IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
modified
malicious
C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_GoogleUpdater.ex_b5e9e639d399fad238f3f2a2f4864a4acc04faf_485bd42f_795adb79-7e3b-4a39-a5b7-9048b6b648dc\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_GoogleUpdater.ex_b5e9e639d399fad238f3f2a2f4864a4acc04faf_485bd42f_e3422d00-4588-4363-ac2c-1948855215e7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_LKMService.exe_bdbda8d00ab586e1b1371d9646967c78080db8c_54538a4f_501a81ae-381a-4362-8eb5-6f99d9cfdae9\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_LKMService.exe_bdbda8d00ab586e1b1371d9646967c78080db8c_54538a4f_d3f0a05f-2cdf-4b38-947a-11409000491e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER538F.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Oct 3 01:26:24 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER547B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER549B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7272.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Oct 3 01:26:32 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER73AB.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7523.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER951D.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Oct 3 01:26:40 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER95F8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9628.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB3EF.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Oct 3 01:26:48 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB4AC.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB4DC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_0f1fdcd72fa2443cb400c03502902fe9.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:33 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_111bb590f9e24471b247ca4b4d7fd194.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:54 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_1260347513fa42eb8dbca954b1f9766f.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:26 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_17b0682e31094ae8b61542e0fc483319.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:52 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_1bc86309aad64beaaba50da47f1fe248.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:11 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_255ec7c5f6124168899ab52eb1fb3db9.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:56 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_270b1265d8e74892bac3d731d24190c0.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:15 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_284cd24aa4e1493cb8422375a300e535.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:17 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_28a5b517ff724da4be16ea4aaf5a357c.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:40 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_2d07a0547ac04ab9af7372ee910ba6b1.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:47 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_2d708224935546eb848b785f0206ad51.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:14 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_30649bb19ccb493bae273224706f8bba.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:27 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_3334419e53b3488ca85ae4de076f47dc.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:23 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_385556207e4d49bb88bb33a72ac98a68.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:14 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_38b12ffdc3054b75a4cc42355d27321a.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:08 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_3a7884e208224a6c873f89801ccde078.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:20 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_41851dcfce50420bb4154e63f25f2a8e.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:59 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_46234ffc04244b23ac4dc3e0979a0b7d.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:58 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_513aa6e3c652483682fd1f51e46a8bd3.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:05 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_55c2eb9fb8194b3183dae4b65fdda1b5.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:10 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_59312c45173e49bd8b855b176d5a495f.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:16 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_5f419d2562814795914a60f7e574128b.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:00 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_621b8830c943464c9d47e42d99b46857.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:24 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_687a9749c9a44df689e436ec246c5fcc.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:49 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_6bbe8cc63bcf4ed199794d58d51e869f.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:09 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_70b4bf6c89434abb9c4a92d4a3107a31.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:21 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_7172ee7a982744218b205a6832554ab3.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:51 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_75bc3afdb6384591b03d648ecbb02287.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:18 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_7a283f2dc44047f9b90f76f7687c84db.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:12 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_7b11985b0f4a44efbcfa9ebcdda85610.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:29 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_7d29b77eb5544048bf84a48c0bc966be.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:43 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_7e8ecf4f001c41edb4100bd58d1d004f.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:15 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_80b58aa1ecd34f41b1ed729e00929f51.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:11 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_8127c9e300df4816a3f8c0b347934bf0.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:34 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_856eb967065a4a3faa5cc998ae92f005.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:32 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_88f655959b0548ed994a963bf2f1d4d9.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:10 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_8b0b963caf834d029f35df17c1c436c7.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:11 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_8f3c4b00bddc456e9c6e890ed0339b68.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:53 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_92fa881b504c497db058025dd6cb3bc4.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:50 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_9dac438bfec04a60812adddf7761318f.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:02 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_9e92297ac52847c3a122730984e5abd1.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:16 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_a0df83e3640e4d8d8bc92cc51336f2f5.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:25 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_a37d9ccfb0194adf8213dc3f6997f78f.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:23 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_a97a4cd7e177496cae1d18f2d60edeb6.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:44 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_aa8be52a868740eab8f8ec82641ac0c1.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:18 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_acbb346df900467ebd8c2c0ce13844f9.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:46 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_b87af243048a4cb58e7fbbcc09d4d0bb.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:48 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_ba60f2e1542943c49cb63fcb463703a8.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:01 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_baaca187cd3746ad83aad8ceea07a8c5.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:12 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_c365a14f7cc645439df5ba22b5f10906.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:07 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_c460e1bb0908400c8719e2ff6efc6472.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:55 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_c894375b99af48eb88116328de9ffb98.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:31 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d550e8040e9f44f19bffddc3e8e06d5e.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:40 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d5b565aee0b842f89c22c5f172678df9.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:17 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d827f342fe9c4f3d948a33ec240811fd.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:13 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d97d239314814309aa82de22ff2626e0.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:36 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d9ae47459b854ee78156fea739ee2eba.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:37 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_e473bf015e6148daa821e9cdba096597.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:04 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_e64ab677b62d4831a2902f3e6bff49df.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:35 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_ec7e774008154f3596c8e5c3ca65b43a.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:11 2024, mtime=Thu Oct 3 00:26:11 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_ed539e9b377a47aebbf43d3ea0cb839e.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:42 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_ee6262db977148f9b6ce41041a0fbdf7.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:57 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_f259adaf5ff645509c195bf263dfd55e.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:30 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_f398b917ebdf42d684e3df08d449596d.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:39 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_f5a844d131a542409d15c7be5595addc.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:03 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_f619a40d28e44231bbc0b75adc7e6593.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:19 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_fff188210d924c868774a26b37b1f9c9.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:45 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
dropped
There are 79 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
"C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe"
malicious
C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe
"C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe" --checker
malicious
C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
"C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe"
malicious
C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe
"C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe"
malicious
C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
"C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe"
malicious
C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe
"C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 932
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 884 -s 932
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6856 -s 932
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6280 -s 932
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://yalubluseks.eu/t
unknown
http://yalubluseks.eud
unknown
http://api.ipify.orgD
unknown
http://api.ipify.orgd
unknown
https://sectigo.com/CPS0
unknown
https://yalubluseks.euD
unknown
http://ocsp.sectigo.com0
unknown
https://yalubluseks.eu/get_filT
unknown
https://yalubluseks.eu/receiPt
unknown
https://yalubluseks.eu/get_update.phpT
unknown
http://api.ipify.org/
172.67.74.152
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
https://pidgin.im0
unknown
https://yalubluseks.eu
unknown
https://yalubluseks.eu/get_update.php
104.21.54.163
https://yalubluseks.eu/get_updatX
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://yalubluseks.eu/receive.php
104.21.54.163
https://yalubluseks.eu/
unknown
http://yalubluseks.eu
unknown
https://yalubluseks.eu/get_file.php
104.21.54.163
http://api.ipify.org
unknown
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ipify.org
172.67.74.152
yalubluseks.eu
104.21.54.163
57.122.6.0.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
104.26.12.205
unknown
United States
104.21.54.163
yalubluseks.eu
United States
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
LKMService_047c5762224547e8b0906f5148be419e
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
LKMService_773ee3bb9e0f4071afc0e6a7986206d0
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LKMService_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LKMService_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LKMService_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LKMService_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LKMService_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LKMService_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LKMService_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LKMService_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LKMService_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LKMService_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LKMService_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LKMService_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LKMService_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LKMService_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1035000
heap
page read and write
8DA000
heap
page read and write
2470000
trusted library allocation
page read and write
FD7000
trusted library allocation
page execute and read and write
33C000
stack
page read and write
5958000
heap
page read and write
740000
trusted library allocation
page read and write
75BF000
stack
page read and write
9CB000
trusted library allocation
page execute and read and write
7A2000
heap
page read and write
243E000
trusted library allocation
page read and write
647000
trusted library allocation
page execute and read and write
70D0000
heap
page execute and read and write
240E000
trusted library allocation
page read and write
6EE000
stack
page read and write
FC000
stack
page read and write
78BE000
stack
page read and write
B50000
heap
page read and write
11D2000
trusted library allocation
page read and write
2C21000
trusted library allocation
page read and write
637000
trusted library allocation
page read and write
59A000
unkown
page readonly
267000
unkown
page execute read
2E03000
trusted library allocation
page read and write
B30000
heap
page execute and read and write
9F2000
trusted library allocation
page read and write
2DD3000
trusted library allocation
page read and write
EF7000
trusted library allocation
page execute and read and write
794000
heap
page read and write
766E000
stack
page read and write
2370000
heap
page execute and read and write
80E000
stack
page read and write
585D000
stack
page read and write
FF730000
trusted library allocation
page execute and read and write
2B8E000
stack
page read and write
2BD0000
trusted library allocation
page read and write
58B1000
heap
page read and write
5FAC000
stack
page read and write
245D000
trusted library allocation
page read and write
1000000
heap
page read and write
6D0F000
stack
page read and write
1330000
heap
page read and write
2BE0000
heap
page read and write
12D0000
trusted library allocation
page read and write
5925000
heap
page read and write
58AC000
heap
page read and write
2AFA000
trusted library allocation
page execute and read and write
A2D000
heap
page read and write
1000000
heap
page read and write
7FFC000
stack
page read and write
2DE1000
trusted library allocation
page read and write
25D1000
trusted library allocation
page read and write
6C3F000
stack
page read and write
721E000
stack
page read and write
593E000
stack
page read and write
73AC000
stack
page read and write
9CE000
heap
page read and write
113A000
heap
page read and write
DA0000
trusted library allocation
page read and write
FCE000
stack
page read and write
5E2F000
stack
page read and write
11CF000
stack
page read and write
74D000
trusted library allocation
page execute and read and write
58FE000
stack
page read and write
5956000
heap
page read and write
133F000
stack
page read and write
4DBC000
stack
page read and write
2C90000
trusted library allocation
page read and write
2991000
trusted library allocation
page read and write
8DC000
heap
page read and write
28EC000
stack
page read and write
1200000
trusted library allocation
page execute and read and write
2AE0000
trusted library allocation
page read and write
251E000
trusted library allocation
page read and write
782E000
stack
page read and write
2442000
trusted library allocation
page read and write
752E000
stack
page read and write
78C0000
heap
page read and write
75EE000
stack
page read and write
B2E000
stack
page read and write
1220000
trusted library allocation
page read and write
FFD10000
trusted library allocation
page execute and read and write
92F000
stack
page read and write
6F8000
stack
page read and write
970000
heap
page read and write
5893000
heap
page read and write
9FF000
heap
page read and write
1230000
heap
page read and write
1147000
heap
page read and write
9F0000
heap
page read and write
1324000
trusted library allocation
page read and write
850000
heap
page read and write
76E000
heap
page read and write
2960000
trusted library allocation
page read and write
2BAC000
stack
page read and write
610000
trusted library allocation
page read and write
D93000
trusted library allocation
page execute and read and write
30DF000
trusted library allocation
page read and write
99D000
trusted library allocation
page execute and read and write
B3E000
stack
page read and write
8100000
heap
page read and write
652000
trusted library allocation
page read and write
9C7000
trusted library allocation
page execute and read and write
60AB000
stack
page read and write
2C1E000
stack
page read and write
575000
heap
page read and write
636E000
stack
page read and write
1042000
heap
page read and write
990000
trusted library allocation
page read and write
E2E000
stack
page read and write
3991000
trusted library allocation
page read and write
7CFF000
stack
page read and write
9B7000
trusted library allocation
page execute and read and write
64A000
trusted library allocation
page execute and read and write
5890000
heap
page read and write
B40000
trusted library allocation
page read and write
2DDF000
stack
page read and write
1210000
trusted library allocation
page read and write
2B07000
trusted library allocation
page execute and read and write
86C000
stack
page read and write
DAD000
trusted library allocation
page execute and read and write
1007000
heap
page read and write
A30000
heap
page read and write
6B3E000
stack
page read and write
11F0000
trusted library allocation
page read and write
6E0000
heap
page read and write
9C8000
heap
page read and write
F3E000
stack
page read and write
A07000
heap
page read and write
23A0000
heap
page execute and read and write
80FC000
stack
page read and write
2BC0000
trusted library allocation
page read and write
9B0000
heap
page read and write
58BD000
stack
page read and write
6E6F000
stack
page read and write
2C30000
trusted library allocation
page read and write
FA0000
heap
page read and write
6D5000
heap
page read and write
245B000
trusted library allocation
page read and write
8D3000
heap
page read and write
242A000
trusted library allocation
page read and write
FE0000
trusted library allocation
page execute and read and write
7221000
trusted library allocation
page read and write
634000
trusted library allocation
page read and write
A59000
heap
page read and write
486E000
stack
page read and write
1193000
heap
page read and write
43C000
stack
page read and write
E4E000
stack
page read and write
460000
heap
page read and write
2341000
trusted library allocation
page read and write
24C9000
trusted library allocation
page read and write
1081000
heap
page read and write
BF7000
heap
page read and write
9F7000
unkown
page execute read
AE0000
heap
page read and write
D9D000
trusted library allocation
page execute and read and write
4890000
heap
page read and write
72C000
stack
page read and write
A00000
heap
page read and write
E80000
heap
page read and write
4A50000
trusted library allocation
page read and write
95E000
stack
page read and write
77AF000
stack
page read and write
243A000
trusted library allocation
page read and write
3E05000
trusted library allocation
page read and write
8A3000
heap
page read and write
262D000
trusted library allocation
page read and write
74EE000
stack
page read and write
57BD000
stack
page read and write
734000
trusted library allocation
page read and write
AB2000
heap
page read and write
E30000
heap
page read and write
BF0000
heap
page read and write
107F000
heap
page read and write
100A000
heap
page read and write
23B1000
trusted library allocation
page read and write
593F000
heap
page read and write
BE0000
trusted library allocation
page read and write
10EE000
stack
page read and write
2422000
trusted library allocation
page read and write
590000
heap
page read and write
35F5000
trusted library allocation
page read and write
3DC5000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
79F000
heap
page read and write
4DE0000
heap
page read and write
5E6C000
stack
page read and write
762E000
stack
page read and write
25CE000
stack
page read and write
2B6E000
stack
page read and write
5A8C000
stack
page read and write
11DB000
trusted library allocation
page execute and read and write
4CBC000
stack
page read and write
EBA000
trusted library allocation
page execute and read and write
741E000
stack
page read and write
464D000
stack
page read and write
A12000
trusted library allocation
page read and write
70BE000
stack
page read and write
592000
unkown
page execute read
11D0000
trusted library allocation
page read and write
64AE000
stack
page read and write
732E000
stack
page read and write
2BA0000
trusted library allocation
page read and write
570000
heap
page read and write
5BE000
stack
page read and write
E93000
trusted library allocation
page execute and read and write
5D0000
unkown
page readonly
FDB000
trusted library allocation
page execute and read and write
994000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
860000
trusted library allocation
page read and write
5933000
heap
page read and write
ED4000
trusted library allocation
page read and write
2432000
trusted library allocation
page read and write
5250000
trusted library allocation
page execute and read and write
2526000
trusted library allocation
page read and write
28F0000
heap
page execute and read and write
968000
stack
page read and write
118D000
heap
page read and write
6E9F000
stack
page read and write
52EE000
stack
page read and write
3FE000
stack
page read and write
385000
heap
page read and write
1230000
heap
page read and write
10AE000
stack
page read and write
2980000
heap
page read and write
E0D000
stack
page read and write
EE4000
trusted library allocation
page read and write
592C000
heap
page read and write
4BF8000
stack
page read and write
ED2000
trusted library allocation
page read and write
82A000
heap
page read and write
D94000
trusted library allocation
page read and write
792C000
stack
page read and write
6D4E000
stack
page read and write
49C0000
heap
page read and write
1118000
heap
page read and write
620000
trusted library allocation
page read and write
4AC0000
trusted library allocation
page execute and read and write
9BA000
trusted library allocation
page execute and read and write
680000
trusted library allocation
page execute and read and write
EDD000
trusted library allocation
page execute and read and write
A20000
trusted library allocation
page read and write
12F0000
heap
page execute and read and write
75A000
heap
page read and write
962000
trusted library allocation
page read and write
630000
trusted library allocation
page read and write
6FBE000
stack
page read and write
2390000
trusted library allocation
page read and write
FA5000
heap
page read and write
61EF000
stack
page read and write
622C000
stack
page read and write
24C0000
heap
page execute and read and write
772F000
stack
page read and write
EF0000
trusted library allocation
page read and write
14D0000
heap
page read and write
E80000
trusted library allocation
page read and write
76AE000
stack
page read and write
3DA1000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
C7C000
stack
page read and write
AAE000
heap
page read and write
9C0000
heap
page read and write
552C000
stack
page read and write
D78000
stack
page read and write
870000
heap
page read and write
234C000
stack
page read and write
624000
trusted library allocation
page read and write
7BFE000
stack
page read and write
4AAE000
stack
page read and write
58A0000
heap
page read and write
1F8000
stack
page read and write
692000
trusted library allocation
page read and write
DB0000
heap
page read and write
4EFC000
stack
page read and write
E7E000
stack
page read and write
707F000
stack
page read and write
76BE000
stack
page read and write
6B20000
heap
page execute and read and write
A41000
heap
page read and write
1220000
trusted library allocation
page read and write
ED3000
trusted library allocation
page execute and read and write
C3F000
stack
page read and write
EBE000
stack
page read and write
A2F000
stack
page read and write
6F9F000
stack
page read and write
89A000
heap
page read and write
261D000
trusted library allocation
page read and write
2A28000
trusted library allocation
page read and write
11FE000
stack
page read and write
69D1000
trusted library allocation
page read and write
623000
trusted library allocation
page execute and read and write
157000
unkown
page execute read
2647000
trusted library allocation
page read and write
ACC000
stack
page read and write
2400000
trusted library allocation
page read and write
2DA1000
trusted library allocation
page read and write
4E01000
trusted library allocation
page read and write
2AF7000
trusted library allocation
page execute and read and write
2B0B000
trusted library allocation
page execute and read and write
2462000
trusted library allocation
page read and write
F70000
heap
page read and write
1370000
heap
page read and write
130F000
stack
page read and write
49D0000
heap
page read and write
4DFC000
stack
page read and write
5580000
heap
page read and write
246A000
trusted library allocation
page read and write
33D5000
trusted library allocation
page read and write
62D000
trusted library allocation
page execute and read and write
760000
heap
page read and write
756E000
stack
page read and write
2900000
heap
page read and write
35D1000
trusted library allocation
page read and write
DA7000
trusted library allocation
page read and write
1145000
heap
page read and write
B80000
trusted library allocation
page read and write
2350000
trusted library allocation
page read and write
5210000
heap
page read and write
1212000
trusted library allocation
page read and write
D4E000
stack
page read and write
2D90000
heap
page execute and read and write
4AFB000
stack
page read and write
28E7000
trusted library allocation
page read and write
2B20000
trusted library allocation
page read and write
F4E000
stack
page read and write
12BE000
stack
page read and write
2B00000
trusted library allocation
page read and write
1184000
heap
page read and write
A02000
heap
page read and write
14F0000
heap
page read and write
2C40000
trusted library allocation
page read and write
60EE000
stack
page read and write
537000
stack
page read and write
BDE000
stack
page read and write
965000
trusted library allocation
page execute and read and write
103F000
heap
page read and write
240A000
trusted library allocation
page read and write
4AD0000
heap
page read and write
F08000
heap
page read and write
B60000
heap
page read and write
1200000
trusted library allocation
page execute and read and write
FF0000
trusted library allocation
page read and write
ED7000
trusted library allocation
page execute and read and write
4C3E000
stack
page read and write
2426000
trusted library allocation
page read and write
DE0000
heap
page read and write
5D2E000
stack
page read and write
76A000
heap
page read and write
7A29000
stack
page read and write
9E0000
trusted library allocation
page execute and read and write
E90000
trusted library allocation
page read and write
230E000
stack
page read and write
E9D000
trusted library allocation
page execute and read and write
1110000
heap
page read and write
9A0000
trusted library allocation
page read and write
768000
heap
page read and write
73D000
trusted library allocation
page execute and read and write
D0E000
stack
page read and write
5179000
stack
page read and write
990000
heap
page read and write
733000
trusted library allocation
page execute and read and write
2920000
trusted library allocation
page read and write
97C000
stack
page read and write
9B5000
heap
page read and write
4EDE000
stack
page read and write
4880000
trusted library allocation
page execute and read and write
51C0000
heap
page read and write
F48000
trusted library allocation
page read and write
27000
unkown
page execute read
BC0000
heap
page read and write
4390000
trusted library allocation
page read and write
730000
trusted library allocation
page read and write
68A1000
trusted library allocation
page read and write
878000
heap
page read and write
6D8E000
stack
page read and write
577E000
stack
page read and write
2AE4000
trusted library allocation
page read and write
730000
heap
page read and write
F36000
heap
page read and write
738E000
stack
page read and write
77BF000
stack
page read and write
ECA000
trusted library allocation
page execute and read and write
594D000
heap
page read and write
28E5000
trusted library allocation
page read and write
FF340000
trusted library allocation
page execute and read and write
437E000
stack
page read and write
540000
heap
page read and write
2452000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
4A8D000
stack
page read and write
8A6000
heap
page read and write
2C40000
heap
page read and write
EC0000
heap
page read and write
2436000
trusted library allocation
page read and write
EA4000
trusted library allocation
page read and write
3C21000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
9F0000
heap
page read and write
D90000
trusted library allocation
page read and write
2CD0000
heap
page execute and read and write
33B1000
trusted library allocation
page read and write
4E9E000
stack
page read and write
9C2000
trusted library allocation
page read and write
1340000
heap
page read and write
646E000
stack
page read and write
44EE000
stack
page read and write
11D7000
trusted library allocation
page execute and read and write
65AF000
stack
page read and write
5460000
trusted library allocation
page read and write
8D1000
heap
page read and write
4D5D000
stack
page read and write
10F0000
heap
page read and write
7101000
trusted library allocation
page read and write
FF430000
trusted library allocation
page execute and read and write
FF830000
trusted library allocation
page execute and read and write
BC7000
stack
page read and write
9A7000
unkown
page execute read
521E000
stack
page read and write
720000
trusted library allocation
page read and write
752000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
2AF0000
trusted library allocation
page read and write
FD2000
trusted library allocation
page read and write
28AE000
stack
page read and write
EFA000
trusted library allocation
page execute and read and write
3DE1000
trusted library allocation
page read and write
756000
trusted library allocation
page execute and read and write
65B000
trusted library allocation
page execute and read and write
73DE000
stack
page read and write
5BCE000
stack
page read and write
6BE000
stack
page read and write
4DF0000
trusted library allocation
page execute and read and write
590000
unkown
page readonly
745E000
stack
page read and write
50F0000
heap
page read and write
7BBE000
stack
page read and write
1095000
heap
page read and write
5FE000
stack
page read and write
F00000
heap
page read and write
1320000
heap
page execute and read and write
2F83000
trusted library allocation
page read and write
380000
heap
page read and write
765000
heap
page read and write
5CCE000
stack
page read and write
127E000
stack
page read and write
5200000
trusted library allocation
page execute and read and write
731E000
stack
page read and write
EC0000
trusted library allocation
page read and write
50E0000
trusted library allocation
page execute and read and write
6D90000
heap
page execute and read and write
2B02000
trusted library allocation
page read and write
535D000
stack
page read and write
507B000
stack
page read and write
50DE000
stack
page read and write
7B0000
heap
page read and write
ED0000
trusted library allocation
page read and write
670000
heap
page read and write
3414000
trusted library allocation
page read and write
2B4E000
stack
page read and write
5954000
heap
page read and write
71DE000
stack
page read and write
74AE000
stack
page read and write
8A7000
unkown
page execute read
73A0000
heap
page execute and read and write
D80000
trusted library allocation
page read and write
44DE000
stack
page read and write
632C000
stack
page read and write
4C7E000
stack
page read and write
1212000
trusted library allocation
page read and write
545C000
stack
page read and write
74B0000
heap
page execute and read and write
EDB000
trusted library allocation
page execute and read and write
E35000
heap
page read and write
54AE000
stack
page read and write
44AF000
stack
page read and write
690000
trusted library allocation
page read and write
9DE000
stack
page read and write
2D97000
trusted library allocation
page read and write
F79000
heap
page read and write
531D000
stack
page read and write
55FE000
stack
page read and write
1177000
heap
page read and write
8220000
heap
page read and write
967000
trusted library allocation
page execute and read and write
24E3000
trusted library allocation
page read and write
CF8000
stack
page read and write
A10000
trusted library allocation
page read and write
460C000
stack
page read and write
EB7000
trusted library allocation
page execute and read and write
2D4E000
stack
page read and write
F2A000
heap
page read and write
A00000
trusted library allocation
page execute and read and write
E30000
heap
page read and write
2C2C000
stack
page read and write
470E000
stack
page read and write
6AE1000
trusted library allocation
page read and write
2516000
trusted library allocation
page read and write
6B0E000
stack
page read and write
96B000
trusted library allocation
page execute and read and write
709E000
stack
page read and write
6C6E000
stack
page read and write
C0E000
stack
page read and write
575E000
stack
page read and write
6D8000
heap
page read and write
6D0000
heap
page read and write
F65000
heap
page read and write
54EE000
stack
page read and write
6A0000
heap
page read and write
4C5C000
stack
page read and write
EE7000
trusted library allocation
page read and write
1323000
trusted library allocation
page execute and read and write
2412000
trusted library allocation
page read and write
5F6B000
stack
page read and write
2C2E000
stack
page read and write
100E000
heap
page read and write
245E000
stack
page read and write
3B0000
heap
page read and write
567E000
stack
page read and write
6F7E000
stack
page read and write
1310000
trusted library allocation
page read and write
242E000
trusted library allocation
page read and write
563E000
stack
page read and write
993000
trusted library allocation
page execute and read and write
B90000
heap
page read and write
2BB0000
trusted library allocation
page execute and read and write
2D5D000
trusted library allocation
page read and write
810000
heap
page read and write
3341000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
E94000
trusted library allocation
page read and write
74EE000
stack
page read and write
F75000
heap
page read and write
FFBC0000
trusted library allocation
page execute and read and write
9A4000
trusted library allocation
page read and write
8EC000
heap
page read and write
6C2E000
stack
page read and write
9F4000
heap
page read and write
F50000
heap
page read and write
49B0000
trusted library allocation
page execute and read and write
2BC2000
trusted library allocation
page read and write
241E000
stack
page read and write
FF520000
trusted library allocation
page execute and read and write
738000
heap
page read and write
2399000
trusted library allocation
page read and write
556D000
stack
page read and write
6ACF000
stack
page read and write
9A7000
trusted library allocation
page read and write
2A24000
trusted library allocation
page read and write
6D6E000
stack
page read and write
3365000
trusted library allocation
page read and write
5B8F000
stack
page read and write
75A000
trusted library allocation
page execute and read and write
5880000
heap
page read and write
74AC000
stack
page read and write
7271000
trusted library allocation
page read and write
657000
trusted library allocation
page execute and read and write
3C45000
trusted library allocation
page read and write
9E0000
heap
page read and write
132D000
trusted library allocation
page execute and read and write
F33000
heap
page read and write
5261000
trusted library allocation
page read and write
1027000
heap
page read and write
7ABE000
stack
page read and write
1210000
trusted library allocation
page read and write
There are 556 hidden memdumps, click here to show them.