IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files\RDP Wrapper\rdpwrap.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\EBAAFCAFCB.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\JKEHIIJJEC.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\KECGDBFCBK.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\66f5db9e54794_vfkagks[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\66f5dbaca34ac_lfdnsafnds[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\66f5de72d9ebd_rdp[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RDPWInst.exe
PE32 executable (console) Intel 80386, for MS Windows
modified
malicious
C:\Program Files\RDP Wrapper\rdpwrap.ini
Generic INItialization configuration [SLPolicy]
dropped
C:\ProgramData\EBAAFCAFCBKF\AKEBFC
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\EBAAFCAFCBKF\BAECFH
ASCII text, with very long lines (1765), with CRLF line terminators
dropped
C:\ProgramData\EBAAFCAFCBKF\DBGHDG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EBAAFCAFCBKF\ECBGIE
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EBAAFCAFCBKF\ECBGIE-shm
data
dropped
C:\ProgramData\EBAAFCAFCBKF\HDGIEB
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EBAAFCAFCBKF\IEBFIE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\EBAAFCAFCBKF\JJJJKE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EBAAFCAFCBKF\KFBGCA
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\EBAAFCAFCBKF\KFCFBF
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\EBAAFCAFCBKF\KFCFBF-shm
data
dropped
C:\ProgramData\ECFHCGHJDBFI\BAAAKJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\ECFHCGHJDBFI\GCGHII
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\ECFHCGHJDBFI\KKFHJJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\EBAAFCAFCB.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\JKEHIIJJEC.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\KECGDBFCBK.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\76561199780418869[2].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
data
dropped
C:\Windows\System32\rfxvmt.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
\Device\Mup\045012*\MAILSLOT\NET\NETLOGON
data
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\EBAAFCAFCB.exe
"C:\ProgramData\EBAAFCAFCB.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\KECGDBFCBK.exe
"C:\ProgramData\KECGDBFCBK.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\JKEHIIJJEC.exe
"C:\ProgramData\JKEHIIJJEC.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net user
malicious
C:\Windows\SysWOW64\net.exe
net user
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c "C:\Users\user\AppData\Local\Temp\RDPWInst.exe" -i
malicious
C:\Users\user\AppData\Local\Temp\RDPWInst.exe
C:\Users\user\AppData\Local\Temp\RDPWInst.exe -i
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\EBAAFCAFCBKF" & exit
malicious
C:\Windows\System32\netsh.exe
netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net user RDPUser_2490c46d ToN8BxpWb7YJ /add
malicious
C:\Windows\SysWOW64\net.exe
net user RDPUser_2490c46d ToN8BxpWb7YJ /add
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net localgroup
malicious
C:\Windows\SysWOW64\net.exe
net localgroup
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
malicious
C:\Windows\SysWOW64\netsh.exe
netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /c net localgroup "Administrators" RDPUser_2490c46d /add
malicious
C:\Windows\SysWOW64\net.exe
net localgroup "Administrators" RDPUser_2490c46d /add
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 user
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
C:\Windows\System32\drivers\rdpvideominiport.sys
C:\Windows\System32\drivers\rdpdr.sys
C:\Windows\System32\drivers\tsusbhub.sys
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 user RDPUser_2490c46d ToN8BxpWb7YJ /add
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 localgroup
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 localgroup "Administrators" RDPUser_2490c46d /add
There are 30 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://5.75.211.162/sqlp.dllw
unknown
malicious
stogeneratmns.shop
malicious
https://5.75.211.162/ramData
unknown
malicious
https://reinforcenh.shop/api
104.21.77.130
malicious
https://5.75.211.162/vcruntime140.dll
5.75.211.162
malicious
wallkedsleeoi.shop
malicious
https://fragnantbui.shop/
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
fragnantbui.shop
malicious
http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exe
147.45.44.104
malicious
offensivedzvju.shop
malicious
http://147.45.44.104/prog/66f5de72d9ebd_rdp.exe
147.45.44.104
malicious
https://steamcommunity.com/profiles/76561199780418869
104.102.49.254
malicious
http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exe1kkkk1222150http://147.45.44.104/prog/66f5db9e
unknown
malicious
https://fragnantbui.shop/HDQ
unknown
malicious
https://5.75.211.162/softokn3.dll
5.75.211.162
malicious
http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exeata;
unknown
malicious
https://stogeneratmns.shop/api
188.114.97.3
malicious
https://ghostreedmnu.shop/api
188.114.96.3
malicious
https://5.75.211.162/
5.75.211.162
malicious
reinforcenh.shop
malicious
https://5.75.211.162/mozglue.dll
5.75.211.162
malicious
https://hansgborn.eu/receive.php
188.114.96.3
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=B0lGn8MokmdT&l=e
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/0D
unknown
https://steamcommunity.com/00
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.0
unknown
https://cdn.akamai.steamstatic.c
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://s.ytimg.com;
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://5.75.211.162HDGCB
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=WnGP
unknown
http://www.entrust.net/rpa03
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://5.75.211.162/sqlp.dll~
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://5.75.211.162DHIEC
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://help.steampowered.com/en/
unknown
https://community.akamai.steamstatic.com/
unknown
https://store.steampowered.com/;Persistent-AuthWWW-Au
unknown
https://recaptcha.net/recaptcha/;
unknown
https://5.75.211.162DAAAA
unknown
https://steamcommunity.com/profiles/76561199780418869/inventory/
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=nSnUuYf7g6U1&a
unknown
https://steamcommunity.com/S
unknown
http://147.45.44.104/prog/66f5db9e54794_vfkagks.exem-data;
unknown
https://offensivedzvju.shop/pi
unknown
http://147.45.44.104
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://5.75.211.162ta
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://raw.githubusercontent.com/stascorp/rdpwrap/master/res/rdpwrap.iniU
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199780418869
unknown
http://aia.entrust.net/ts1-chain256.cer01
unknown
https://ballotnwu.site/api8D
unknown
https://store.steampowered.com/
unknown
https://5.75.211.162/gz
unknown
http://127.0.0.1:27060
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
http://hansgborn.eu
unknown
https://5.75.211.1620.5938.132
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://api.steampowered.com/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://5.75.211.162/j9
unknown
https://player.vimeo.com
unknown
http://api.ipify.orgd
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
http://cowod.hopto.org
unknown
http://hansgborn.eud
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/profiles/76561199780418869/badges
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fragnantbui.shop
188.114.97.3
malicious
gutterydhowi.shop
172.67.132.32
malicious
cowod.hopto.org
45.132.206.251
malicious
offensivedzvju.shop
188.114.96.3
malicious
drawzhotdog.shop
104.21.58.182
malicious
ghostreedmnu.shop
188.114.96.3
malicious
ballotnwu.site
104.21.2.13
malicious
wallkedsleeoi.shop
104.21.36.139
malicious
hansgborn.eu
188.114.96.3
malicious
steamcommunity.com
104.102.49.254
malicious
stogeneratmns.shop
188.114.97.3
malicious
reinforcenh.shop
104.21.77.130
malicious
vozmeatillu.shop
188.114.96.3
malicious
api.ipify.org
104.26.12.205
There are 4 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.77.130
reinforcenh.shop
United States
malicious
172.67.132.32
gutterydhowi.shop
United States
malicious
8.46.123.33
unknown
United States
malicious
104.21.2.13
ballotnwu.site
United States
malicious
147.45.44.104
unknown
Russian Federation
malicious
104.21.58.182
drawzhotdog.shop
United States
malicious
45.132.206.251
cowod.hopto.org
Russian Federation
malicious
188.114.97.3
fragnantbui.shop
European Union
malicious
104.21.36.139
wallkedsleeoi.shop
United States
malicious
188.114.96.3
offensivedzvju.shop
European Union
malicious
104.102.49.254
steamcommunity.com
United States
malicious
5.75.211.162
unknown
Germany
malicious
104.26.12.205
api.ipify.org
United States
239.255.255.250
unknown
Reserved
There are 4 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\Licensing Core
EnableConcurrentSessions
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters
ServiceDll
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server
fDenyTSConnections
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JKEHIIJJEC_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JKEHIIJJEC_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JKEHIIJJEC_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JKEHIIJJEC_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JKEHIIJJEC_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JKEHIIJJEC_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JKEHIIJJEC_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JKEHIIJJEC_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JKEHIIJJEC_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JKEHIIJJEC_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JKEHIIJJEC_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JKEHIIJJEC_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JKEHIIJJEC_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JKEHIIJJEC_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
AllowMultipleTSSessions
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{81c87465-de07-4efc-9d93-61e891d52fd2}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
Class
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
NoDisplayClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}
NoUseClass
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{091bc97e-2352-4362-a539-10a6d8ff7596}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{cc41eba2-ab57-4f4e-8c3d-1bc33b1e74e3}\Properties
Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tsusbhub\Parameters\Wdf
WdfMajorVersion
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tsusbhub\Parameters\Wdf
WdfMinorVersion
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DeviceClasses\{191a5137-7c9d-43c0-a943-de4411f424f7}\##?#TS_USB_HUB_Enumerator#UMB#2&30d3618&0&TS_USB_HUB#{191a5137-7c9d-43c0-a943-de4411f424f7}
DeviceInstance
There are 26 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3CE5000
trusted library allocation
page read and write
malicious
2481000
trusted library allocation
page read and write
malicious
450000
unkown
page readonly
malicious
104B000
heap
page read and write
malicious
450000
unkown
page readonly
malicious
400000
remote allocation
page execute and read and write
malicious
A2000
unkown
page readonly
malicious
3AF5000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
B4000
unkown
page readonly
1273000
heap
page read and write
6C9BF000
unkown
page write copy
1350000
heap
page read and write
2F7F000
stack
page read and write
9ED000
trusted library allocation
page execute and read and write
238B000
direct allocation
page read and write
19B8F000
stack
page read and write
5C0000
heap
page read and write
20192000
direct allocation
page read and write
401000
unkown
page execute read
2600000
direct allocation
page read and write
19FBD000
stack
page read and write
9C0000
trusted library allocation
page read and write
C90000
heap
page read and write
2FDE000
stack
page read and write
2B80000
heap
page read and write
2C3D000
stack
page read and write
A10000
heap
page read and write
23E0000
heap
page read and write
3440000
heap
page read and write
9D4000
trusted library allocation
page read and write
3240000
heap
page read and write
FB0000
heap
page read and write
1BD9E000
heap
page read and write
2FED000
stack
page read and write
3461000
heap
page read and write
4A20000
heap
page execute and read and write
92D000
heap
page read and write
3835000
heap
page read and write
E37000
heap
page read and write
222B6000
direct allocation
page readonly
D47000
heap
page read and write
236E000
direct allocation
page read and write
5901000
heap
page read and write
3400000
heap
page read and write
19FD0000
heap
page read and write
3E53F000
heap
page read and write
1BD30000
heap
page read and write
254A000
trusted library allocation
page read and write
2591000
direct allocation
page read and write
A0B000
trusted library allocation
page execute and read and write
DE0000
heap
page read and write
101F000
stack
page read and write
314C000
heap
page read and write
12A0000
trusted library allocation
page read and write
1445000
heap
page read and write
5932000
heap
page read and write
537E000
stack
page read and write
2900000
heap
page read and write
2073B000
stack
page read and write
237C000
direct allocation
page read and write
31A2000
heap
page read and write
2593000
trusted library allocation
page read and write
2FA0000
heap
page read and write
2589000
trusted library allocation
page read and write
19E30000
heap
page read and write
336E000
stack
page read and write
2DDE000
stack
page read and write
3830000
heap
page read and write
36AF000
stack
page read and write
9D50000
heap
page read and write
2B25000
heap
page read and write
D8E000
stack
page read and write
2AF1000
heap
page read and write
1390000
heap
page read and write
625E000
stack
page read and write
4C2000
remote allocation
page execute and read and write
103FB000
stack
page read and write
19BA0000
heap
page read and write
CBD000
heap
page read and write
44B000
unkown
page read and write
5E80000
heap
page read and write
910000
heap
page read and write
123E000
stack
page read and write
29BF000
stack
page read and write
1100000
heap
page read and write
3165000
heap
page read and write
318C000
heap
page read and write
12A6000
trusted library allocation
page read and write
EE9000
heap
page read and write
54BE000
stack
page read and write
19BBC000
heap
page read and write
4E3E000
stack
page read and write
19BA2000
heap
page read and write
7E0000
heap
page read and write
6C97F000
unkown
page readonly
22B4000
direct allocation
page read and write
780000
heap
page read and write
385CC000
heap
page read and write
5A7E000
stack
page read and write
257D000
trusted library allocation
page read and write
7D0000
heap
page read and write
D58000
heap
page read and write
11B0000
heap
page read and write
2B20000
heap
page read and write
4E7E000
stack
page read and write
58EE000
stack
page read and write
E00000
heap
page read and write
582000
remote allocation
page execute and read and write
34E0000
heap
page read and write
46B000
remote allocation
page execute and read and write
1FF51000
direct allocation
page execute read
287D000
stack
page read and write
9DD000
trusted library allocation
page execute and read and write
CB0000
heap
page read and write
12B0000
trusted library allocation
page read and write
14C9D000
stack
page read and write
60E000
stack
page read and write
32659000
heap
page read and write
FD0000
heap
page read and write
4C8000
remote allocation
page execute and read and write
171DE000
stack
page read and write
E90000
heap
page read and write
139A000
heap
page read and write
2360000
direct allocation
page read and write
1BD4D000
heap
page read and write
7B0000
heap
page read and write
BBE000
stack
page read and write
7E8000
stack
page read and write
50D000
stack
page read and write
C50000
trusted library allocation
page read and write
7F0000
heap
page read and write
7F4000
heap
page read and write
1BFC0000
heap
page read and write
582000
remote allocation
page execute and read and write
19BAC000
heap
page read and write
73C000
stack
page read and write
1239000
heap
page read and write
312D000
stack
page read and write
63A000
remote allocation
page execute and read and write
2CBD000
stack
page read and write
197DE000
stack
page read and write
259C000
direct allocation
page read and write
38A0000
heap
page read and write
29C0000
heap
page execute and read and write
2583000
trusted library allocation
page read and write
1A1F2000
heap
page read and write
29E8000
heap
page read and write
2D20000
heap
page read and write
2BAE000
unkown
page read and write
363F000
stack
page read and write
FAD000
stack
page read and write
C74000
trusted library allocation
page read and write
B7C000
stack
page read and write
2226A000
direct allocation
page execute read
1B0000
heap
page read and write
344C000
heap
page read and write
222D6000
direct allocation
page read and write
1330000
trusted library allocation
page execute and read and write
FB0000
heap
page read and write
9E0000
heap
page read and write
52D000
remote allocation
page execute and read and write
289F000
stack
page read and write
2915000
heap
page read and write
7F0000
heap
page read and write
97FE000
stack
page read and write
2358000
direct allocation
page read and write
A27000
heap
page read and write
AFC000
stack
page read and write
CAE000
stack
page read and write
23AF000
direct allocation
page read and write
5955000
heap
page read and write
780000
heap
page read and write
99E000
unkown
page readonly
48D000
stack
page read and write
9F0000
trusted library allocation
page read and write
340E000
stack
page read and write
1228000
heap
page read and write
2F50000
heap
page read and write
2276E000
stack
page read and write
269E000
stack
page read and write
455C000
stack
page read and write
EFC000
heap
page read and write
7FC20000
direct allocation
page read and write
2367000
direct allocation
page read and write
2AF1000
trusted library allocation
page execute and read and write
601E000
stack
page read and write
34DE000
stack
page read and write
E8F000
stack
page read and write
258F000
trusted library allocation
page read and write
3463000
heap
page read and write
445000
unkown
page read and write
3075000
heap
page read and write
103BF000
stack
page read and write
4F5000
stack
page read and write
DB0000
heap
page read and write
400000
remote allocation
page execute and read and write
1280000
trusted library allocation
page read and write
5945000
heap
page read and write
23E8000
direct allocation
page read and write
1BD32000
heap
page read and write
298E000
stack
page read and write
4F7F000
stack
page read and write
19C0D000
heap
page read and write
4D4000
remote allocation
page execute and read and write
4E1000
remote allocation
page execute and read and write
9C000
stack
page read and write
3125000
heap
page read and write
730000
heap
page read and write
2850000
heap
page read and write
2BDE000
stack
page read and write
AF2000
stack
page read and write
AA0000
heap
page read and write
4EF000
remote allocation
page execute and read and write
4B70000
trusted library section
page read and write
20801000
heap
page read and write
19C94000
heap
page read and write
F01000
heap
page read and write
D20000
heap
page read and write
12C0000
trusted library allocation
page read and write
A20000
heap
page read and write
2543000
trusted library allocation
page read and write
14C0000
heap
page read and write
2CE1000
trusted library allocation
page execute and read and write
13BE000
heap
page read and write
F20000
heap
page read and write
22264000
direct allocation
page execute read
465D000
stack
page read and write
2B3D000
stack
page read and write
1C12E000
heap
page read and write
46B000
remote allocation
page execute and read and write
A7D000
stack
page read and write
8FF000
stack
page read and write
23ED000
stack
page read and write
942000
unkown
page readonly
91A000
heap
page read and write
C63000
trusted library allocation
page execute and read and write
32FD000
stack
page read and write
30CF000
stack
page read and write
146F000
heap
page read and write
6C9C5000
unkown
page readonly
83F000
stack
page read and write
3070000
heap
page read and write
85B000
heap
page read and write
F10000
heap
page read and write
7A0000
heap
page read and write
445000
unkown
page write copy
3163000
heap
page read and write
34C8000
heap
page read and write
2D10000
heap
page read and write
30DE000
stack
page read and write
A20000
heap
page read and write
95D000
stack
page read and write
B75000
heap
page read and write
2610000
heap
page read and write
2A93000
trusted library allocation
page read and write
324E000
stack
page read and write
2C6E6000
heap
page read and write
2EEF000
stack
page read and write
28CB000
heap
page read and write
25BB000
direct allocation
page read and write
50E000
remote allocation
page execute and read and write
EEC000
stack
page read and write
570000
heap
page read and write
2E3E000
stack
page read and write
2840000
heap
page read and write
9C0000
heap
page read and write
6C741000
unkown
page execute read
D50000
heap
page read and write
5A1000
remote allocation
page execute and read and write
F10000
trusted library allocation
page execute and read and write
45D000
remote allocation
page execute and read and write
2C30000
heap
page read and write
4CE000
remote allocation
page execute and read and write
2CE3000
trusted library allocation
page read and write
322D000
stack
page read and write
990000
heap
page read and write
B2F000
stack
page read and write
C40000
trusted library allocation
page read and write
221F6000
direct allocation
page execute read
2F6D000
stack
page read and write
B40000
heap
page read and write
E0E000
heap
page read and write
22225000
direct allocation
page execute read
AB7000
heap
page read and write
2C6E000
heap
page read and write
29E0000
heap
page read and write
50FE000
stack
page read and write
E32000
heap
page read and write
460000
remote allocation
page execute and read and write
2019F000
direct allocation
page readonly
2AF3000
heap
page read and write
788000
heap
page read and write
BE0000
heap
page read and write
2658000
heap
page read and write
22255000
direct allocation
page execute read
14C5000
heap
page read and write
1640000
heap
page read and write
2F0F000
unkown
page read and write
C33000
trusted library allocation
page execute and read and write
3A91000
trusted library allocation
page read and write
10E0000
heap
page read and write
26773000
heap
page read and write
22B0000
direct allocation
page read and write
19CA0000
heap
page read and write
1FF50000
direct allocation
page execute and read and write
FC0000
heap
page read and write
2E50000
heap
page read and write
7FD70000
direct allocation
page read and write
12A4000
trusted library allocation
page read and write
13EA000
heap
page read and write
B60000
trusted library allocation
page read and write
DA0000
heap
page read and write
58F0000
heap
page read and write
1BD3C000
heap
page read and write
642000
unkown
page readonly
33A0000
heap
page read and write
4A6E000
stack
page read and write
161E000
stack
page read and write
253F000
trusted library allocation
page read and write
6C7E0000
unkown
page readonly
F1E000
stack
page read and write
BF0000
heap
page read and write
23DE000
stack
page read and write
1130000
heap
page read and write
CB8000
heap
page read and write
5E90000
heap
page read and write
3270000
heap
page read and write
A02000
trusted library allocation
page read and write
2015D000
direct allocation
page execute read
5E7E000
stack
page read and write
309E000
unkown
page read and write
3140000
heap
page read and write
54FE000
stack
page read and write
64E0000
trusted library allocation
page read and write
AF8000
stack
page read and write
10EF000
stack
page read and write
23A8000
direct allocation
page read and write
25F1000
direct allocation
page read and write
63A000
remote allocation
page execute and read and write
446000
unkown
page write copy
D00000
trusted library allocation
page execute and read and write
3450000
heap
page read and write
2531000
trusted library allocation
page read and write
2821000
trusted library allocation
page read and write
222D2000
direct allocation
page read and write
1C110000
heap
page read and write
7FD00000
direct allocation
page read and write
A0000
unkown
page readonly
2585000
trusted library allocation
page read and write
599B000
heap
page read and write
6C7E1000
unkown
page execute read
10D0000
trusted library allocation
page read and write
110F000
heap
page read and write
1340000
heap
page read and write
A90000
heap
page read and write
2AF3000
trusted library allocation
page read and write
37EE000
stack
page read and write
222C6000
direct allocation
page readonly
6C7CE000
unkown
page read and write
2375000
direct allocation
page read and write
2229F000
direct allocation
page readonly
7FE000
stack
page read and write
C98000
heap
page read and write
5A1000
remote allocation
page execute and read and write
9DD000
stack
page read and write
5F2000
unkown
page readonly
1E0000
heap
page read and write
C20000
heap
page read and write
126F000
heap
page read and write
F20000
heap
page read and write
2015F000
direct allocation
page readonly
F26000
heap
page read and write
D2E000
heap
page read and write
22098000
direct allocation
page execute read
14C3F000
stack
page read and write
2BEE000
stack
page read and write
58F6000
heap
page read and write
19C19000
heap
page read and write
E5D000
heap
page read and write
222A3000
direct allocation
page readonly
2EDF000
stack
page read and write
1241000
heap
page read and write
B50000
heap
page read and write
30EF000
stack
page read and write
2FD0000
heap
page read and write
14B3E000
stack
page read and write
10FE000
stack
page read and write
E0F000
stack
page read and write
1003E000
stack
page read and write
11AC000
heap
page read and write
92D000
stack
page read and write
26E0000
heap
page read and write
6398000
stack
page read and write
37BF000
stack
page read and write
19CFB000
stack
page read and write
14C000
stack
page read and write
8FE000
stack
page read and write
EE4000
heap
page read and write
D4E000
stack
page read and write
2587000
trusted library allocation
page read and write
4CB8C000
stack
page read and write
7FDE0000
direct allocation
page read and write
75E000
stack
page read and write
6EE000
stack
page read and write
222F0000
heap
page read and write
2FE0000
heap
page read and write
34AD000
heap
page read and write
26DE000
stack
page read and write
79D000
stack
page read and write
400000
unkown
page readonly
72F000
stack
page read and write
B50000
trusted library allocation
page execute and read and write
2595000
trusted library allocation
page read and write
EEE000
stack
page read and write
C20000
trusted library allocation
page read and write
283F000
stack
page read and write
24EF000
stack
page read and write
563000
remote allocation
page execute and read and write
1A12B000
heap
page read and write
19BCE000
heap
page read and write
26D9000
trusted library allocation
page read and write
2242D000
stack
page read and write
102BE000
stack
page read and write
250B000
trusted library allocation
page read and write
595B000
heap
page read and write
1977D000
stack
page read and write
2CD0000
heap
page execute and read and write
19ED0000
heap
page read and write
B00000
heap
page read and write
9BFE000
stack
page read and write
BB0000
heap
page read and write
9F2000
trusted library allocation
page read and write
D4E000
stack
page read and write
3162000
heap
page read and write
12BA000
trusted library allocation
page execute and read and write
125BD000
stack
page read and write
13DD000
heap
page read and write
2650000
heap
page read and write
D38000
stack
page read and write
1297D000
stack
page read and write
1440000
heap
page read and write
1BD1F000
stack
page read and write
28B0000
heap
page read and write
563000
remote allocation
page execute and read and write
220DA000
direct allocation
page execute read
ED1000
heap
page read and write
5959000
heap
page read and write
BFE000
stack
page read and write
144F000
heap
page read and write
5FDE000
stack
page read and write
469DE000
stack
page read and write
D10000
heap
page read and write
2615000
heap
page read and write
3250000
heap
page read and write
3370000
heap
page read and write
222BB000
direct allocation
page readonly
251E000
trusted library allocation
page read and write
A00000
heap
page read and write
2E40000
heap
page read and write
55E000
remote allocation
page execute and read and write
2C40000
heap
page read and write
6C9BE000
unkown
page read and write
55A000
remote allocation
page execute and read and write
3481000
trusted library allocation
page read and write
3463000
heap
page read and write
79F000
heap
page read and write
320E000
unkown
page read and write
533F000
stack
page read and write
300F000
stack
page read and write
4FBD000
stack
page read and write
201B8000
heap
page read and write
F0B000
heap
page read and write
5914000
heap
page read and write
175CD000
stack
page read and write
2F2C000
stack
page read and write
64DE000
stack
page read and write
A80000
heap
page read and write
69E000
stack
page read and write
8AD000
stack
page read and write
23E1000
direct allocation
page read and write
22103000
direct allocation
page execute read
2FCF000
stack
page read and write
1042000
heap
page read and write
4FE000
remote allocation
page execute and read and write
1BF8C000
stack
page read and write
14EBD000
stack
page read and write
28DE000
stack
page read and write
2F60000
heap
page read and write
34A0000
heap
page read and write
238D000
stack
page read and write
25CD000
stack
page read and write
BCE000
stack
page read and write
222CB000
direct allocation
page readonly
B70000
heap
page read and write
1A149000
heap
page read and write
337F000
unkown
page read and write
3A95000
trusted library allocation
page read and write
1240000
heap
page read and write
B80000
heap
page execute and read and write
620000
heap
page read and write
576E000
stack
page read and write
BD0000
heap
page read and write
10240000
heap
page read and write
12C7000
trusted library allocation
page execute and read and write
363F000
stack
page read and write
2FBD000
stack
page read and write
EED000
heap
page read and write
9AD000
stack
page read and write
E2F000
heap
page read and write
55D000
remote allocation
page execute and read and write
12CB000
trusted library allocation
page execute and read and write
D63000
heap
page read and write
5D7E000
stack
page read and write
2C53000
heap
page read and write
4D3D000
stack
page read and write
6C7BD000
unkown
page readonly
629C000
stack
page read and write
2650000
heap
page read and write
2BEE000
stack
page read and write
1235000
heap
page read and write
D55000
heap
page read and write
2D9F000
unkown
page read and write
4CF0000
heap
page read and write
2547000
trusted library allocation
page read and write
506000
remote allocation
page execute and read and write
12E0000
trusted library allocation
page read and write
2E58000
heap
page read and write
78C000
stack
page read and write
DEA000
heap
page read and write
2DC0000
heap
page read and write
2F90000
heap
page read and write
4E7E000
stack
page read and write
2390000
heap
page read and write
A3E000
unkown
page read and write
24D7000
trusted library allocation
page read and write
3275000
heap
page read and write
19FEB000
heap
page read and write
29B0000
trusted library allocation
page read and write
1023000
heap
page read and write
5EDE000
stack
page read and write
3407000
heap
page read and write
9C00000
unclassified section
page read and write
295F000
stack
page read and write
247F000
stack
page read and write
44D000
unkown
page write copy
9C5000
heap
page read and write
44C000
unkown
page write copy
22D7000
direct allocation
page read and write
640000
unkown
page readonly
344E000
stack
page read and write
31A5000
heap
page read and write
3270000
heap
page read and write
28FE000
stack
page read and write
346F000
stack
page read and write
516000
remote allocation
page execute and read and write
76D000
stack
page read and write
E08000
heap
page read and write
4CDCD000
stack
page read and write
33C4000
heap
page read and write
336E000
unkown
page read and write
5F0000
unkown
page readonly
4CA8B000
stack
page read and write
132E000
stack
page read and write
C44000
trusted library allocation
page read and write
2B9D000
stack
page read and write
133E000
stack
page read and write
611D000
stack
page read and write
2591000
trusted library allocation
page read and write
2225D000
direct allocation
page execute read
10A5000
heap
page read and write
9F0000
heap
page read and write
C46000
trusted library allocation
page read and write
584000
remote allocation
page execute and read and write
337F000
unkown
page read and write
78E000
heap
page read and write
9BE000
stack
page read and write
2266E000
stack
page read and write
FDA000
heap
page read and write
14F2E000
stack
page read and write
1BE8B000
stack
page read and write
1C0000
heap
page read and write
13B5000
heap
page read and write
523E000
stack
page read and write
4E8000
remote allocation
page execute and read and write
2FE0000
heap
page read and write
C8A000
trusted library allocation
page execute and read and write
590F000
heap
page read and write
2C6E000
heap
page read and write
E8E000
stack
page read and write
6C740000
unkown
page readonly
1294000
trusted library allocation
page read and write
2A91000
trusted library allocation
page execute and read and write
2019D000
direct allocation
page readonly
36ED000
stack
page read and write
9FE000
unkown
page read and write
1BD62000
heap
page read and write
8BE000
stack
page read and write
2EFF000
unkown
page read and write
87E000
stack
page read and write
C25000
heap
page read and write
2ADC000
heap
page read and write
112E000
stack
page read and write
257F000
trusted library allocation
page read and write
6C9C0000
unkown
page read and write
A07000
trusted library allocation
page execute and read and write
34A6000
heap
page read and write
347F000
stack
page read and write
93E000
unkown
page read and write
1293000
trusted library allocation
page execute and read and write
33AC000
heap
page read and write
5922000
heap
page read and write
401000
unkown
page execute read
24C7000
trusted library allocation
page read and write
257B000
trusted library allocation
page read and write
24FD000
trusted library allocation
page read and write
35AE000
stack
page read and write
6C7D2000
unkown
page readonly
36BF000
unkown
page read and write
DB0000
heap
page read and write
3180000
heap
page read and write
7B7000
heap
page read and write
2581000
trusted library allocation
page read and write
9F6000
trusted library allocation
page execute and read and write
C3E000
stack
page read and write
9D0000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
22266000
direct allocation
page execute read
50BE000
stack
page read and write
553E000
stack
page read and write
615E000
stack
page read and write
1293D000
stack
page read and write
236D000
stack
page read and write
85D000
stack
page read and write
C3C000
stack
page read and write
2930000
heap
page read and write
463000
remote allocation
page execute and read and write
19C1C000
heap
page read and write
BD0000
heap
page read and write
2DD0000
heap
page read and write
C67000
trusted library allocation
page execute and read and write
58F2000
heap
page read and write
9E40000
unclassified section
page read and write
1257C000
stack
page read and write
19DFB000
stack
page read and write
F2D000
heap
page read and write
72BF000
stack
page read and write
940000
unkown
page readonly
3ACB000
trusted library allocation
page read and write
2F80000
heap
page read and write
2514000
trusted library allocation
page read and write
BD7000
heap
page read and write
C9E000
heap
page read and write
EF2000
heap
page read and write
7C5000
heap
page read and write
E6D000
heap
page read and write
ECE000
stack
page read and write
B30000
heap
page read and write
3AF1000
trusted library allocation
page read and write
4DA000
remote allocation
page execute and read and write
EFC000
stack
page read and write
2D5D000
stack
page read and write
3CE1000
trusted library allocation
page read and write
1764E000
stack
page read and write
A50000
heap
page read and write
2A80000
heap
page read and write
2910000
heap
page read and write
563F000
stack
page read and write
2C8E000
stack
page read and write
281F000
trusted library allocation
page read and write
C6B000
trusted library allocation
page execute and read and write
110D000
heap
page read and write
DFE000
stack
page read and write
300E000
stack
page read and write
200B6000
direct allocation
page execute read
23F0000
heap
page read and write
6A0000
heap
page read and write
15DD000
stack
page read and write
9D3000
trusted library allocation
page execute and read and write
3370000
heap
page read and write
400000
unkown
page readonly
20168000
direct allocation
page readonly
258B000
trusted library allocation
page read and write
593B000
heap
page read and write
E45000
heap
page read and write
CD4000
heap
page read and write
7C3000
heap
page read and write
2399000
direct allocation
page read and write
800000
heap
page read and write
28B8000
heap
page read and write
57EE000
stack
page read and write
8AD000
stack
page read and write
437000
remote allocation
page execute and read and write
C64000
trusted library allocation
page read and write
CCE000
stack
page read and write
29C0000
heap
page read and write
3090000
heap
page read and write
C5A000
trusted library allocation
page execute and read and write
32E0000
heap
page read and write
3380000
heap
page read and write
1A1F0000
heap
page read and write
11B7000
heap
page read and write
1502F000
stack
page read and write
2B0000
heap
page read and write
34C0000
heap
page read and write
2229D000
direct allocation
page execute read
2FC0000
heap
page read and write
C0E000
stack
page read and write
4E30000
heap
page read and write
F4C000
stack
page read and write
2AE0000
heap
page execute and read and write
760000
heap
page read and write
D28000
heap
page read and write
2ACE000
stack
page read and write
147C000
heap
page read and write
51FF000
stack
page read and write
2AD0000
heap
page read and write
4B8E000
stack
page read and write
C34000
trusted library allocation
page read and write
CC5000
heap
page read and write
770000
heap
page read and write
102F000
stack
page read and write
3660000
heap
page read and write
AB0000
heap
page read and write
1C060000
heap
page read and write
463000
remote allocation
page execute and read and write
1BD5E000
heap
page read and write
528000
remote allocation
page execute and read and write
258D000
trusted library allocation
page read and write
2252D000
stack
page read and write
4F6000
remote allocation
page execute and read and write
63DE000
stack
page read and write
3010000
heap
page read and write
33C2000
heap
page read and write
2EEC000
stack
page read and write
F6D000
stack
page read and write
308F000
stack
page read and write
C97000
trusted library allocation
page execute and read and write
4488000
trusted library allocation
page read and write
3720000
heap
page read and write
336E000
stack
page read and write
A30000
heap
page read and write
E4D000
heap
page read and write
2BED000
stack
page read and write
9B0000
heap
page read and write
C9B000
trusted library allocation
page execute and read and write
33AF000
stack
page read and write
1117000
heap
page read and write
1723E000
stack
page read and write
447000
unkown
page read and write
13C7000
heap
page read and write
19FE4000
heap
page read and write
467000
remote allocation
page execute and read and write
19C15000
heap
page read and write
28B0000
heap
page read and write
91E000
heap
page read and write
14AFD000
stack
page read and write
2920000
heap
page read and write
3120000
heap
page read and write
F15000
heap
page read and write
2A2F000
stack
page read and write
C76000
trusted library allocation
page read and write
4B6E000
stack
page read and write
467000
remote allocation
page execute and read and write
547E000
stack
page read and write
6EC000
stack
page read and write
9E0000
trusted library allocation
page read and write
580000
heap
page read and write
71E000
stack
page read and write
788000
heap
page read and write
1276000
heap
page read and write
336E000
stack
page read and write
3320000
heap
page read and write
29E8000
trusted library allocation
page read and write
2EFD000
stack
page read and write
19B000
stack
page read and write
2392000
direct allocation
page read and write
2FED000
stack
page read and write
332F000
stack
page read and write
9FA000
trusted library allocation
page execute and read and write
2019A000
direct allocation
page readonly
1BE30000
heap
page read and write
25D000
stack
page read and write
625000
heap
page read and write
CFE000
stack
page read and write
670000
remote allocation
page execute and read and write
F0D000
stack
page read and write
718F000
stack
page read and write
29AE000
stack
page read and write
12FC000
stack
page read and write
1508D000
stack
page read and write
30FD000
stack
page read and write
1FF58000
direct allocation
page execute read
51F000
remote allocation
page execute and read and write
4A10000
trusted library allocation
page read and write
19C81000
heap
page read and write
F17000
heap
page read and write
1464000
heap
page read and write
9D40000
heap
page read and write
C70000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
2C6F000
stack
page read and write
D4C000
heap
page read and write
2C4C000
heap
page read and write
C60000
heap
page read and write
5ABF000
stack
page read and write
There are 796 hidden memdumps, click here to show them.