IOC Report
3WffcqLN3q.exe

loading gif

Files

File Path
Type
Category
Malicious
3WffcqLN3q.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Google\Chrome\updater.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\HIJEGDBGDB.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_3WffcqLN3q.exe_d97d453eb13d5efb3a952d6bab97e2d6a33ddb_cffce7ff_1d0a7b8c-3c99-43d1-a110-a5b869b5bb10\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\System32\drivers\etc\hosts
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\AKJDGDGD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CGIEGHJEGHJKFIEBFHJK
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\CGIEGHJEGHJKFIEBFHJKKKFHCF
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\DBKFIDAAEHIEGCBFIDBFHCGDAK
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\EBAAAFBGDBKKEBGCFCBFHIIECA
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GHJEGCAE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\HIIDGCGCBFBAKFHIJDBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IIJDBGDGCGDAKFIDGIDB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JEBFIIIEHCFHJKFHDHDAAFBGDB
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCAE7.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Oct 25 11:12:29 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC4F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC7F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC8D.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCCDC.tmp.txt
data
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0e4pmxsm.tph.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a3ctcemb.vy5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hb2uiji0.wkx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pwe4leiv.asz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 29 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\3WffcqLN3q.exe
"C:\Users\user\Desktop\3WffcqLN3q.exe"
malicious
C:\ProgramData\HIJEGDBGDB.exe
"C:\ProgramData\HIJEGDBGDB.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop UsoSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop WaaSMedicSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop wuauserv
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop bits
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop dosvc
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop eventlog
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"
malicious
C:\ProgramData\Google\Chrome\updater.exe
C:\ProgramData\Google\Chrome\updater.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\ProgramData\HIJEGDBGDB.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3872 -ip 3872
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 2960
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 31 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.241.61.210/903e65da79c0ad0a/nss3.dll
185.241.61.210
malicious
http://185.241.61.210/903e65da79c0ad0a/freebl3.dll
185.241.61.210
malicious
http://185.241.61.210/903e65da79c0ad0a/mozglue.dll
185.241.61.210
malicious
http://185.241.61.210/903e65da79c0ad0a/msvcp140.dll
185.241.61.210
malicious
http://185.241.61.210/903e65da79c0ad0a/softokn3.dll
185.241.61.210
malicious
http://185.241.61.210/903e65da79c0ad0a/sqlite3.dll
185.241.61.210
malicious
http://185.241.61.210/
185.241.61.210
malicious
http://185.241.61.210/903e65da79c0ad0a/vcruntime140.dll
185.241.61.210
malicious
http://185.241.61.210
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.241.61.210/849647684a13b905.php1
unknown
http://185.241.61.210/849647684a13b905.php9a9c4a2f8b514.cdf-ms
unknown
http://185.241.61.210EGIJ
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdoap.or
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdS
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://login.l
unknown
https://login.microsoftonline.com/ppsecure/ResolveUser.srf
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdp
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsds
unknown
https://login.microsoftonline.com/ppsecure/devicechangecredential.srf
unknown
https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf.
unknown
http://schemas.xmlsoap.org/ws/2005/02/scken
unknown
https://login.microsoftonline.com/ppsecure/EnumerateDevices.srf
unknown
https://account.live.com/InlineSignup.aspx?iww=1&id=80502
unknown
http://Passport.NET/tb_
unknown
https://login.live
unknown
http://185.241.61.210/903e65da79c0ad0a/softokn3.dll;
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://185.241.61.210/849647684a13b905.phpp
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc4
unknown
https://login.microsoftonline.com/ppsecure/DeviceAssociate.srfJ
unknown
http://185.241.61.210/9
unknown
https://account.live.com/msangcwam
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.ver)
unknown
http://passport.net/tb
unknown
http://185.241.61.210/849647684a13b905.phption:
unknown
http://185.241.61.210/849647684a13b905.phpb
unknown
https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.241.61.210/849647684a13b905.phpW
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsds
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
http://185.241.61.210/849647684a13b905.php;
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://185.241.61.210/aC
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdse=
unknown
https://login.ecur
unknown
https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf:CLSID
unknown
https://login.microsoftonline.com/ppsecure/deviceremovecredential.srf
unknown
https://sirault.be/chrome_93.exep
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://login.microsoftonline.com/ppsecure/DeviceQuery.srf
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://schemas.xmlsoap.org/
unknown
https://login.microsoftonline.com/MSARST2.srf
unknown
http://Passport.NET/STS
unknown
https://login.microsoftonline.com/ppsecure/DeviceQuery.srf-
unknown
https://login.microsoftonline.com/ppsecure/DeviceUpdate.srf%
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.w3.o
unknown
https://sirault.be/chrome_93.exe
185.98.131.200
http://Passport.NET/tb
unknown
http://ocsp.digiA
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://Passport.NET/STS09/xmldsig#ripledes-cbcices/SOAPFaultcurity-utility-1.0.xsd
unknown
https://login.microsoftonline.com/ppsecure/devicechangecredential.srfMM
unknown
http://dhttp://Passport.NET/STS09/xmldsig#ripledes-cbcices/SOAPFaultcurity-utility-1.0.xsd
unknown
https://signup.live.com/signup.aspx
unknown
http://www.sqlite.org/copyright.html.
unknown
http://schemas.xmlsoap.org/ws/2004/09/policy600
unknown
https://account.live.com/inlinesignup.aspx?iww=1&id=80601
unknown
http://185.241.61.210:
unknown
https://account.live.com/inlinesignup.aspx?iww=1&id=80600
unknown
https://account.live.com/inlinesignup.aspx?iww=1&id=80603
unknown
https://sirault.be/chrome_93.exebytes=0-2097151
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/09/policy
unknown
https://sirault.be/bH
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://schemas.xmlsoap.org/ws/2004/09/policy2
unknown
https://account.live.com/inlinesignup.aspx?iww=1&id=80605
unknown
https://account.live.com/inlinesignup.aspx?iww=1&id=80604
unknown
https://login.microsoftonline.com/ppsecure/deviceaddmsacredential.srf
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://login.microsoftonline.com/ppsecure/DeviceAssociate.srf
unknown
https://account.live.com/Wizard/Password/Change?id=80601
unknown
https://account.live.com/inlinesignup.aspx?iww=1&id=80601
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://account.live.com/inlinesignup.aspx?iww=1&id=80600
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sirault.be
185.98.131.200

IPs

IP
Domain
Country
Malicious
185.241.61.210
unknown
unknown
malicious
185.98.131.200
sirault.be
France
52.168.117.173
unknown
United States
20.190.160.20
unknown
United States
40.126.32.136
unknown
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
DontOfferThroughWUAU
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\3872
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\3872
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\3872
CreationTime
\REGISTRY\A\{961a034d-9a73-c7e0-2321-0d5d970303e8}\Root\InventoryApplicationFile\3wffcqln3q.exe|3b1cc366617221d0
ProgramId
\REGISTRY\A\{961a034d-9a73-c7e0-2321-0d5d970303e8}\Root\InventoryApplicationFile\3wffcqln3q.exe|3b1cc366617221d0
FileId
\REGISTRY\A\{961a034d-9a73-c7e0-2321-0d5d970303e8}\Root\InventoryApplicationFile\3wffcqln3q.exe|3b1cc366617221d0
LowerCaseLongPath
\REGISTRY\A\{961a034d-9a73-c7e0-2321-0d5d970303e8}\Root\InventoryApplicationFile\3wffcqln3q.exe|3b1cc366617221d0
LongPathHash
\REGISTRY\A\{961a034d-9a73-c7e0-2321-0d5d970303e8}\Root\InventoryApplicationFile\3wffcqln3q.exe|3b1cc366617221d0
Name
\REGISTRY\A\{961a034d-9a73-c7e0-2321-0d5d970303e8}\Root\InventoryApplicationFile\3wffcqln3q.exe|3b1cc366617221d0
OriginalFileName
\REGISTRY\A\{961a034d-9a73-c7e0-2321-0d5d970303e8}\Root\InventoryApplicationFile\3wffcqln3q.exe|3b1cc366617221d0
Publisher
\REGISTRY\A\{961a034d-9a73-c7e0-2321-0d5d970303e8}\Root\InventoryApplicationFile\3wffcqln3q.exe|3b1cc366617221d0
Version
\REGISTRY\A\{961a034d-9a73-c7e0-2321-0d5d970303e8}\Root\InventoryApplicationFile\3wffcqln3q.exe|3b1cc366617221d0
BinFileVersion
\REGISTRY\A\{961a034d-9a73-c7e0-2321-0d5d970303e8}\Root\InventoryApplicationFile\3wffcqln3q.exe|3b1cc366617221d0
BinaryType
\REGISTRY\A\{961a034d-9a73-c7e0-2321-0d5d970303e8}\Root\InventoryApplicationFile\3wffcqln3q.exe|3b1cc366617221d0
ProductName
\REGISTRY\A\{961a034d-9a73-c7e0-2321-0d5d970303e8}\Root\InventoryApplicationFile\3wffcqln3q.exe|3b1cc366617221d0
ProductVersion
\REGISTRY\A\{961a034d-9a73-c7e0-2321-0d5d970303e8}\Root\InventoryApplicationFile\3wffcqln3q.exe|3b1cc366617221d0
LinkDate
\REGISTRY\A\{961a034d-9a73-c7e0-2321-0d5d970303e8}\Root\InventoryApplicationFile\3wffcqln3q.exe|3b1cc366617221d0
BinProductVersion
\REGISTRY\A\{961a034d-9a73-c7e0-2321-0d5d970303e8}\Root\InventoryApplicationFile\3wffcqln3q.exe|3b1cc366617221d0
AppxPackageFullName
\REGISTRY\A\{961a034d-9a73-c7e0-2321-0d5d970303e8}\Root\InventoryApplicationFile\3wffcqln3q.exe|3b1cc366617221d0
AppxPackageRelativeId
\REGISTRY\A\{961a034d-9a73-c7e0-2321-0d5d970303e8}\Root\InventoryApplicationFile\3wffcqln3q.exe|3b1cc366617221d0
Size
\REGISTRY\A\{961a034d-9a73-c7e0-2321-0d5d970303e8}\Root\InventoryApplicationFile\3wffcqln3q.exe|3b1cc366617221d0
Language
\REGISTRY\A\{961a034d-9a73-c7e0-2321-0d5d970303e8}\Root\InventoryApplicationFile\3wffcqln3q.exe|3b1cc366617221d0
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\2C85006A1A028BCC349DF23C474724C055FDE8B6
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\B68D8F953E551914324E557E6164D68B9926650C
Blob
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02vnquskfpppcivc
Reason
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02rnkuqnzqhgxpmq
DeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02rnkuqnzqhgxpmq
Provision Friday, October 25, 2024 07:12:42
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02rnkuqnzqhgxpmq
AppIdList
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02gfcilbgfbgtour
Request Friday, October 25, 2024 07:12:48
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02gfcilbgfbgtour
Response Friday, October 25, 2024 07:12:48
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02gfcilbgfbgtour
Reason
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02mfxulzkqjdteig
DeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02mfxulzkqjdteig
AppIdList
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02vnquskfpppcivc
AppIdList
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18
ValidDeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL
GlobalDeviceUpdateTime
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02rnkuqnzqhgxpmq
DeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18
ValidDeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
Data
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02rnkuqnzqhgxpmq
DeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02rnkuqnzqhgxpmq
DeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003
ValidDeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02gfcilbgfbgtour
AppIdList
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
Data
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02mfxulzkqjdteig
DeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003
ValidDeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
Data
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02mfxulzkqjdteig
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\ExtendedProperties
LID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
Data
There are 57 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page execute and read and write
malicious
BB0000
direct allocation
page read and write
malicious
9F5000
heap
page read and write
malicious
910000
direct allocation
page execute and read and write
malicious
E8D98FF000
stack
page read and write
20E97000
heap
page read and write
26F5F000
heap
page read and write
A70000
heap
page read and write
2CB7F7D0000
heap
page read and write
1AFEB530000
heap
page read and write
23E0B050000
heap
page read and write
1AB7E000
stack
page read and write
20EB4000
heap
page read and write
24F64800000
unkown
page read and write
1C41AADC000
heap
page read and write
1C41A333000
heap
page read and write
1978CAAE000
heap
page read and write
1C41A333000
heap
page read and write
908D95D000
stack
page read and write
24F6480E000
unkown
page read and write
1C41A333000
heap
page read and write
1C41AAB7000
heap
page read and write
1C419A78000
heap
page read and write
E8D99FF000
stack
page read and write
20EA9000
heap
page read and write
20EAA000
heap
page read and write
2D17C000
heap
page read and write
33EBC000
stack
page read and write
1C41AA84000
heap
page read and write
1ACD1000
heap
page read and write
23E0B080000
direct allocation
page read and write
1C419AF5000
heap
page read and write
45A000
unkown
page execute and read and write
2D184000
heap
page read and write
1C41A376000
heap
page read and write
1AFEB745000
heap
page read and write
23E0B080000
direct allocation
page read and write
24F647B0000
trusted library allocation
page read and write
BFE54D000
stack
page read and write
23E0B080000
direct allocation
page read and write
60FA0FD000
stack
page read and write
1C41A357000
heap
page read and write
20EB5000
heap
page read and write
1C41AA3A000
heap
page read and write
251D0D00000
heap
page read and write
1C41A38B000
heap
page read and write
1AFEB740000
heap
page read and write
1C41AA00000
heap
page read and write
20EA1000
heap
page read and write
1C41AAD9000
heap
page read and write
1C41A35A000
heap
page read and write
1C41A374000
heap
page read and write
CA0000
heap
page read and write
1C41A333000
heap
page read and write
23536940000
heap
page read and write
20EA9000
heap
page read and write
23522395000
heap
page read and write
795777F000
stack
page read and write
895C17F000
stack
page read and write
7FF675E52000
unkown
page readonly
20F94000
heap
page read and write
1ACC0000
heap
page read and write
91F46FD000
stack
page read and write
20028F50000
heap
page read and write
23522238000
heap
page read and write
1C419B13000
heap
page read and write
20279328000
heap
page read and write
1978CA20000
direct allocation
page read and write
1C419A74000
heap
page read and write
20EA6000
heap
page read and write
7FF676A6C000
unkown
page execute read
7C7000
heap
page read and write
1BCE4D60000
heap
page read and write
5904FDE000
stack
page read and write
51E000
unkown
page execute and read and write
7FF6AF641000
unkown
page execute read
1C41AC00000
heap
page read and write
1F0000
heap
page read and write
1BCE4E18000
heap
page read and write
26F68000
heap
page read and write
1C41AA60000
heap
page read and write
1C41A372000
heap
page read and write
2CB7F7F8000
heap
page read and write
20EDD000
heap
page read and write
1C41A389000
heap
page read and write
1C419B4A000
heap
page read and write
1A8FF000
stack
page read and write
51B000
unkown
page execute and read and write
1C41A335000
heap
page read and write
60FA4FF000
stack
page read and write
251D0F15000
heap
page read and write
1C41AA7D000
heap
page read and write
D9117E000
stack
page read and write
1C41AC14000
heap
page read and write
1BCE4D50000
heap
page read and write
7FF676521000
unkown
page readonly
9FD351F000
stack
page read and write
24D4F100000
heap
page read and write
1A9FE000
stack
page read and write
20E9D000
heap
page read and write
1C419A7A000
heap
page read and write
5C5000
unkown
page execute and read and write
23D00C70000
heap
page read and write
20279420000
heap
page read and write
1C41A335000
heap
page read and write
18374278000
heap
page read and write
1C41A333000
heap
page read and write
20EBD000
heap
page read and write
1BCE5110000
heap
page read and write
1C41AA7A000
heap
page read and write
20E9B000
heap
page read and write
485000
unkown
page execute and read and write
1978CA20000
direct allocation
page read and write
20279315000
heap
page read and write
23D00B70000
heap
page read and write
1C4199A0000
heap
page read and write
438000
unkown
page readonly
24F64B02000
heap
page read and write
1C41A335000
heap
page read and write
6BE258D000
stack
page read and write
23522200000
heap
page read and write
908E0F9000
stack
page read and write
CAC000
heap
page read and write
1978CA20000
direct allocation
page read and write
1C419A8D000
heap
page read and write
24F64915000
trusted library allocation
page read and write
23E0B080000
direct allocation
page read and write
1C41A333000
heap
page read and write
1978CA20000
direct allocation
page read and write
1AFEB428000
heap
page read and write
20E90000
heap
page read and write
6BE28FF000
stack
page read and write
1C41A329000
heap
page read and write
20F32000
heap
page read and write
1C41A215000
heap
page read and write
25D4F075000
heap
page read and write
20E9D000
heap
page read and write
25D4EEA0000
heap
page read and write
20F33000
heap
page read and write
1C41A334000
heap
page read and write
1C41A381000
heap
page read and write
20EA9000
heap
page read and write
61EB4000
direct allocation
page read and write
1C41A202000
heap
page read and write
1C41A35F000
heap
page read and write
1C419B18000
heap
page read and write
AA5000
heap
page read and write
9DFF8FF000
stack
page read and write
2D120000
heap
page read and write
20EBD000
heap
page read and write
91F35F9000
stack
page read and write
1C41A332000
heap
page read and write
20EB5000
heap
page read and write
1978CD10000
heap
page read and write
7FF67651E000
unkown
page readonly
7FF6B0567000
unkown
page readonly
1C41A335000
heap
page read and write
20EB7000
heap
page read and write
1C419A2B000
heap
page read and write
194921E9000
heap
page read and write
20EB7000
heap
page read and write
E8D95DC000
stack
page read and write
4B1000
unkown
page execute and read and write
7C5000
heap
page read and write
1C41AC04000
heap
page read and write
20DF1000
heap
page read and write
25D4EE60000
heap
page read and write
91F40FE000
stack
page read and write
239D0D58000
heap
page read and write
23D00A58000
heap
page read and write
23534F47000
heap
page read and write
1C4199C0000
heap
page read and write
23E0B080000
direct allocation
page read and write
1C41AAA9000
heap
page read and write
26FC1000
heap
page read and write
7FF6AF652000
unkown
page readonly
23D00B50000
heap
page read and write
1ADD8000
heap
page read and write
20EC4000
heap
page read and write
1C41A335000
heap
page read and write
1C41AC14000
heap
page read and write
1C41AAFC000
heap
page read and write
20EC5000
heap
page read and write
1C419B3B000
heap
page read and write
20EB7000
heap
page read and write
6C670000
unkown
page readonly
25DE000
stack
page read and write
23E0B080000
direct allocation
page read and write
239D0FA5000
heap
page read and write
2D18E000
heap
page read and write
2D100000
remote allocation
page read and write
1C41A372000
heap
page read and write
1C41AC14000
heap
page read and write
1C41A332000
heap
page read and write
1C41A378000
heap
page read and write
24F64802000
unkown
page read and write
26AB0FE000
stack
page read and write
78E000
stack
page read and write
24F646B0000
heap
page read and write
A5E000
heap
page read and write
20EA7000
heap
page read and write
6C6ED000
unkown
page readonly
C8E000
stack
page read and write
1C41A332000
heap
page read and write
2CB7F7F0000
heap
page read and write
1C41A385000
heap
page read and write
D9107F000
stack
page read and write
20ED3000
heap
page read and write
1978C9F0000
heap
page read and write
20EB3000
heap
page read and write
26FE1000
heap
page read and write
24F64A13000
heap
page read and write
1C41A37F000
heap
page read and write
4EF000
unkown
page execute and read and write
DB630FE000
unkown
page readonly
20EA9000
heap
page read and write
23E0B0A0000
unkown
page read and write
1C41AC14000
heap
page read and write
1C41AAB5000
heap
page read and write
194921C5000
heap
page read and write
1C41A38B000
heap
page read and write
20EBC000
heap
page read and write
1C41AC04000
heap
page read and write
1C41A352000
heap
page read and write
1C419B1D000
heap
page read and write
1C41A32C000
heap
page read and write
6BE287F000
stack
page read and write
20EBD000
heap
page read and write
18374440000
heap
page read and write
7FF676523000
unkown
page read and write
1AB3D000
stack
page read and write
61ED4000
direct allocation
page readonly
20EB7000
heap
page read and write
1AA3E000
stack
page read and write
C4E000
stack
page read and write
1C41AC14000
heap
page read and write
1ACD0000
heap
page read and write
1C419B18000
heap
page read and write
20F42000
heap
page read and write
2D100000
remote allocation
page read and write
26F63000
heap
page read and write
7FF6B026C000
unkown
page execute read
1C419B02000
heap
page read and write
20EB5000
heap
page read and write
24D4F1B0000
heap
page read and write
1C41AAA9000
heap
page read and write
488000
unkown
page execute and read and write
61ED0000
direct allocation
page read and write
24F64A00000
heap
page read and write
9B000
stack
page read and write
1C41AA7C000
heap
page read and write
1C41A35B000
heap
page read and write
1C419AB1000
heap
page read and write
1C41A331000
heap
page read and write
DB62D4D000
stack
page read and write
1C41A333000
heap
page read and write
24F64B00000
heap
page read and write
251D0C08000
heap
page read and write
24F64871000
heap
page read and write
23E0B030000
heap
page read and write
1C41A310000
heap
page read and write
1C41A378000
heap
page read and write
91F39FE000
unkown
page readonly
908DD7B000
stack
page read and write
1C41AC14000
heap
page read and write
1AC7D000
stack
page read and write
1C41AA5E000
heap
page read and write
64A000
unkown
page execute and read and write
9A0000
heap
page read and write
A63000
heap
page read and write
20EB3000
heap
page read and write
251D0DE0000
heap
page read and write
235221E0000
heap
page read and write
23E0B330000
heap
page read and write
1C419B4A000
heap
page read and write
26F4C000
heap
page read and write
1C419A6B000
heap
page read and write
2CB7F7C0000
heap
page read and write
20EB0000
heap
page read and write
1BCE4D80000
heap
page read and write
7FF6AF655000
unkown
page write copy
33BBA000
heap
page read and write
1C41A335000
heap
page read and write
20EB7000
heap
page read and write
1C419A92000
heap
page read and write
26AAFFF000
stack
page read and write
20EBD000
heap
page read and write
1C41A382000
heap
page read and write
1978CA20000
direct allocation
page read and write
7FF676526000
unkown
page execute and read and write
1C41AA7E000
heap
page read and write
1C41A335000
heap
page read and write
1ADD0000
trusted library allocation
page read and write
20029300000
heap
page read and write
1C41A35B000
heap
page read and write
7FF675E55000
unkown
page write copy
1C419A22000
heap
page read and write
20EAE000
heap
page read and write
1C419A76000
heap
page read and write
1C41A35A000
heap
page read and write
91F38F8000
stack
page read and write
23522100000
heap
page read and write
97FCA7D000
stack
page read and write
20EAA000
heap
page read and write
1C41AC02000
heap
page read and write
1C41A200000
heap
page read and write
1C41AACB000
heap
page read and write
20ED2000
heap
page read and write
91F3FFE000
unkown
page readonly
20EB5000
heap
page read and write
1C41A352000
heap
page read and write
1C419A84000
heap
page read and write
23534F35000
heap
page read and write
1C41A389000
heap
page read and write
7FF675E41000
unkown
page execute read
1C41A330000
heap
page read and write
2D100000
remote allocation
page read and write
2D0E0000
trusted library allocation
page read and write
1C419B4A000
heap
page read and write
24F64924000
heap
page read and write
24F64B13000
heap
page read and write
1C41A383000
heap
page read and write
20EAF000
heap
page read and write
1C41A30E000
heap
page read and write
34650000
heap
page read and write
1C41A355000
heap
page read and write
7FF676523000
unkown
page write copy
7C0000
heap
page read and write
6C671000
unkown
page execute read
F0F72FE000
stack
page read and write
1C41AA54000
heap
page read and write
1C41A333000
heap
page read and write
1C41A337000
heap
page read and write
6C8F5000
unkown
page readonly
1C41AAA5000
heap
page read and write
20EB7000
heap
page read and write
1C41AAEF000
heap
page read and write
1C41A335000
heap
page read and write
1C41A340000
heap
page read and write
A45000
heap
page read and write
1C41A355000
heap
page read and write
1C41AAD9000
heap
page read and write
7FF6AFD26000
unkown
page execute and read and write
20EA1000
heap
page read and write
24F64900000
trusted library allocation
page read and write
1C419A9E000
heap
page read and write
1C41AA92000
heap
page read and write
1C41AA3B000
heap
page read and write
7FF676D67000
unkown
page readonly
1C41A378000
heap
page read and write
D90D4C000
stack
page read and write
7FF6AF641000
unkown
page execute read
20EB7000
heap
page read and write
251D0C00000
heap
page read and write
23D00970000
heap
page read and write
2620000
heap
page read and write
1C41AAB5000
heap
page read and write
20029305000
heap
page read and write
2CFDE000
stack
page read and write
1C41A30E000
heap
page read and write
1C419B39000
heap
page read and write
20EB7000
heap
page read and write
198000
stack
page read and write
20EB5000
heap
page read and write
1978CA20000
direct allocation
page read and write
4BD000
unkown
page execute and read and write
1C41A333000
heap
page read and write
7FF6767F7000
unkown
page execute and read and write
24F6482B000
heap
page read and write
908DEFF000
stack
page read and write
1C41A333000
heap
page read and write
1C419A84000
heap
page read and write
20EA1000
heap
page read and write
251D0E00000
heap
page read and write
24F64838000
heap
page read and write
239D0FA0000
heap
page read and write
20EAA000
heap
page read and write
6C8EF000
unkown
page write copy
1C41AA70000
heap
page read and write
DB6317E000
stack
page read and write
91F3CFE000
stack
page read and write
20029038000
heap
page read and write
26AABFD000
stack
page read and write
1C419A7A000
heap
page read and write
26F20000
heap
page read and write
DB6307E000
stack
page read and write
23E0B080000
direct allocation
page read and write
254F000
stack
page read and write
20EB7000
heap
page read and write
1978CA20000
direct allocation
page read and write
9B0000
heap
page read and write
1C41AA7D000
heap
page read and write
895C07D000
stack
page read and write
E791AFE000
stack
page read and write
23E0AF50000
heap
page read and write
24F64811000
unkown
page read and write
20EA9000
heap
page read and write
9BE000
heap
page read and write
1C41A313000
heap
page read and write
1C41AACB000
heap
page read and write
193000
stack
page read and write
20EAD000
heap
page read and write
1C41AAD2000
heap
page read and write
20EA9000
heap
page read and write
239D0D50000
heap
page read and write
6C6FE000
unkown
page read and write
1C41AAE7000
heap
page read and write
1C41A354000
heap
page read and write
1C41A36B000
heap
page read and write
91F42FB000
stack
page read and write
1978CA9C000
heap
page read and write
24D4F120000
heap
page read and write
BFE87F000
stack
page read and write
1C419B39000
heap
page read and write
1C419AB8000
heap
page read and write
1C41A335000
heap
page read and write
97FCB7F000
stack
page read and write
23E0CE20000
unkown
page read and write
1978CA20000
direct allocation
page read and write
61EB7000
direct allocation
page readonly
251D0F10000
heap
page read and write
1C41A330000
heap
page read and write
24F64813000
unkown
page read and write
1C41A383000
heap
page read and write
19492110000
heap
page read and write
1C41AAC3000
heap
page read and write
5A5000
unkown
page execute and read and write
1C41A333000
heap
page read and write
20028F70000
heap
page read and write
50F000
unkown
page execute and read and write
400000
unkown
page readonly
23E0B080000
direct allocation
page read and write
23522390000
heap
page read and write
1C41A35A000
heap
page read and write
24D4F020000
heap
page read and write
19492030000
heap
page read and write
25D4ED60000
heap
page read and write
20EB7000
heap
page read and write
1C41A335000
heap
page read and write
20E9B000
heap
page read and write
24F646D0000
heap
page read and write
401000
unkown
page execute read
1C41AC04000
heap
page read and write
1C41A37A000
heap
page read and write
7FF675E52000
unkown
page readonly
E7916FD000
stack
page read and write
1978CA20000
direct allocation
page read and write
20EBD000
heap
page read and write
20EBD000
heap
page read and write
1C419A84000
heap
page read and write
26F41000
heap
page read and write
1C41AB02000
heap
page read and write
23E0B0E1000
heap
page read and write
7FF6AFD25000
unkown
page readonly
1C41AACE000
heap
page read and write
1C419ACC000
heap
page read and write
91F43FE000
unkown
page readonly
1C41A1C0000
remote allocation
page read and write
1C41A32C000
heap
page read and write
1C41A367000
heap
page read and write
1978CD15000
heap
page read and write
23534F30000
heap
page read and write
7FF6B0567000
unkown
page readonly
1C41AA95000
heap
page read and write
7FF6768A6000
unkown
page execute and read and write
1C41A380000
heap
page read and write
91F3BFE000
unkown
page readonly
20EBD000
heap
page read and write
1C41A329000
heap
page read and write
25D4F070000
heap
page read and write
239D0C60000
heap
page read and write
2D186000
heap
page read and write
9DFF97F000
stack
page read and write
1C41A335000
heap
page read and write
91F36FE000
unkown
page readonly
1C41A329000
heap
page read and write
65C000
unkown
page execute and read and write
1C419A86000
heap
page read and write
20EB7000
heap
page read and write
7C7000
heap
page read and write
1978CA90000
heap
page read and write
1C41AAE0000
heap
page read and write
20EB7000
heap
page read and write
1C419ABF000
heap
page read and write
20EC5000
heap
page read and write
2CB7F7C5000
heap
page read and write
79577FF000
stack
page read and write
E7917FF000
stack
page read and write
1A6FF000
stack
page read and write
59052FF000
stack
page read and write
1C41AA58000
heap
page read and write
1C41A379000
heap
page read and write
1978D3F0000
direct allocation
page read and write
1C419B18000
heap
page read and write
26AAEFF000
stack
page read and write
194921C0000
heap
page read and write
33FBC000
stack
page read and write
1C41A333000
heap
page read and write
60FA10E000
stack
page read and write
20EC5000
heap
page read and write
1C41AA83000
heap
page read and write
24F64B00000
heap
page read and write
202792E0000
heap
page read and write
6C711000
unkown
page execute read
1C41A32E000
heap
page read and write
33BB0000
heap
page read and write
34146000
heap
page read and write
239D0E50000
heap
page read and write
26F51000
heap
page read and write
90E000
stack
page read and write
60FA5FF000
stack
page read and write
1978CAA3000
heap
page read and write
7FF6AFD1E000
unkown
page readonly
1C41AAFD000
heap
page read and write
19492130000
heap
page read and write
20D4E000
heap
page read and write
5904EDC000
stack
page read and write
48F000
unkown
page execute and read and write
40E000
unkown
page execute read
7FF676521000
unkown
page readonly
1C419B19000
heap
page read and write
20EB5000
heap
page read and write
6C710000
unkown
page readonly
20E9A000
heap
page read and write
A2A000
heap
page read and write
24F64B13000
heap
page read and write
23E0B080000
direct allocation
page read and write
1C419A13000
heap
page read and write
1C419A85000
heap
page read and write
20EDD000
heap
page read and write
1C41A33B000
heap
page read and write
7FF6AFD21000
unkown
page readonly
51B000
unkown
page readonly
1C41A381000
heap
page read and write
1C41A333000
heap
page read and write
23534F40000
heap
page read and write
23E0D642000
unkown
page read and write
1C41A37B000
heap
page read and write
1C41AAD0000
heap
page read and write
1C41A374000
heap
page read and write
1C419B39000
heap
page read and write
239D0E70000
heap
page read and write
1978CA20000
direct allocation
page read and write
1A7FF000
stack
page read and write
1C41A35A000
heap
page read and write
194921E0000
heap
page read and write
7FF675E41000
unkown
page execute read
24D4F370000
heap
page read and write
2D18A000
heap
page read and write
1C41A383000
heap
page read and write
BAF000
stack
page read and write
1C41AA54000
heap
page read and write
258E000
stack
page read and write
1C41A381000
heap
page read and write
BFE97E000
stack
page read and write
1C41AAE0000
heap
page read and write
1C41A35A000
heap
page read and write
1C419A83000
heap
page read and write
1C41A332000
heap
page read and write
1C41A335000
heap
page read and write
20EB7000
heap
page read and write
1C41A32E000
heap
page read and write
24F64B02000
heap
page read and write
79576FD000
stack
page read and write
1C41A330000
heap
page read and write
7FF6AFD21000
unkown
page readonly
1C41A335000
heap
page read and write
8CF000
stack
page read and write
20279200000
heap
page read and write
2D16E000
stack
page read and write
1BCE5115000
heap
page read and write
1C41AAC7000
heap
page read and write
20ED3000
heap
page read and write
1C419B4A000
heap
page read and write
6C8F0000
unkown
page read and write
1C41A130000
trusted library allocation
page read and write
1C41A333000
heap
page read and write
1C41A32C000
heap
page read and write
2CB7F6E0000
heap
page read and write
183744F5000
heap
page read and write
A75000
heap
page read and write
9FD349D000
stack
page read and write
1C41A333000
heap
page read and write
23E0B080000
direct allocation
page read and write
23E0B335000
heap
page read and write
91F3EFB000
stack
page read and write
61ECC000
direct allocation
page read and write
1C419AEB000
heap
page read and write
20EB7000
heap
page read and write
C0E000
stack
page read and write
1C41AA57000
heap
page read and write
1C419A94000
heap
page read and write
7FF675E40000
unkown
page readonly
25D4EEA8000
heap
page read and write
7FF6AF652000
unkown
page readonly
1C41A353000
heap
page read and write
183744F0000
heap
page read and write
1AFEB420000
heap
page read and write
1C419A00000
heap
page read and write
24D4F1B7000
heap
page read and write
1C419A45000
heap
page read and write
91F37FE000
unkown
page readonly
1C41AA51000
heap
page read and write
F0F6FAE000
stack
page read and write
23E0B080000
direct allocation
page read and write
1C419A7A000
heap
page read and write
7FF6B026C000
unkown
page execute read
1C41A1C0000
remote allocation
page read and write
1C41A330000
heap
page read and write
7FF676858000
unkown
page execute and read and write
A69000
heap
page read and write
20EB5000
heap
page read and write
23E0CE20000
direct allocation
page read and write
25D4EE40000
heap
page read and write
1C419B16000
heap
page read and write
1978C9D0000
heap
page read and write
1C41AAC0000
heap
page read and write
1C41A381000
heap
page read and write
1C41A327000
heap
page read and write
1C41A300000
heap
page read and write
26FAB000
heap
page read and write
20EC4000
heap
page read and write
1C41AC04000
heap
page read and write
AA3000
heap
page read and write
1978C8F0000
heap
page read and write
1C41A1C0000
remote allocation
page read and write
1C41AA9B000
heap
page read and write
23E0B080000
direct allocation
page read and write
1C41AAE2000
heap
page read and write
1C41A352000
heap
page read and write
20EAE000
heap
page read and write
1C419B4A000
heap
page read and write
20279320000
heap
page read and write
1C41AC04000
heap
page read and write
7FF67651E000
unkown
page readonly
7FF675E55000
unkown
page read and write
9CB000
heap
page execute and read and write
1C41AA15000
heap
page read and write
1C41A35A000
heap
page read and write
20EB7000
heap
page read and write
CA3000
heap
page read and write
61E01000
direct allocation
page execute read
1C419B27000
heap
page read and write
7FF6B00A0000
unkown
page execute and read and write
23E0B080000
direct allocation
page read and write
20EB3000
heap
page read and write
BB0000
heap
page read and write
6C8AF000
unkown
page readonly
1C419A80000
heap
page read and write
1C4199D0000
heap
page read and write
1C41A35D000
heap
page read and write
26F00000
heap
page read and write
1C41A335000
heap
page read and write
1C41A335000
heap
page read and write
1978CA20000
direct allocation
page read and write
23E0B0DC000
heap
page read and write
1C41A335000
heap
page read and write
1C41A38A000
heap
page read and write
7FF675E40000
unkown
page readonly
1AFEB610000
heap
page read and write
20ED3000
heap
page read and write
26F4E000
heap
page read and write
1C419B4A000
heap
page read and write
7FF6AFD23000
unkown
page read and write
7FF6B00A6000
unkown
page execute and read and write
4E2000
unkown
page execute and read and write
1C41A329000
heap
page read and write
1C41A335000
heap
page read and write
20EB7000
heap
page read and write
1C419B39000
heap
page read and write
7FF6B0058000
unkown
page execute and read and write
7FF6AF640000
unkown
page readonly
492000
unkown
page execute and read and write
61ED3000
direct allocation
page read and write
18374250000
heap
page read and write
20EB7000
heap
page read and write
20E9B000
heap
page read and write
1C419AAB000
heap
page read and write
1C419B18000
heap
page read and write
23E0B0D0000
heap
page read and write
1C41AC04000
heap
page read and write
1ACD1000
heap
page read and write
6C702000
unkown
page readonly
1C41A335000
heap
page read and write
1C41A363000
heap
page read and write
F0F6EAD000
stack
page read and write
1C41AACF000
heap
page read and write
91F47FE000
unkown
page readonly
1C41AAC7000
heap
page read and write
18374270000
heap
page read and write
A58000
heap
page read and write
20279310000
heap
page read and write
23534EC0000
heap
page read and write
23D00A50000
heap
page read and write
23534DC0000
heap
page read and write
7FF6AFD25000
unkown
page readonly
7FF6AF655000
unkown
page read and write
1C41A355000
heap
page read and write
9FD359F000
stack
page read and write
20EA1000
heap
page read and write
1C41A335000
heap
page read and write
23534EA0000
heap
page read and write
1C419A5F000
heap
page read and write
20EB5000
heap
page read and write
20EA7000
heap
page read and write
23E0B0B0000
unkown
page read and write
20E92000
heap
page read and write
1C41AA3E000
heap
page read and write
895C27E000
stack
page read and write
61ECD000
direct allocation
page readonly
1BCE4E10000
heap
page read and write
7FF676525000
unkown
page readonly
20EDD000
heap
page read and write
18374460000
heap
page read and write
24F64902000
trusted library allocation
page read and write
1C41AABC000
heap
page read and write
7FF6768A0000
unkown
page execute and read and write
60FA6FF000
stack
page read and write
9DFF87D000
stack
page read and write
C899FBC000
stack
page read and write
24D4F375000
heap
page read and write
91F3AFB000
stack
page read and write
20EDD000
heap
page read and write
5CB000
unkown
page execute and read and write
1978CA20000
direct allocation
page read and write
20EB0000
heap
page read and write
6C8EE000
unkown
page read and write
7FF676525000
unkown
page readonly
7FF6AFFF7000
unkown
page execute and read and write
1C41A1C0000
remote allocation
page read and write
9BA000
heap
page read and write
20EB5000
heap
page read and write
740000
heap
page read and write
1C41A35B000
heap
page read and write
91F3DFE000
unkown
page readonly
1C41A333000
heap
page read and write
1C41A330000
heap
page read and write
20ED2000
heap
page read and write
2D0DF000
stack
page read and write
1C41A310000
heap
page read and write
23522230000
heap
page read and write
1C41AC14000
heap
page read and write
23D00C75000
heap
page read and write
33B9F000
stack
page read and write
1C41A329000
heap
page read and write
20ED3000
heap
page read and write
1C41AC04000
heap
page read and write
97FCC7F000
stack
page read and write
1AFEB630000
heap
page read and write
1C41A32E000
heap
page read and write
2CB7F8F0000
heap
page read and write
1C41A387000
heap
page read and write
1C419A75000
heap
page read and write
20EB7000
heap
page read and write
1C41A382000
heap
page read and write
24F64A02000
heap
page read and write
91F41FE000
unkown
page readonly
91F377E000
stack
page read and write
1C41AAAD000
heap
page read and write
1C41AAB8000
heap
page read and write
908DFFE000
stack
page read and write
7FF6AFD1E000
unkown
page readonly
1C41A376000
heap
page read and write
1C419B39000
heap
page read and write
7FF676D67000
unkown
page readonly
C89A2FE000
stack
page read and write
1C41A8B0000
remote allocation
page read and write
7FF676A6C000
unkown
page execute read
91F327B000
stack
page read and write
61E00000
direct allocation
page execute and read and write
C89A27E000
stack
page read and write
1C41A380000
heap
page read and write
26F57000
heap
page read and write
20EB1000
heap
page read and write
7FF6AFD23000
unkown
page write copy
20028E70000
heap
page read and write
1C41AACB000
heap
page read and write
7FF6AF640000
unkown
page readonly
20EB5000
heap
page read and write
1C41A332000
heap
page read and write
20EB7000
heap
page read and write
20EC5000
heap
page read and write
43B000
unkown
page write copy
20029030000
heap
page read and write
There are 774 hidden memdumps, click here to show them.