IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files\RDP Wrapper\rdpwrap.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\BKKFCFBKFC.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\CFHIIEHJKK.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\GIEHJDHCBA.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\66f5db9e54794_vfkagks[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\66f5dbaca34ac_lfdnsafnds[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\66f5de72d9ebd_rdp[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RDPWInst.exe
PE32 executable (console) Intel 80386, for MS Windows
modified
malicious
C:\Program Files\RDP Wrapper\rdpwrap.ini
Generic INItialization configuration [SLPolicy]
dropped
C:\ProgramData\BAFCGIJDAFBK\FHDAEH
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\ProgramData\BAFCGIJDAFBK\KKFHJD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BAFCGIJDAFBK\KKJKEB
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CGHDAKKJJJKJ\AEHIDA
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\ProgramData\CGHDAKKJJJKJ\AFCBAE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\CGHDAKKJJJKJ\BGIJDG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CGHDAKKJJJKJ\BKKFCF
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\CGHDAKKJJJKJ\DHCAEC
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\CGHDAKKJJJKJ\DHCAEC-shm
data
dropped
C:\ProgramData\CGHDAKKJJJKJ\EHJDGC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CGHDAKKJJJKJ\FIJECA
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CGHDAKKJJJKJ\HCBAKJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\ProgramData\CGHDAKKJJJKJ\HJECAA
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CGHDAKKJJJKJ\HJECAA-shm
data
dropped
C:\ProgramData\CGHDAKKJJJKJ\HJJKFB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BKKFCFBKFC.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CFHIIEHJKK.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GIEHJDHCBA.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
5View capture file
dropped
C:\Windows\System32\rfxvmt.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
\Device\Mup\116938*\MAILSLOT\NET\NETLOGON
data
dropped
There are 31 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\GIEHJDHCBA.exe
"C:\ProgramData\GIEHJDHCBA.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\BKKFCFBKFC.exe
"C:\ProgramData\BKKFCFBKFC.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\CFHIIEHJKK.exe
"C:\ProgramData\CFHIIEHJKK.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net user
malicious
C:\Windows\SysWOW64\net.exe
net user
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\CGHDAKKJJJKJ" & exit
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c "C:\Users\user\AppData\Local\Temp\RDPWInst.exe" -i
malicious
C:\Users\user\AppData\Local\Temp\RDPWInst.exe
C:\Users\user\AppData\Local\Temp\RDPWInst.exe -i
malicious
C:\Windows\System32\netsh.exe
netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net user RDPUser_0d457744 eU6fmVsXHNUV /add
malicious
C:\Windows\SysWOW64\net.exe
net user RDPUser_0d457744 eU6fmVsXHNUV /add
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net localgroup
malicious
C:\Windows\SysWOW64\net.exe
net localgroup
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
malicious
C:\Windows\SysWOW64\netsh.exe
netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net localgroup "Administrators" RDPUser_0d457744 /add
malicious
C:\Windows\SysWOW64\net.exe
net localgroup "Administrators" RDPUser_0d457744 /add
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 user
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\drivers\rdpvideominiport.sys
C:\Windows\System32\drivers\rdpdr.sys
C:\Windows\System32\drivers\tsusbhub.sys
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 user RDPUser_0d457744 eU6fmVsXHNUV /add
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 localgroup
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 localgroup "Administrators" RDPUser_0d457744 /add
There are 33 hidden processes, click here to show them.

URLs

Name
IP
Malicious
stogeneratmns.shop
malicious
https://reinforcenh.shop/api
104.21.77.130
malicious
https://5.75.211.162/vcruntime140.dll
5.75.211.162
malicious
wallkedsleeoi.shop
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://stogeneratmns.shop/
unknown
malicious
https://ghostreedmnu.shop/v
unknown
malicious
fragnantbui.shop
malicious
http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exe
147.45.44.104
malicious
offensivedzvju.shop
malicious
http://147.45.44.104/prog/66f5de72d9ebd_rdp.exe
147.45.44.104
malicious
https://steamcommunity.com/profiles/76561199780418869
104.102.49.254
malicious
https://5.75.211.162/softokn3.dll
5.75.211.162
malicious
http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exeata;
unknown
malicious
https://stogeneratmns.shop/api
188.114.97.3
malicious
https://ghostreedmnu.shop/api
188.114.96.3
malicious
https://5.75.211.162/
5.75.211.162
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=B0lGn8MokmdT&l=e
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.0
unknown
http://api.ipi4
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://s.ytimg.com;
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
https://steamcommunity.com/profiles/765611997804188691
unknown
http://cowod.hopto.CBAFCF
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=WnGP
unknown
http://www.entrust.net/rpa03
unknown
https://hansgborn.eu/receiL
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://5.75.211.162pData
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
http://api.ipify86z
unknown
https://5.75.211.162KJEHD
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://steamcommunity.com/profiles/76561199780418869&nX
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://5.75.211.16214d953f2846xe
unknown
https://help.steampowered.com/en/
unknown
https://community.akamai.steamstatic.com/
unknown
https://recaptcha.net/recaptcha/;
unknown
https://offensivedzvju.shop/
unknown
https://steamcommunity.com/profiles/76561199780418869/inventory/
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=nSnUuYf7g6U1&a
unknown
https://login.steampowered.c
unknown
https://broadcast.st.dl.eccdnx.com
unknown
http://147.45.44.104/prog/66f5db9e54794_vfkagks.exem-data;
unknown
https://5.75.211.162/freebl3.dlll
unknown
https://5.75.211.162/mozglue.dllf
unknown
http://147.45.44.104
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://raw.githubusercontent.com/stascorp/rdpwrap/master/res/rdpwrap.iniU
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199780418869
unknown
https://5.75.211.162IDGCB
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
http://aia.entrust.net/ts1-chain256.cer01
unknown
https://store.steampowered.com/
unknown
https://steamcommunity.com/lG
unknown
http://127.0.0.1:27060
unknown
https://reinforcenh.shop/os%P
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
http://hansgborn.eu
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://5.75.211.1620.5938.134
unknown
http://cowod.hopto.orgFCF
unknown
https://api.steampowered.com/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://player.vimeo.com
unknown
http://api.ipify.orgd
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
http://cowod.hopto.org
unknown
https://5.75.211.162/nss3.dlla
unknown
https://5.75.211.162/nss3.dllz
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fragnantbui.shop
188.114.96.3
malicious
gutterydhowi.shop
172.67.132.32
malicious
cowod.hopto.org
45.132.206.251
malicious
offensivedzvju.shop
188.114.96.3
malicious
drawzhotdog.shop
172.67.162.108
malicious
ghostreedmnu.shop
188.114.96.3
malicious
ballotnwu.site
172.67.128.144
malicious
wallkedsleeoi.shop
172.67.194.216
malicious
hansgborn.eu
188.114.96.3
malicious
steamcommunity.com
104.102.49.254
malicious
stogeneratmns.shop
188.114.97.3
malicious
reinforcenh.shop
104.21.77.130
malicious
vozmeatillu.shop
188.114.96.3
malicious
api.ipify.org
104.26.12.205
There are 4 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.77.130
reinforcenh.shop
United States
malicious
172.67.132.32
gutterydhowi.shop
United States
malicious
8.46.123.33
unknown
United States
malicious
147.45.44.104
unknown
Russian Federation
malicious
45.132.206.251
cowod.hopto.org
Russian Federation
malicious
172.67.162.108
drawzhotdog.shop
United States
malicious
188.114.97.3
stogeneratmns.shop
European Union
malicious
172.67.128.144
ballotnwu.site
United States
malicious
188.114.96.3
fragnantbui.shop
European Union
malicious
104.102.49.254
steamcommunity.com
United States
malicious
5.75.211.162
unknown
Germany
malicious
172.67.194.216
wallkedsleeoi.shop
United States
malicious
104.26.12.205
api.ipify.org
United States
239.255.255.250
unknown
Reserved
There are 4 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\Licensing Core
EnableConcurrentSessions
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters
ServiceDll
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server
fDenyTSConnections
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CFHIIEHJKK_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CFHIIEHJKK_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CFHIIEHJKK_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CFHIIEHJKK_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CFHIIEHJKK_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CFHIIEHJKK_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CFHIIEHJKK_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CFHIIEHJKK_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CFHIIEHJKK_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CFHIIEHJKK_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CFHIIEHJKK_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CFHIIEHJKK_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CFHIIEHJKK_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CFHIIEHJKK_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
AllowMultipleTSSessions
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tsusbhub\Parameters\Wdf
WdfMajorVersion
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tsusbhub\Parameters\Wdf
WdfMinorVersion
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{191a5137-7c9d-43c0-a943-de4411f424f7}\##?#TS_USB_HUB_Enumerator#UMB#2&30d3618&0&TS_USB_HUB#{191a5137-7c9d-43c0-a943-de4411f424f7}
DeviceInstance
There are 26 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
450000
unkown
page readonly
malicious
400000
remote allocation
page execute and read and write
malicious
41F5000
trusted library allocation
page read and write
malicious
11ED000
heap
page read and write
malicious
450000
unkown
page readonly
malicious
30A1000
trusted library allocation
page read and write
malicious
C12000
unkown
page readonly
malicious
400000
remote allocation
page execute and read and write
malicious
3CC5000
trusted library allocation
page read and write
malicious
4D4000
remote allocation
page execute and read and write
35EB000
trusted library allocation
page read and write
547E000
stack
page read and write
9EF000
stack
page read and write
582000
remote allocation
page execute and read and write
7680000
heap
page read and write
3380000
heap
page read and write
33CF000
stack
page read and write
8002000
direct allocation
page read and write
19CAF000
stack
page read and write
1203000
trusted library allocation
page execute and read and write
2D5D000
stack
page read and write
2EBE000
stack
page read and write
467000
remote allocation
page execute and read and write
2C50000
heap
page read and write
E33000
heap
page read and write
144E000
stack
page read and write
32D0000
heap
page read and write
173DC000
stack
page read and write
445000
unkown
page read and write
3110000
heap
page read and write
467000
remote allocation
page execute and read and write
1248000
heap
page read and write
19CC0000
heap
page read and write
307E000
stack
page read and write
37B0000
heap
page read and write
35C9000
trusted library allocation
page read and write
2C3D000
stack
page read and write
30F0000
trusted library allocation
page read and write
32B0000
heap
page read and write
2453000
direct allocation
page read and write
146F000
stack
page read and write
649F000
stack
page read and write
22F1000
direct allocation
page read and write
400000
unkown
page readonly
2DE0000
heap
page read and write
2C7D000
heap
page read and write
2C5E000
unkown
page read and write
4CB4D000
stack
page read and write
1670000
heap
page read and write
1630000
trusted library allocation
page read and write
13CD000
heap
page read and write
15CD000
stack
page read and write
CF8000
stack
page read and write
30D0000
heap
page read and write
2FC5000
heap
page read and write
59DE000
stack
page read and write
8C2000
unkown
page readonly
32E0000
heap
page read and write
19CC2000
heap
page read and write
14B3000
trusted library allocation
page execute and read and write
1374000
heap
page read and write
155E000
heap
page read and write
14EB000
trusted library allocation
page execute and read and write
31F3000
trusted library allocation
page read and write
12FC000
stack
page read and write
670000
remote allocation
page execute and read and write
2E7E000
stack
page read and write
6CB90000
unkown
page read and write
A30000
heap
page read and write
36AF000
stack
page read and write
8026000
heap
page read and write
73C70000
unkown
page readonly
E4E000
heap
page read and write
15A0000
heap
page read and write
242A000
direct allocation
page read and write
19CEE000
heap
page read and write
19E1B000
stack
page read and write
184F000
stack
page read and write
1490000
heap
page read and write
2CC3000
trusted library allocation
page read and write
161A000
trusted library allocation
page execute and read and write
1540000
heap
page read and write
5B1F000
stack
page read and write
6B4E000
stack
page read and write
FA2000
unkown
page readonly
3505000
heap
page read and write
756E000
stack
page read and write
3160000
heap
page read and write
D99000
stack
page read and write
FF0000
heap
page read and write
299D000
stack
page read and write
1400000
heap
page read and write
1ED000
stack
page read and write
2FCE000
stack
page read and write
1776E000
stack
page read and write
1685000
heap
page read and write
2DBD000
stack
page read and write
2E00000
heap
page read and write
C24000
unkown
page readonly
30F0000
heap
page read and write
316E000
unkown
page read and write
11F0000
trusted library allocation
page read and write
3187000
trusted library allocation
page read and write
1606000
trusted library allocation
page read and write
321D000
stack
page read and write
14FDC000
stack
page read and write
35BE000
stack
page read and write
46B000
remote allocation
page execute and read and write
1237000
heap
page read and write
787D000
stack
page read and write
2B40000
heap
page read and write
2300000
direct allocation
page read and write
704E000
stack
page read and write
3609000
trusted library allocation
page read and write
6A09000
stack
page read and write
6CCE000
stack
page read and write
2CB0000
heap
page execute and read and write
1584000
heap
page read and write
20816000
heap
page read and write
3517000
trusted library allocation
page read and write
7B20000
heap
page read and write
1592000
heap
page read and write
317F000
trusted library allocation
page read and write
3118000
trusted library allocation
page read and write
1498000
heap
page read and write
42E5000
trusted library allocation
page read and write
106C000
stack
page read and write
815E000
stack
page read and write
1600000
trusted library allocation
page read and write
35C0000
heap
page read and write
73C8F000
unkown
page readonly
15F4000
trusted library allocation
page read and write
12A9B000
stack
page read and write
30FD000
stack
page read and write
35D7000
trusted library allocation
page read and write
1A030000
heap
page read and write
1350000
heap
page read and write
5B7E000
heap
page read and write
4D0000
heap
page read and write
3090000
heap
page execute and read and write
3010000
heap
page read and write
11B0000
heap
page read and write
27CD000
stack
page read and write
720000
heap
page read and write
82E000
heap
page read and write
5B65000
heap
page read and write
14BF000
heap
page read and write
727000
heap
page read and write
3515000
trusted library allocation
page read and write
6870000
heap
page read and write
3120000
heap
page read and write
3720000
heap
page read and write
73CE000
stack
page read and write
7C7B000
stack
page read and write
55E000
remote allocation
page execute and read and write
29CD000
stack
page read and write
633E000
stack
page read and write
740E000
stack
page read and write
11DF000
stack
page read and write
359C000
heap
page read and write
1270000
heap
page read and write
11F4000
trusted library allocation
page read and write
230E000
direct allocation
page read and write
1510000
trusted library allocation
page execute and read and write
2FB0000
heap
page read and write
2C00000
heap
page read and write
73C86000
unkown
page readonly
2C5C000
heap
page read and write
14F5000
heap
page read and write
2DD0000
heap
page read and write
3336000
heap
page read and write
2C6F4000
heap
page read and write
2D4D000
stack
page read and write
13D5000
heap
page read and write
401000
unkown
page execute read
5EDE000
stack
page read and write
15B0000
heap
page read and write
160E000
stack
page read and write
33B0000
heap
page read and write
3180000
heap
page read and write
44D000
unkown
page write copy
3100000
trusted library allocation
page execute and read and write
DF8000
heap
page read and write
35EF000
trusted library allocation
page read and write
7FEB000
direct allocation
page readonly
2B8E000
unkown
page read and write
5B9C000
heap
page read and write
A5F000
stack
page read and write
35DF000
trusted library allocation
page read and write
109C000
stack
page read and write
C30000
heap
page read and write
14C4000
trusted library allocation
page read and write
3111000
heap
page read and write
165E000
heap
page read and write
1200000
trusted library allocation
page read and write
362F000
stack
page read and write
1450000
heap
page read and write
2CBD000
stack
page read and write
1BE69000
heap
page read and write
3040000
trusted library section
page read and write
3440000
heap
page read and write
1206000
trusted library allocation
page read and write
1504E000
stack
page read and write
3590000
heap
page read and write
290F000
stack
page read and write
F8C000
stack
page read and write
5B6D000
heap
page read and write
E82000
unkown
page readonly
12AF000
heap
page read and write
589F000
stack
page read and write
11E0000
heap
page read and write
18D0000
trusted library allocation
page read and write
3120000
heap
page read and write
1658000
heap
page read and write
333A000
heap
page read and write
3108000
trusted library allocation
page read and write
839E000
stack
page read and write
232B000
direct allocation
page read and write
32C0000
heap
page read and write
12FC000
heap
page read and write
2FCD000
stack
page read and write
3390000
heap
page read and write
FE0000
heap
page read and write
2E23000
heap
page read and write
1106000
heap
page read and write
6E0E000
stack
page read and write
7F9A000
direct allocation
page execute read
1539000
heap
page read and write
174E000
stack
page read and write
5C5E000
stack
page read and write
2C18000
heap
page read and write
13F5000
heap
page read and write
7B4E000
heap
page read and write
2EE0000
heap
page read and write
1204000
trusted library allocation
page read and write
7E0A000
direct allocation
page execute read
202C8000
direct allocation
page readonly
2D30000
heap
page read and write
994E000
stack
page read and write
6CB8F000
unkown
page write copy
7580000
heap
page read and write
63A000
remote allocation
page execute and read and write
32B0000
heap
page read and write
73E000
stack
page read and write
14DA000
trusted library allocation
page execute and read and write
6DCF000
stack
page read and write
659E000
stack
page read and write
2BCE000
stack
page read and write
675E000
stack
page read and write
7A2F000
stack
page read and write
1020000
heap
page read and write
30E7000
trusted library allocation
page read and write
4F0000
heap
page read and write
4F5000
heap
page read and write
3115000
heap
page read and write
605F000
stack
page read and write
2E50000
heap
page read and write
63A000
remote allocation
page execute and read and write
2D7E000
unkown
page read and write
3163000
trusted library allocation
page read and write
3280000
heap
page read and write
78BE000
stack
page read and write
311E000
stack
page read and write
231C000
direct allocation
page read and write
11D0000
heap
page read and write
10C0000
heap
page read and write
2D40000
heap
page read and write
2DCF000
stack
page read and write
32E5000
heap
page read and write
20216000
direct allocation
page execute read
F7C000
stack
page read and write
DFE000
heap
page read and write
2C5D000
stack
page read and write
316A000
trusted library allocation
page read and write
294D000
stack
page read and write
1519E000
stack
page read and write
437000
remote allocation
page execute and read and write
3E534000
heap
page read and write
446000
unkown
page write copy
12A5D000
stack
page read and write
3168000
trusted library allocation
page read and write
582000
remote allocation
page execute and read and write
3328000
heap
page read and write
15E0000
trusted library allocation
page read and write
6FAA2000
unkown
page readonly
7F8D000
direct allocation
page execute read
1520000
heap
page read and write
200B1000
direct allocation
page execute read
7FF6000
direct allocation
page readonly
2C4E000
stack
page read and write
2F2E000
stack
page read and write
367F000
stack
page read and write
143E000
heap
page read and write
10BE000
stack
page read and write
2ECE000
unkown
page read and write
31F0000
heap
page read and write
3230000
heap
page read and write
12F8000
stack
page read and write
44B000
unkown
page read and write
12F5000
heap
page read and write
73C8D000
unkown
page read and write
9C000
stack
page read and write
22F8000
direct allocation
page read and write
331E000
unkown
page read and write
3188000
heap
page read and write
11E0000
trusted library allocation
page read and write
2AAD000
stack
page read and write
1991F000
stack
page read and write
15F3000
trusted library allocation
page execute and read and write
155E000
stack
page read and write
14A0000
trusted library allocation
page read and write
7B8D000
heap
page read and write
1295F000
stack
page read and write
34F0000
heap
page read and write
73C8D000
unkown
page read and write
157B000
heap
page read and write
2B40000
heap
page read and write
122A000
trusted library allocation
page execute and read and write
32660000
heap
page read and write
7B51000
heap
page read and write
460000
remote allocation
page execute and read and write
14E0000
heap
page read and write
1A2B3000
heap
page read and write
11F3000
trusted library allocation
page execute and read and write
2F3E000
stack
page read and write
2FAC000
heap
page read and write
338C000
heap
page read and write
2C70000
heap
page read and write
3015000
heap
page read and write
19B000
stack
page read and write
31D0000
heap
page execute and read and write
4CD8D000
stack
page read and write
14C6000
trusted library allocation
page read and write
19DB4000
heap
page read and write
2C70000
heap
page read and write
149B000
heap
page read and write
FA0000
unkown
page readonly
792E000
stack
page read and write
202F2000
direct allocation
page read and write
1280000
heap
page read and write
1419000
heap
page read and write
2E21000
heap
page read and write
2CC1000
trusted library allocation
page execute and read and write
3114000
trusted library allocation
page read and write
327E000
stack
page read and write
81F000
stack
page read and write
2F9D000
stack
page read and write
1450000
heap
page read and write
58DE000
stack
page read and write
7FD70000
direct allocation
page read and write
6EE000
stack
page read and write
E30000
heap
page read and write
311E000
stack
page read and write
19CCC000
heap
page read and write
1230000
heap
page read and write
7FE6000
direct allocation
page readonly
1242000
trusted library allocation
page read and write
176DC000
stack
page read and write
2DF0000
heap
page read and write
1604000
trusted library allocation
page read and write
850000
heap
page read and write
849E000
stack
page read and write
9E80000
heap
page read and write
12B1000
heap
page read and write
202FD000
direct allocation
page readonly
2FC4000
heap
page read and write
8006000
direct allocation
page read and write
2AFF000
stack
page read and write
120D000
trusted library allocation
page execute and read and write
2DBD000
stack
page read and write
506000
remote allocation
page execute and read and write
4E0000
heap
page read and write
2B10000
heap
page read and write
2CB0000
heap
page read and write
1A044000
heap
page read and write
7FCF000
direct allocation
page readonly
6DE000
stack
page read and write
C9C000
stack
page read and write
400000
unkown
page readonly
2C60000
heap
page read and write
645D000
stack
page read and write
5B3B000
heap
page read and write
12A4000
heap
page read and write
318F000
trusted library allocation
page read and write
1A155000
heap
page read and write
563000
remote allocation
page execute and read and write
7FD00000
direct allocation
page read and write
319F000
unkown
page read and write
1379000
heap
page read and write
13DB000
heap
page read and write
73C86000
unkown
page readonly
445000
unkown
page write copy
6CB4F000
unkown
page readonly
1600000
trusted library allocation
page read and write
5A1E000
stack
page read and write
332E000
stack
page read and write
116C000
stack
page read and write
200B0000
direct allocation
page execute and read and write
13C2000
heap
page read and write
6FA10000
unkown
page readonly
50E000
remote allocation
page execute and read and write
519D000
stack
page read and write
2FCD000
stack
page read and write
1200000
trusted library allocation
page read and write
5D5E000
stack
page read and write
61DE000
stack
page read and write
9E90000
heap
page read and write
5A1000
remote allocation
page execute and read and write
14B4000
trusted library allocation
page read and write
35B3000
heap
page read and write
6860000
heap
page read and write
2FA0000
heap
page read and write
D9C000
stack
page read and write
30F7000
trusted library allocation
page read and write
33D0000
heap
page read and write
4FE000
remote allocation
page execute and read and write
73C71000
unkown
page execute read
14E9D000
stack
page read and write
2388000
direct allocation
page read and write
6CB8E000
unkown
page read and write
2DB0000
heap
page read and write
4DA000
remote allocation
page execute and read and write
2FB0000
heap
page read and write
E25000
heap
page read and write
2381000
direct allocation
page read and write
309F000
stack
page read and write
2F3D000
stack
page read and write
6F4E000
stack
page read and write
10D0000
heap
page read and write
2307000
direct allocation
page read and write
6B8E000
stack
page read and write
96E000
stack
page read and write
3139000
trusted library allocation
page read and write
2348000
direct allocation
page read and write
2ED0000
heap
page read and write
4DBE000
stack
page read and write
2F9F000
stack
page read and write
1514F000
stack
page read and write
55F0000
trusted library allocation
page read and write
E80000
unkown
page readonly
3600000
trusted library allocation
page read and write
3459000
heap
page read and write
2EC0000
heap
page read and write
1000000
heap
page read and write
6CB95000
unkown
page readonly
3181000
trusted library allocation
page read and write
1400000
heap
page read and write
14E9000
heap
page read and write
44C000
unkown
page write copy
35AE000
stack
page read and write
1340000
heap
page read and write
1493000
heap
page read and write
2F4C000
stack
page read and write
5D9E000
stack
page read and write
1051D000
stack
page read and write
1469000
heap
page read and write
690C000
stack
page read and write
2D00000
heap
page read and write
317B000
trusted library allocation
page read and write
200B8000
direct allocation
page execute read
13D0000
heap
page read and write
773E000
stack
page read and write
A2E000
stack
page read and write
31BE000
stack
page read and write
317D000
trusted library allocation
page read and write
95E000
stack
page read and write
4CE000
remote allocation
page execute and read and write
340E000
stack
page read and write
3130000
heap
page read and write
234F000
direct allocation
page read and write
107E000
stack
page read and write
D7D000
stack
page read and write
3200000
heap
page read and write
4CA4B000
stack
page read and write
1510000
heap
page read and write
30D0000
heap
page read and write
469DE000
stack
page read and write
7B0E000
stack
page read and write
32E3000
trusted library allocation
page read and write
7F26000
direct allocation
page execute read
14D0000
trusted library allocation
page read and write
46B000
remote allocation
page execute and read and write
3290000
heap
page read and write
1637000
heap
page read and write
7FFB000
direct allocation
page readonly
1246000
heap
page read and write
14A5000
heap
page read and write
3500000
heap
page read and write
35AE000
stack
page read and write
11E5000
heap
page read and write
7FD3000
direct allocation
page readonly
584000
remote allocation
page execute and read and write
40A1000
trusted library allocation
page read and write
1637000
trusted library allocation
page execute and read and write
2A30000
heap
page read and write
3320000
heap
page read and write
337E000
stack
page read and write
156E000
stack
page read and write
1278000
heap
page read and write
5B8B000
heap
page read and write
19D2D000
heap
page read and write
335F000
unkown
page read and write
2DE8000
trusted library allocation
page read and write
318D000
trusted library allocation
page read and write
117A000
heap
page read and write
6F0E000
stack
page read and write
3370000
heap
page read and write
7B3D000
heap
page read and write
E1D000
heap
page read and write
2E28000
heap
page read and write
A020000
unclassified section
page read and write
13A1000
heap
page read and write
1247000
trusted library allocation
page execute and read and write
7190000
trusted library allocation
page read and write
2FFE000
stack
page read and write
2435000
direct allocation
page read and write
2C50000
heap
page read and write
7FCD000
direct allocation
page execute read
2F1F000
stack
page read and write
14C3000
heap
page read and write
1210000
trusted library allocation
page read and write
127E000
heap
page read and write
11E1000
heap
page read and write
463000
remote allocation
page execute and read and write
15F0000
trusted library allocation
page execute and read and write
9F80000
unclassified section
page read and write
7A7E000
stack
page read and write
34E0000
heap
page read and write
336F000
stack
page read and write
5B20000
heap
page read and write
5FDE000
stack
page read and write
5A1000
remote allocation
page execute and read and write
2E9D000
stack
page read and write
12CD000
heap
page read and write
76FE000
stack
page read and write
D8D000
stack
page read and write
14B6000
heap
page read and write
5B57000
heap
page read and write
52D000
remote allocation
page execute and read and write
D20000
heap
page read and write
3140000
heap
page read and write
3CC1000
trusted library allocation
page read and write
30CE000
unkown
page read and write
1170000
heap
page read and write
37EE000
stack
page read and write
1250000
trusted library allocation
page execute and read and write
1210000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
31F5000
heap
page read and write
463000
remote allocation
page execute and read and write
3185000
trusted library allocation
page read and write
26CD000
stack
page read and write
55A000
remote allocation
page execute and read and write
2BCF000
stack
page read and write
41F1000
trusted library allocation
page read and write
6C9B0000
unkown
page readonly
708E000
stack
page read and write
7F94000
direct allocation
page execute read
19D3D000
heap
page read and write
15AE000
stack
page read and write
4E8D000
stack
page read and write
DBE000
stack
page read and write
121D000
trusted library allocation
page execute and read and write
3447000
heap
page read and write
2DED000
stack
page read and write
2491000
direct allocation
page read and write
348F000
stack
page read and write
2AC0000
heap
page read and write
37B5000
heap
page read and write
1515000
heap
page read and write
2C7E000
heap
page read and write
159D000
heap
page read and write
124B000
trusted library allocation
page execute and read and write
2E20000
heap
page read and write
1479000
heap
page read and write
5610000
heap
page execute and read and write
3183000
trusted library allocation
page read and write
82A000
heap
page read and write
1240000
trusted library allocation
page read and write
32F0000
heap
page read and write
2F70000
heap
page read and write
202FA000
direct allocation
page readonly
122B000
trusted library allocation
page execute and read and write
202BD000
direct allocation
page execute read
35FE000
trusted library allocation
page read and write
1550000
heap
page read and write
7F85000
direct allocation
page execute read
38A0000
heap
page read and write
601D000
stack
page read and write
110D000
heap
page read and write
FF0000
heap
page read and write
401000
unkown
page execute read
327D000
stack
page read and write
1100000
heap
page read and write
1222000
trusted library allocation
page read and write
104DF000
stack
page read and write
609E000
stack
page read and write
330F000
stack
page read and write
19DC0000
heap
page read and write
D30000
heap
page read and write
18CE000
stack
page read and write
1A14E000
heap
page read and write
7F96000
direct allocation
page execute read
685E000
stack
page read and write
19DA1000
heap
page read and write
144E000
stack
page read and write
15EC000
stack
page read and write
3196000
heap
page read and write
34DE000
unkown
page read and write
7DC8000
direct allocation
page execute read
38CF000
stack
page read and write
1162000
stack
page read and write
14C9000
heap
page read and write
2FFF000
stack
page read and write
5B5E000
heap
page read and write
73C8D000
unkown
page read and write
340E000
stack
page read and write
7F55000
direct allocation
page execute read
2D50000
heap
page read and write
128F000
heap
page read and write
DF0000
heap
page read and write
1A35C000
heap
page read and write
164D000
stack
page read and write
1610000
trusted library allocation
page read and write
620000
heap
page read and write
7D7C000
stack
page read and write
385C6000
heap
page read and write
C10000
unkown
page readonly
12C0000
heap
page read and write
1260000
heap
page read and write
47D000
stack
page read and write
735000
heap
page read and write
CBC000
stack
page read and write
2339000
direct allocation
page read and write
1A35A000
heap
page read and write
3790000
heap
page read and write
2EFE000
stack
page read and write
65D000
stack
page read and write
134D000
heap
page read and write
7C20000
heap
page read and write
7B22000
heap
page read and write
7FDE0000
direct allocation
page read and write
35FE000
stack
page read and write
13F0000
heap
page read and write
2FA0000
heap
page read and write
2470000
direct allocation
page read and write
2F4D000
stack
page read and write
1455000
heap
page read and write
7FC20000
direct allocation
page read and write
32EF000
unkown
page read and write
7B2C000
heap
page read and write
2FBF000
stack
page read and write
508000
heap
page read and write
319D000
stack
page read and write
1693000
heap
page read and write
3110000
heap
page read and write
55DE000
stack
page read and write
DD0000
heap
page read and write
335E000
stack
page read and write
3189000
trusted library allocation
page read and write
184E000
stack
page read and write
34BE000
stack
page read and write
7FE000
stack
page read and write
45D000
remote allocation
page execute and read and write
4C2000
remote allocation
page execute and read and write
638E000
stack
page read and write
1A295000
heap
page read and write
378F000
stack
page read and write
7BF000
stack
page read and write
2E4F000
unkown
page read and write
516000
remote allocation
page execute and read and write
135A000
heap
page read and write
14E7000
trusted library allocation
page execute and read and write
1030000
heap
page read and write
149A000
heap
page read and write
121A000
trusted library allocation
page execute and read and write
2E3D000
stack
page read and write
3360000
heap
page read and write
2E10000
heap
page read and write
2E08000
heap
page read and write
2E18000
heap
page read and write
3191000
trusted library allocation
page read and write
7E33000
direct allocation
page execute read
2E23000
heap
page read and write
2AB0000
trusted library allocation
page read and write
301E000
stack
page read and write
5E9E000
stack
page read and write
19F1A000
stack
page read and write
DB5000
stack
page read and write
10BE000
stack
page read and write
14DF000
heap
page read and write
35BF000
stack
page read and write
3106000
trusted library allocation
page read and write
1227000
trusted library allocation
page execute and read and write
2E0E000
stack
page read and write
1240000
trusted library allocation
page read and write
3165000
trusted library allocation
page read and write
51F000
remote allocation
page execute and read and write
1910000
heap
page read and write
13DF000
heap
page read and write
3180000
heap
page read and write
2D60000
heap
page read and write
36EE000
stack
page read and write
DD5000
heap
page read and write
32E1000
trusted library allocation
page execute and read and write
313C000
trusted library allocation
page read and write
1198000
stack
page read and write
2A6E000
stack
page read and write
1630000
heap
page read and write
579D000
stack
page read and write
6A0000
heap
page read and write
301D000
stack
page read and write
6A4E000
stack
page read and write
2F0C000
stack
page read and write
27DD000
stack
page read and write
149E000
stack
page read and write
31A0000
trusted library allocation
page read and write
2332000
direct allocation
page read and write
1346000
heap
page read and write
10380000
heap
page read and write
783F000
stack
page read and write
840000
heap
page read and write
4EF000
remote allocation
page execute and read and write
2DCE000
stack
page read and write
19D35000
heap
page read and write
318B000
trusted library allocation
page read and write
431B000
trusted library allocation
page read and write
63FE000
unkown
page read and write
500000
heap
page read and write
10E0000
heap
page read and write
2074B000
stack
page read and write
1558000
heap
page read and write
3260000
heap
page read and write
307F000
stack
page read and write
19F8E000
stack
page read and write
1220000
trusted library allocation
page read and write
103DE000
stack
page read and write
820000
heap
page read and write
1500000
trusted library allocation
page read and write
1226000
trusted library allocation
page execute and read and write
3170000
heap
page read and write
1260000
trusted library allocation
page read and write
3380000
heap
page read and write
718E000
stack
page read and write
825D000
stack
page read and write
9BC000
stack
page read and write
1650000
heap
page read and write
125F000
heap
page read and write
291D000
stack
page read and write
315E000
stack
page read and write
132C000
heap
page read and write
5B4F000
heap
page read and write
2B00000
heap
page read and write
19CDC000
heap
page read and write
33A3000
heap
page read and write
1220000
trusted library allocation
page read and write
528000
remote allocation
page execute and read and write
2FC1000
heap
page read and write
710000
heap
page read and write
62DF000
stack
page read and write
356F000
stack
page read and write
10C5000
heap
page read and write
34F7000
heap
page read and write
6FA11000
unkown
page execute read
33A4000
heap
page read and write
55D000
remote allocation
page execute and read and write
31F1000
trusted library allocation
page execute and read and write
2250000
direct allocation
page read and write
5C0000
heap
page read and write
1150000
heap
page read and write
194E000
stack
page read and write
91E000
unkown
page readonly
2678A000
heap
page read and write
30FC000
heap
page read and write
4C8000
remote allocation
page execute and read and write
2CB5000
heap
page read and write
11C1000
heap
page read and write
5B40000
heap
page read and write
6FA9E000
unkown
page read and write
1BE5F000
stack
page read and write
3310000
heap
page read and write
619F000
stack
page read and write
1204000
trusted library allocation
page read and write
148B000
heap
page read and write
6C9B1000
unkown
page execute read
1576000
heap
page read and write
163B000
trusted library allocation
page execute and read and write
1440000
heap
page read and write
202BF000
direct allocation
page readonly
2C10000
heap
page read and write
4E1000
remote allocation
page execute and read and write
4F6000
remote allocation
page execute and read and write
4E8000
remote allocation
page execute and read and write
33FF000
stack
page read and write
563000
remote allocation
page execute and read and write
2AFD000
stack
page read and write
6FA8D000
unkown
page readonly
538E000
stack
page read and write
1620000
trusted library allocation
page read and write
136D000
heap
page read and write
132E000
stack
page read and write
1620000
heap
page read and write
2C60000
heap
page read and write
14E0000
trusted library allocation
page read and write
167D000
heap
page read and write
6C8C000
stack
page read and write
600000
heap
page read and write
31E0000
heap
page execute and read and write
32DF000
stack
page read and write
188E000
stack
page read and write
159E000
stack
page read and write
202FF000
direct allocation
page readonly
7D80000
heap
page read and write
8C0000
unkown
page readonly
24A0000
direct allocation
page read and write
400000
remote allocation
page execute and read and write
42E1000
trusted library allocation
page read and write
447000
unkown
page read and write
There are 808 hidden memdumps, click here to show them.