stack
page read and write
A1E0000
heap
page read and write
5E0000
heap
page read and write
12AF000
stack
page read and write
2883000
trusted library allocation
page read and write
516000
remote allocation
page execute and read and write
44D000
unkown
page write copy
2D30000
heap
page read and write
602E000
stack
page read and write
12D1C000
stack
page read and write
4A8000
heap
page read and write
29DE000
stack
page read and write
670000
remote allocation
page execute and read and write
FE0000
heap
page read and write
68CB000
stack
page read and write
E6E000
stack
page read and write
1310000
trusted library allocation
page read and write
2AA0000
heap
page execute and read and write
58AD000
stack
page read and write
3591000
heap
page read and write
10D4000
heap
page read and write
317D000
trusted library allocation
page read and write
DDE000
stack
page read and write
2C80000
heap
page read and write
179FE000
stack
page read and write
3F0000
heap
page read and write
24B5000
direct allocation
page read and write
44B000
unkown
page read and write
2D7E000
stack
page read and write
5DA5000
heap
page read and write
283D000
stack
page read and write
60E000
unkown
page readonly
1260000
heap
page read and write
22AD000
stack
page read and write
272C000
heap
page read and write
5EAE000
stack
page read and write
2B8F000
stack
page read and write
5D6E000
stack
page read and write
85E000
heap
page read and write
7F0000
heap
page read and write
E74000
trusted library allocation
page read and write
27E0000
heap
page execute and read and write
BF6000
trusted library allocation
page read and write
2FA5000
heap
page read and write
646E000
unkown
page read and write
3960000
heap
page read and write
4E1000
remote allocation
page execute and read and write
16BF000
heap
page read and write
1A361000
heap
page read and write
2CBE000
stack
page read and write
20506000
direct allocation
page readonly
29BE000
stack
page read and write
2FC7000
trusted library allocation
page read and write
A161000
heap
page read and write
204F6000
direct allocation
page readonly
34E8000
heap
page read and write
1A5FC000
heap
page read and write
F40000
heap
page read and write
2E55000
heap
page read and write
1A16A000
stack
page read and write
65EE000
stack
page read and write
3881000
trusted library allocation
page read and write
351E000
stack
page read and write
11B0000
heap
page read and write
B0E000
stack
page read and write
329F000
stack
page read and write
44C000
unkown
page write copy
1A5FA000
heap
page read and write
378E000
stack
page read and write
2D10000
heap
page read and write
B35000
heap
page read and write
2059A000
direct allocation
page readonly
123F000
heap
page read and write
204DD000
direct allocation
page execute read
656E000
unkown
page read and write
2DF0000
heap
page read and write
9D000
stack
page read and write
6AC000
stack
page read and write
179B000
heap
page read and write
DD5000
heap
page read and write
4BAE000
stack
page read and write
24AA000
direct allocation
page read and write
265E000
unkown
page read and write
19F81000
heap
page read and write
E70000
trusted library allocation
page read and write
173C000
heap
page read and write
29E0000
heap
page read and write
29DD000
stack
page read and write
20592000
direct allocation
page read and write
34FF000
stack
page read and write
4FE000
remote allocation
page execute and read and write
3570000
heap
page read and write
1227000
heap
page read and write
D84000
trusted library allocation
page read and write
6BD000
stack
page read and write
327E000
stack
page read and write
2EE0000
heap
page read and write
76DE000
stack
page read and write
There are 833 hidden memdumps, click here to show them.