IOC Report
http://www.free-pdf-creator.com

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Desktop\Free PDF Creator.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:37:50 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C5C8CC0A7FE31816B4641D0465402560
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5C8CC0A7FE31816B4641D0465402560
data
dropped
C:\Users\user\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML
exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak
exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNSD.XML
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\PDFConverter\FreePDFInstallerVideo.wmv
Microsoft ASF
dropped
C:\Users\user\AppData\Local\Temp\.net\free-pdf-creator\e90\D3DCompiler_47_cor3.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\free-pdf-creator\e90\PenImc_cor3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\free-pdf-creator\e90\PresentationNative_cor3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\free-pdf-creator\e90\vcruntime140_cor3.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\free-pdf-creator\e90\wpfgfx_cor3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Free PDF Creator.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:38:17 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:37:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Free PDF Creator.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:38:17 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:37:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:37:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:37:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:37:36 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\Downloads\1f4527b0-ea2c-485b-a693-22c42c540383.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\Downloads\3a415442-9784-4925-b93b-3fc629b16ecb.tmp
HTML document, ASCII text, with very long lines (1107), with no line terminators
dropped
C:\Users\user\Downloads\Unconfirmed 395789.crdownload
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\Downloads\download (1).htm (copy)
HTML document, ASCII text, with very long lines (1107), with no line terminators
dropped
C:\Users\user\Downloads\download (1).htm.crdownload (copy)
HTML document, ASCII text, with very long lines (1107), with no line terminators
dropped
C:\Users\user\Downloads\download.htm (copy)
HTML document, ASCII text, with very long lines (1107), with no line terminators
dropped
C:\Users\user\Downloads\download.htm.crdownload (copy)
HTML document, ASCII text, with very long lines (1107), with no line terminators
dropped
C:\Users\user\Downloads\f31152c9-f4dc-4293-a2e0-88b4317cc86f.tmp
HTML document, ASCII text, with very long lines (1107), with no line terminators
dropped
C:\Users\user\Downloads\free-pdf-creator.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
Chrome Cache Entry: 123
Web Open Font Format (Version 2), TrueType, length 15860, version 1.0
downloaded
Chrome Cache Entry: 124
ASCII text, with very long lines (10943), with no line terminators
downloaded
Chrome Cache Entry: 125
PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 126
Web Open Font Format (Version 2), TrueType, length 15920, version 1.0
downloaded
Chrome Cache Entry: 127
ASCII text, with very long lines (65350)
downloaded
Chrome Cache Entry: 128
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 129
ASCII text
downloaded
Chrome Cache Entry: 130
ASCII text, with very long lines (55375)
downloaded
Chrome Cache Entry: 131
Unicode text, UTF-8 text, with very long lines (560)
downloaded
Chrome Cache Entry: 132
Web Open Font Format (Version 2), TrueType, length 14712, version 1.0
downloaded
Chrome Cache Entry: 133
Web Open Font Format (Version 2), TrueType, length 15744, version 1.0
downloaded
Chrome Cache Entry: 134
ASCII text, with very long lines (1342), with no line terminators
downloaded
Chrome Cache Entry: 135
Web Open Font Format (Version 2), TrueType, length 14892, version 1.0
downloaded
Chrome Cache Entry: 136
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1900x1268, components 3
downloaded
Chrome Cache Entry: 137
MS Windows icon resource - 1 icon, -66x256, 32 bits/pixel
downloaded
Chrome Cache Entry: 138
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 139
Web Open Font Format (Version 2), TrueType, length 14780, version 1.0
downloaded
Chrome Cache Entry: 140
MS Windows icon resource - 1 icon, -66x256, 32 bits/pixel
dropped
Chrome Cache Entry: 141
ASCII text
downloaded
Chrome Cache Entry: 142
Web Open Font Format (Version 2), TrueType, length 30064, version 1.0
downloaded
Chrome Cache Entry: 143
Web Open Font Format (Version 2), TrueType, length 14160, version 1.0
downloaded
Chrome Cache Entry: 144
JSON data
downloaded
Chrome Cache Entry: 145
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1900x1268, components 3
dropped
Chrome Cache Entry: 146
ASCII text, with very long lines (5857), with no line terminators
downloaded
Chrome Cache Entry: 147
HTML document, ASCII text
downloaded
Chrome Cache Entry: 148
ASCII text
downloaded
Chrome Cache Entry: 149
ASCII text, with very long lines (7934)
downloaded
Chrome Cache Entry: 150
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 151
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1900x1268, components 3
dropped
Chrome Cache Entry: 152
ASCII text
downloaded
Chrome Cache Entry: 153
Unicode text, UTF-8 text, with very long lines (59668)
downloaded
Chrome Cache Entry: 154
JSON data
downloaded
Chrome Cache Entry: 155
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 156
Web Open Font Format (Version 2), TrueType, length 14200, version 1.0
downloaded
Chrome Cache Entry: 157
OpenType font data
downloaded
Chrome Cache Entry: 158
PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 159
HTML document, ASCII text, with very long lines (1107), with no line terminators
downloaded
Chrome Cache Entry: 160
HTML document, ASCII text
downloaded
Chrome Cache Entry: 161
ASCII text, with very long lines (32086)
downloaded
Chrome Cache Entry: 162
ASCII text
downloaded
Chrome Cache Entry: 163
ASCII text, with very long lines (827)
downloaded
Chrome Cache Entry: 164
ASCII text, with very long lines (65299)
downloaded
Chrome Cache Entry: 165
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1900x1268, components 3
downloaded
There are 67 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://www.free-pdf-creator.com/
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1940,i,986595434633665258,420894585385562774,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5576 --field-trial-handle=1940,i,986595434633665258,420894585385562774,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
malicious
C:\Users\user\Downloads\free-pdf-creator.exe
"C:\Users\user\Downloads\free-pdf-creator.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.free-pdf-creator.com/lps/typ/?offer=false
malicious

URLs

Name
IP
Malicious
http://www.free-pdf-creator.com
malicious
http://html4/loose.dtd
unknown
https://cdn.jsdelivr.net/npm/
unknown
https://github.com/mono/linker/issues/1731
unknown
https://www.amazing-search.com/legal/contact.html
unknown
https://aka.ms/dotnet/info
unknown
https://www.free-pdf-creator.com/lps/typ/not-completed.html?screen=second
unknown
https://www.pdf.smart-websearch.com/legal/uninstallation.html
unknown
http://foo/bar/resources/images/nextwhite.pngP
unknown
https://www.free-pdf-creator.com/legal/privacy.html
unknown
http://foo/Resources/Images/ShutDownWhite.png
unknown
https://www.free-pdf-creator.com/lps/typ/
unknown
https://aka.ms/dotnet/app-launch-failed
unknown
https://api.free-pdf-creator.com/first_run.php
unknown
https://startbootstrap.com/theme/stylish-portfolio)
unknown
http://.css
unknown
https://github.com/mono/linker/issues/1895v
unknown
https://aka.ms/dotnet-core-applaunch?
unknown
https://fontawesome.com/license/free
unknown
https://github.com/dotnet/runtime
unknown
https://pdf.activegn.com/
http://foo/bar/resources/images/nextwhite.png
unknown
https://fontawesome.com
unknown
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://api.cloudconvert.com/v2/tasks/008027f8-d08d-418b-a1df-890060f3486a
unknown
https://aka.ms/dotnet-warnings/
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://defaultcontainer/PDFConfigurator;component/Resources/Images/NextWhite.pngP
unknown
https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.min.js
unknown
https://aka.ms/nativeaot-compatibility
unknown
https://github.com/dotnet/runtime/issues/71847
unknown
https://aka.ms/serializationformat-binary-obsolete
unknown
https://aka.ms/dotnet/sdk-not-found
unknown
https://aka.ms/binaryformatter
unknown
https://www.amazing-search.com/legal/license.html
unknown
https://github.com/mono/linker/pull/649
unknown
https://www.free-pdf-creator.com/lps/typ/?offer=false
https://aka.ms/dotnet-core-applaunch?Description:
unknown
http://.jpg
unknown
https://www.pdf.smart-websearch.com/legal/contact.html
unknown
http://foo/Resources/Images/NextWhite.pngP
unknown
http://foo/bar/resources/images/shutdownwhite.png
unknown
file:///C:/Users/user/Downloads/download.htm
https://www.free-pdf-creator.com/lps/typ/?offer=true
unknown
http://nsis.sourceforge.net/Docs/AppendixG.html
unknown
https://www.amazing-search.com/legal/privacy.html
unknown
https://aka.ms/dotnet/download%s%sInstall
unknown
https://github.com/dotnet/runtime/blob/bbc898f3e5678135b242faeb6eefd8b24bf04f3c/src/native/corehost/
unknown
https://github.com/dotnet/wpf
unknown
https://github.com/twbs/bootstrap/blob/main/LICENSE)
unknown
http://www.fontfont.com/https://www.fontfont.com/licensingAlternate
unknown
http://ocsp.thawte.com0
unknown
https://github.com/mono/linker/issues/1416.
unknown
https://aka.ms/dotnet-illink/com
unknown
https://pc.amazing-search.com
unknown
https://www.free-pdf-creator.com/lps/typ/?offer=falseC:
unknown
https://www.free-pdf-creator.com/lps/typ/?offer=falsePSModulePath=C:
unknown
https://getbootstrap.com/)
unknown
http://www.symauth.com/cps0(
unknown
https://aka.ms/dotnet-illink/nativehostt
unknown
https://github.com/mono/linker/issues/378
unknown
https://www.free-pdf-creator.com/lps/typ/not-completed.html?screen=first
unknown
https://www.pdf.smart-websearch.com/legal/privacy.html.
unknown
https://www.free-pdf-creator.com/lps/typ/uninstall.htmlhtml
unknown
https://marketplace.firefox.com/developers/docs/policies/agreement
unknown
https://github.com/mono/linker/issues/1981
unknown
https://netjs.org/conversion.js?p=ic_cfpp&r=
unknown
https://www.free-pdf-creator.com/lps/typ/?offer=false0
unknown
http://api.free-pdf-creator.com:443/P
unknown
http://www.symauth.com/rpa00
unknown
https://github.com/dotnet/wpf4
unknown
http://defaultcontainer/PDFConfigurator;component/Resources/Images/ShutDownWhite.pngP
unknown
https://github.com/dotnet/runtime%
unknown
https://github.com/mono/linker/issues/1906.
unknown
file:///C:/Users/user/Downloads/download%20(1).htm
https://www.free-pdf-creator.com/legal/eula.html
unknown
https://aka.ms/GlobalizationInvariantMode
unknown
https://github.com/dotnet/runtime/issues/50821
unknown
https://www.free-pdf-creator.com/
https://www.free-pdf-creator.com/legal/terms.html
unknown
https://v.compiler.pw/conversion.js?cid=
unknown
https://github.com/dotnet/runtimeVL
unknown
https://aka.ms/dotnet-illink/nativehost
unknown
https://aka.ms/dotnet/download
unknown
https://github.com/mono/linker/issues/1187
unknown
https://github.com/StartBootstrap/startbootstrap-stylish-portfolio/blob/master/LICENSE)
unknown
There are 75 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
18.158.22.207
unknown
United States
142.251.167.147
unknown
United States
192.168.2.16
unknown
unknown
34.196.146.107
unknown
United States
142.251.16.138
unknown
United States
192.168.2.5
unknown
unknown
142.251.167.94
unknown
United States
142.251.167.95
unknown
United States
104.21.20.130
unknown
United States
172.67.192.232
unknown
United States
104.21.69.128
unknown
United States
142.251.163.94
unknown
United States
172.253.62.102
unknown
United States
151.101.1.229
unknown
United States
1.1.1.1
unknown
Australia
18.159.237.166
unknown
United States
172.253.63.95
unknown
United States
172.253.63.94
unknown
United States
151.101.65.229
unknown
United States
104.18.21.226
unknown
United States
23.53.35.206
unknown
United States
52.217.133.9
unknown
United States
172.253.122.94
unknown
United States
18.165.98.53
unknown
United States
239.255.255.250
unknown
Reserved
142.251.16.95
unknown
United States
104.17.25.14
unknown
United States
142.251.163.84
unknown
United States
172.64.207.38
unknown
United States
There are 19 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\General
UniqueID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\General
ComputerName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\General
VolumeSerialNumber
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\Namespace
LocalBase
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\Namespace
DTDFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\Namespace
LocalDelta
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\Namespace
RemoteDelta
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\HTTP
ProxyStyle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\HTTP
ProxyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\HTTP
ProxyPort
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\HTTP
ProxyBypass
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\HTTP
ProxyExclude
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\RTSP
ProxyStyle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\RTSP
ProxyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\RTSP
ProxyPort
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\RTSP
ProxyBypass
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\RTSP
ProxyExclude
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Player\Tasks\NowPlaying
InitFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
MediaLibraryCreateNewDatabase
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
AutoMetadataCurrentDownloadCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
AutoMetadataCurrent500ServerErrorCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
AutoMetadataCurrent503ServerErrorCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
AutoMetadataCurrentOtherServerErrorCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
AutoMetadataCurrentNetworkErrorCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
AutoMetadataLastResetTime
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
SyncPlaylistsAdded
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
MLSChangeIndexMusic
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
MLSChangeIndexVideo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
MLSChangeIndexPhoto
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
MLSChangeIndexList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
MLSChangeIndexOther
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
MostRecentFileAddOrRemove
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\HME
LocalLibraryID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
LibraryHasBeenRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{AEB16279-B750-48F1-8586-97956060175A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
LastScreensaverSetThreadExecutionState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
LastScreensaverState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\CUAS\DefaultCompositionWindow
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\CUAS\DefaultCompositionWindow
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
MediaLibraryCreateNewDatabase
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
MLSChangeIndexList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
MLSChangeIndexList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
MLSChangeIndexList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
MLSChangeIndexList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
MLSChangeIndexList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
SyncPlaylistsAdded
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
LastScreensaverSetThreadExecutionState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
LastScreensaverState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
LastScreensaverSetThreadExecutionState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
LastScreensaverState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
LastScreensaverSetThreadExecutionState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
LastScreensaverState
There are 42 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1E773EE8000
heap
page read and write
13D804A0000
trusted library allocation
page read and write
1E7713B3000
direct allocation
page read and write
16C0002C4000
trusted library allocation
page read and write
1E765337000
heap
page read and write
1E777816000
heap
page read and write
1E777928000
heap
page read and write
1E771190000
trusted library allocation
page read and write
1E777968000
heap
page read and write
1E762A9A000
unkown
page readonly
1A6CD800000
direct allocation
page read and write
1E77796A000
heap
page read and write
1E760458000
unkown
page readonly
1E77405D000
heap
page read and write
1E770053000
trusted library allocation
page read and write
1E76E1F6000
heap
page read and write
1E777884000
heap
page read and write
9ABD27E000
stack
page read and write
9ABD87D000
stack
page read and write
1E777A6B000
heap
page read and write
1E7776CC000
heap
page read and write
1E7654FA000
heap
page read and write
1E7654C7000
heap
page read and write
1E769A65000
heap
page read and write
1E761170000
direct allocation
page read and write
9AC1DFE000
stack
page read and write
1E77129F000
heap
page read and write
1E7654B9000
heap
page read and write
1E77785A000
heap
page read and write
1A6C8FD0000
heap
page read and write
1E76BEA0000
trusted library allocation
page read and write
1E777B3F000
heap
page read and write
1E77783A000
heap
page read and write
1E76AA2E000
heap
page read and write
1E7715E5000
heap
page read and write
13D807E0000
heap
page read and write
1E77781F000
heap
page read and write
9AC05FB000
stack
page read and write
16C0002E4000
trusted library allocation
page read and write
1E777AFA000
heap
page read and write
9ABFFFB000
stack
page read and write
1E7779B5000
heap
page read and write
1E76E505000
heap
page read and write
1E7715E2000
heap
page read and write
9ABED7F000
stack
page read and write
1E777B61000
heap
page read and write
1E7654C7000
heap
page read and write
1E770040000
trusted library allocation
page read and write
9AC0EFF000
stack
page read and write
1E76A631000
trusted library allocation
page read and write
1E7712E2000
heap
page read and write
1E7654F6000
heap
page read and write
1E773EB3000
heap
page read and write
1E777B25000
heap
page read and write
2BB800298000
direct allocation
page read and write
1E7712B0000
heap
page read and write
1E7690A1000
heap
page read and write
1E771290000
trusted library allocation
page read and write
1E76FFE0000
trusted library allocation
page read and write
1E762A8F000
unkown
page readonly
1E7776CE000
heap
page read and write
1E7715DF000
heap
page read and write
1E777B52000
heap
page read and write
1E7712BD000
heap
page read and write
1E7778D0000
heap
page read and write
1E77780C000
heap
page read and write
1E77A6F2000
heap
page read and write
1E7776CE000
heap
page read and write
1E777A22000
heap
page read and write
1E765427000
heap
page read and write
1E760445000
unkown
page readonly
2BB80026C000
direct allocation
page read and write
1E777AE3000
heap
page read and write
1E76E656000
heap
page read and write
9ABF073000
stack
page read and write
1E76E0D1000
heap
page read and write
1E7749DC000
heap
page read and write
1A6C91B7000
heap
page read and write
1E777B5F000
heap
page read and write
1E773D4E000
heap
page read and write
16C000288000
trusted library allocation
page read and write
1A6CB000000
direct allocation
page read and write
1E7777D3000
heap
page read and write
1E76A620000
trusted library allocation
page read and write
2BB80028C000
direct allocation
page read and write
1A6C91F6000
heap
page read and write
1E77784D000
heap
page read and write
13D80430000
heap
page readonly
1E77784F000
heap
page read and write
1E76E401000
heap
page read and write
1E771340000
heap
page read and write
9AC197F000
stack
page read and write
1E770060000
trusted library allocation
page read and write
1E777B88000
heap
page read and write
1E76FFEF000
trusted library allocation
page read and write
1A6C91D2000
heap
page read and write
1E7711F0000
trusted library allocation
page read and write
1E777B7B000
heap
page read and write
1E76913A000
heap
page read and write
1E7777B1000
heap
page read and write
1E7776C2000
heap
page read and write
1E769A8D000
heap
page read and write
1E7711AF000
trusted library allocation
page read and write
1E774B53000
heap
page read and write
1E7776CA000
heap
page read and write
9ABFCBF000
stack
page read and write
1E7712A7000
heap
page read and write
1E777B23000
heap
page read and write
1E773EAC000
heap
page read and write
1E7654E9000
heap
page read and write
1E765403000
heap
page read and write
9AC107E000
stack
page read and write
1E7716A6000
heap
page read and write
1E770013000
trusted library allocation
page read and write
1E7654CA000
heap
page read and write
1E773D9D000
heap
page read and write
1E770080000
trusted library allocation
page read and write
1E7654A7000
heap
page read and write
1E777AE7000
heap
page read and write
1E774125000
heap
page read and write
1E7776C5000
heap
page read and write
1E773EBB000
heap
page read and write
1E7711B0000
trusted library allocation
page read and write
1E777780000
heap
page read and write
1E7713B0000
direct allocation
page read and write
1E7778C8000
heap
page read and write
1E76E6BD000
heap
page read and write
1A6CAD00000
heap
page execute and read and write
1E7778CC000
heap
page read and write
1E76E41D000
heap
page read and write
1E76A62B000
trusted library allocation
page read and write
1E7712E0000
heap
page read and write
1E7778CE000
heap
page read and write
1E777B6E000
heap
page read and write
1E777D69000
heap
page read and write
1E7653D2000
heap
page read and write
1E7749C0000
heap
page read and write
16C000230000
trusted library allocation
page read and write
1E76E6AF000
heap
page read and write
1A6C918C000
heap
page read and write
1E7712A7000
heap
page read and write
1E777A60000
heap
page read and write
1E76E64E000
heap
page read and write
1E763A56000
unkown
page read and write
1E7776C2000
heap
page read and write
1A6C923A000
heap
page read and write
1E7654E0000
heap
page read and write
1E771290000
heap
page read and write
1E76E6B1000
heap
page read and write
1E76A630000
trusted library allocation
page read and write
9ABD0FF000
stack
page read and write
1E773EE8000
heap
page read and write
1E7654CD000
heap
page read and write
1E765403000
heap
page read and write
9ABF675000
stack
page read and write
1E771330000
trusted library allocation
page read and write
1E7777F5000
heap
page read and write
1E77412F000
heap
page read and write
1E777808000
heap
page read and write
1E7777AF000
heap
page read and write
9ABCF7E000
stack
page read and write
1A6C91DB000
heap
page read and write
1E7778D2000
heap
page read and write
1E773D31000
heap
page read and write
1E769ACC000
heap
page read and write
1E777A15000
heap
page read and write
1E76A410000
heap
page read and write
9ABC7FE000
stack
page read and write
1E777B4C000
heap
page read and write
1E76534B000
heap
page read and write
1E7778C0000
heap
page read and write
1E77780E000
heap
page read and write
1E777A0A000
heap
page read and write
13D80450000
heap
page read and write
1E76546C000
heap
page read and write
1E7749D1000
heap
page read and write
1E7711A0000
trusted library allocation
page read and write
1E7778BB000
heap
page read and write
1E76E6B7000
heap
page read and write
1E771433000
direct allocation
page read and write
1A6CAC98000
unkown
page readonly
1E777B7F000
heap
page read and write
2BB80023C000
direct allocation
page read and write
1E777A5C000
heap
page read and write
1E777937000
heap
page read and write
1E777B32000
heap
page read and write
1E7779D9000
heap
page read and write
1E76E0BC000
heap
page read and write
1E773EC9000
heap
page read and write
1E77771F000
heap
page read and write
1E773DF3000
heap
page read and write
9ABC37E000
stack
page read and write
16C0002B4000
trusted library allocation
page read and write
13D804DB000
heap
page read and write
1E777879000
heap
page read and write
2BB8002BC000
direct allocation
page read and write
1E7776D1000
heap
page read and write
1E7654C8000
heap
page read and write
1A6C91C3000
heap
page read and write
9AC0BFE000
stack
page read and write
1E7712B0000
heap
page read and write
1E77780A000
heap
page read and write
1E7779B9000
heap
page read and write
1A6C918E000
heap
page read and write
1E777970000
heap
page read and write
1E771190000
direct allocation
page read and write
1E7654A7000
heap
page read and write
1E777847000
heap
page read and write
9ABEEFE000
stack
page read and write
1E76A622000
trusted library allocation
page read and write
1E773F80000
heap
page read and write
2307FFE000
unkown
page readonly
1E769AA0000
heap
page read and write
1E77143C000
direct allocation
page read and write
1E773E39000
heap
page read and write
1E7654B7000
heap
page read and write
1E7711C0000
trusted library allocation
page read and write
1E76E69E000
heap
page read and write
1E7777AD000
heap
page read and write
1E771292000
heap
page read and write
1E7712B9000
heap
page read and write
1E76E6A0000
heap
page read and write
1E777767000
heap
page read and write
1E777A19000
heap
page read and write
1E771310000
trusted library allocation
page read and write
16C0002F0000
trusted library allocation
page read and write
1E76E066000
heap
page read and write
1E777AF2000
heap
page read and write
1E773FC0000
heap
page read and write
1E773EB0000
heap
page read and write
1E7711D0000
trusted library allocation
page read and write
1E77795B000
heap
page read and write
1E7779EA000
heap
page read and write
1E765442000
heap
page read and write
1E7778B3000
heap
page read and write
1E77785C000
heap
page read and write
1E771409000
heap
page read and write
1E773F3A000
heap
page read and write
9ABF4FE000
stack
page read and write
9AC047E000
stack
page read and write
1E75F840000
unkown
page readonly
1E7779CA000
heap
page read and write
1E777776000
heap
page read and write
1E777B5B000
heap
page read and write
1E773D5C000
heap
page read and write
1A6CAB01000
unkown
page execute read
1E7778B7000
heap
page read and write
7FF7D7F74000
unkown
page readonly
1E76E551000
heap
page read and write
1E76BEAF000
trusted library allocation
page read and write
1E76E0CD000
heap
page read and write
1E765449000
heap
page read and write
1A6C9195000
heap
page read and write
1E76E6AD000
heap
page read and write
1E7778C6000
heap
page read and write
1E777898000
heap
page read and write
1E7654C7000
heap
page read and write
1E777B16000
heap
page read and write
1A6CAB20000
heap
page read and write
1E773EBF000
heap
page read and write
1E7712BA000
heap
page read and write
1E777863000
heap
page read and write
9ABFB3E000
stack
page read and write
1E771774000
heap
page read and write
1E777B8A000
heap
page read and write
9ABC97E000
stack
page read and write
1A6C9160000
heap
page read and write
1E7712BC000
heap
page read and write
1E770060000
trusted library allocation
page read and write
1E7654BD000
heap
page read and write
1E7778D9000
heap
page read and write
1E777886000
heap
page read and write
1A6C90D0000
heap
page read and write
1E7777C6000
heap
page read and write
1E76E5CD000
heap
page read and write
1E77792A000
heap
page read and write
1E7711B0000
trusted library allocation
page read and write
1E777B41000
heap
page read and write
1E765528000
heap
page read and write
1E770043000
trusted library allocation
page read and write
1E77411B000
heap
page read and write
1E7712A7000
heap
page read and write
9ABFCFD000
stack
page read and write
1E7654E2000
heap
page read and write
9ABD3FB000
stack
page read and write
1E771738000
heap
page read and write
1E769A41000
heap
page read and write
1E77129F000
heap
page read and write
1E777B8C000
heap
page read and write
1E777B72000
heap
page read and write
1E76A627000
trusted library allocation
page read and write
1E76AA20000
heap
page read and write
1E777935000
heap
page read and write
1A6C91EB000
heap
page read and write
2BB8002A8000
direct allocation
page read and write
1E777AC5000
heap
page read and write
1E76A621000
trusted library allocation
page read and write
16C000201000
trusted library allocation
page read and write
1E771200000
trusted library allocation
page read and write
1E773EBF000
heap
page read and write
1A6C91C6000
heap
page read and write
1E777B27000
heap
page read and write
1E76E69E000
heap
page read and write
1E7779C6000
heap
page read and write
1E7712E3000
heap
page read and write
1A6CDA0B000
direct allocation
page read and write
1E774B50000
heap
page read and write
1E77781A000
heap
page read and write
1E76E457000
heap
page read and write
1E7740A8000
heap
page read and write
1E7749E5000
heap
page read and write
9ABEA7F000
stack
page read and write
1E7654B8000
heap
page read and write
1E77788B000
heap
page read and write
1E771440000
direct allocation
page read and write
1E7778CA000
heap
page read and write
9ABDCFE000
stack
page read and write
1E7653E4000
heap
page read and write
1E7777A4000
heap
page read and write
1E773E9D000
heap
page read and write
1E76A130000
heap
page read and write
1A6C91B9000
heap
page read and write
1E76E470000
heap
page read and write
1E76A62C000
trusted library allocation
page read and write
1E777A26000
heap
page read and write
1E7711C0000
trusted library allocation
page read and write
1E761570000
unkown
page readonly
1E7779C4000
heap
page read and write
1E769A83000
heap
page read and write
1E76E542000
heap
page read and write
1E76E0A0000
heap
page read and write
1E777806000
heap
page read and write
1E7740B7000
heap
page read and write
2BB800234000
direct allocation
page read and write
1E771290000
heap
page read and write
1E7654B7000
heap
page read and write
1E770010000
trusted library allocation
page read and write
1E771190000
direct allocation
page read and write
1E77143C000
direct allocation
page read and write
1E7740FF000
heap
page read and write
1A6C91D0000
heap
page read and write
1E7712BF000
heap
page read and write
1E77785E000
heap
page read and write
1E76E0E2000
heap
page read and write
1E771436000
direct allocation
page read and write
1E777B34000
heap
page read and write
1A6C91E7000
heap
page read and write
1E774053000
heap
page read and write
1E777875000
heap
page read and write
1E7778B1000
heap
page read and write
16C000210000
trusted library allocation
page read and write
2BB800288000
direct allocation
page read and write
1E771339000
heap
page read and write
1A6CD000000
direct allocation
page read and write
16C0002AC000
trusted library allocation
page read and write
7FF7D7F36000
unkown
page readonly
1E76A626000
trusted library allocation
page read and write
1E777813000
heap
page read and write
1E76A0E0000
trusted library allocation
page read and write
23057FA000
stack
page read and write
1E76549B000
heap
page read and write
1E762AF5000
unkown
page readonly
1E7610DF000
unkown
page read and write
1E77183F000
heap
page read and write
1E76A320000
heap
page read and write
1E7778B9000
heap
page read and write
9ABD6FD000
stack
page read and write
1E771360000
heap
page read and write
1A6C9140000
heap
page readonly
9ABC4FE000
stack
page read and write
1E7712C0000
trusted library allocation
page read and write
1E771298000
heap
page read and write
1E770070000
trusted library allocation
page read and write
1E76548E000
heap
page read and write
1E777933000
heap
page read and write
1E773EE8000
heap
page read and write
1E77796E000
heap
page read and write
1E7779C8000
heap
page read and write
1E6D2D13000
direct allocation
page read and write
1E7777B3000
heap
page read and write
1E7778DD000
heap
page read and write
1E77781C000
heap
page read and write
1E76A62E000
trusted library allocation
page read and write
1E7776C3000
heap
page read and write
1A6C9110000
direct allocation
page read and write
1E76E46C000
heap
page read and write
2BB800201000
direct allocation
page read and write
1E777AEB000
heap
page read and write
1E76E0C4000
heap
page read and write
1E7717FF000
heap
page read and write
1E770070000
trusted library allocation
page read and write
9ABF7FB000
stack
page read and write
1E773DF5000
heap
page read and write
1E773EA5000
heap
page read and write
1E77789A000
heap
page read and write
1A6C91C5000
heap
page read and write
1E771320000
trusted library allocation
page read and write
1E7716C4000
heap
page read and write
1E771210000
trusted library allocation
page read and write
1A6CD5A1000
direct allocation
page read and write
1E7740AA000
heap
page read and write
1E777A20000
heap
page read and write
1E7778AA000
heap
page read and write
16C000290000
trusted library allocation
page read and write
1E771A3F000
heap
page read and write
1E7654D0000
heap
page read and write
1E7740AA000
heap
page read and write
1E7654A9000
heap
page read and write
1E777AD4000
heap
page read and write
1A6C91E0000
heap
page read and write
1E7777F7000
heap
page read and write
1E773F38000
heap
page read and write
1E7778D7000
heap
page read and write
1E76E319000
heap
page read and write
16C000238000
trusted library allocation
page read and write
1E77786A000
heap
page read and write
1A6CD400000
direct allocation
page read and write
1E76E656000
heap
page read and write
1A6C9130000
trusted library allocation
page read and write
1E77134D000
heap
page read and write
1E7610F4000
unkown
page read and write
1E76AA24000
heap
page read and write
1E777B21000
heap
page read and write
1E771300000
trusted library allocation
page read and write
1E771419000
heap
page read and write
1E76A610000
heap
page read and write
1E7654D2000
heap
page read and write
1A6C90B0000
heap
page read and write
1E777A5E000
heap
page read and write
1E771293000
trusted library allocation
page read and write
1E7776CE000
heap
page read and write
1E773EC3000
heap
page read and write
1E7778A6000
heap
page read and write
1E7779E8000
heap
page read and write
1E6CAD14000
direct allocation
page read and write
1E76E6C0000
trusted library allocation
page read and write
1E771200000
trusted library allocation
page read and write
1E773DF1000
heap
page read and write
9ABD575000
stack
page read and write
1E777A17000
heap
page read and write
1E773D34000
heap
page read and write
1E7779D7000
heap
page read and write
1E76552B000
heap
page read and write
1E76A62F000
trusted library allocation
page read and write
1A6CD9EF000
direct allocation
page read and write
1E77776B000
heap
page read and write
1E7777A2000
heap
page read and write
1E771420000
direct allocation
page read and write
1E7779D5000
heap
page read and write
1E769ABD000
heap
page read and write
1E7653BF000
heap
page read and write
1E770063000
trusted library allocation
page read and write
1E771357000
heap
page read and write
1E7711A3000
trusted library allocation
page read and write
1E7776C3000
heap
page read and write
1E7654EF000
heap
page read and write
1E76A62A000
trusted library allocation
page read and write
1E76A0D0000
heap
page read and write
9ABF97B000
stack
page read and write
1A6CD9FF000
direct allocation
page read and write
1A6CAB00000
unkown
page readonly
7FF7D7F6F000
unkown
page readonly
1E777B3D000
heap
page read and write
1E77155C000
heap
page read and write
1E7779CC000
heap
page read and write
1E7749EE000
heap
page read and write
1E771562000
heap
page read and write
1E76E700000
trusted library allocation
page read and write
1A6C91EF000
heap
page read and write
1E770010000
trusted library allocation
page read and write
13D80470000
heap
page read and write
1E777B4E000
heap
page read and write
1E762732000
unkown
page readonly
1E76E6F0000
trusted library allocation
page read and write
1E762AA7000
unkown
page readonly
1E765438000
heap
page read and write
9AC167F000
stack
page read and write
1E777858000
heap
page read and write
1E7654E2000
heap
page read and write
7FF7D7D98000
unkown
page readonly
1A6CAAC9000
heap
page read and write
1E777B45000
heap
page read and write
1E777AE5000
heap
page read and write
16C00027C000
trusted library allocation
page read and write
1E777961000
heap
page read and write
1E765463000
heap
page read and write
1A6C91C6000
heap
page read and write
1E76E12B000
heap
page read and write
1E7779E6000
heap
page read and write
1E76E45F000
heap
page read and write
1E771390000
trusted library allocation
page read and write
16C000248000
trusted library allocation
page read and write
1E76E720000
trusted library allocation
page read and write
1E777A11000
heap
page read and write
1E77786C000
heap
page read and write
1E75FFB9000
unkown
page readonly
1A6C9150000
heap
page read and write
1E763AE0000
unkown
page readonly
1E7654D2000
heap
page read and write
1E76A629000
trusted library allocation
page read and write
1E7779DB000
heap
page read and write
1E761C10000
unkown
page readonly
1E77786E000
heap
page read and write
1E765363000
heap
page read and write
1E777B09000
heap
page read and write
1E777AA0000
heap
page read and write
1A6C91F6000
heap
page read and write
1A6C91CE000
heap
page read and write
1E7779CE000
heap
page read and write
1A6C91DA000
heap
page read and write
1E773E7D000
heap
page read and write
1E76A625000
trusted library allocation
page read and write
1E777A51000
heap
page read and write
1A6CAAC0000
heap
page read and write
1E7712D0000
trusted library allocation
page read and write
1A6CD9F6000
direct allocation
page read and write
1E7778DF000
heap
page read and write
1E777867000
heap
page read and write
1A6CACB0000
unkown
page readonly
9ABD9FB000
stack
page read and write
9ABDE7F000
stack
page read and write
16C00026C000
trusted library allocation
page read and write
16C000250000
trusted library allocation
page read and write
1E77792C000
heap
page read and write
1E7777F3000
heap
page read and write
1E777856000
heap
page read and write
1A6C91E0000
heap
page read and write
1E765406000
heap
page read and write
1E76E62B000
heap
page read and write
1E777889000
heap
page read and write
1E77A6B1000
heap
page read and write
1E77779E000
heap
page read and write
1E777881000
heap
page read and write
1E7653F9000
heap
page read and write
1E774008000
heap
page read and write
1E7749C8000
heap
page read and write
1E77793B000
heap
page read and write
1A6C91CE000
heap
page read and write
1E77778F000
heap
page read and write
1E771568000
heap
page read and write
1E7712B0000
heap
page read and write
1E7749EC000
heap
page read and write
1E77410F000
heap
page read and write
1E760478000
unkown
page readonly
1E7776C5000
heap
page read and write
1E773D5A000
heap
page read and write
1E7777B7000
heap
page read and write
1E7712A0000
trusted library allocation
page read and write
1E771340000
trusted library allocation
page read and write
9ABE77F000
stack
page read and write
9AC077E000
stack
page read and write
1A6C91B5000
heap
page read and write
7FF7D7781000
unkown
page execute read
1E7654CA000
heap
page read and write
1E777A4D000
heap
page read and write
1E7653FC000
heap
page read and write
1E76E730000
trusted library allocation
page read and write
1E7715C9000
heap
page read and write
9ABE5FE000
stack
page read and write
1E7654CE000
heap
page read and write
1E76A62D000
trusted library allocation
page read and write
1E7779BD000
heap
page read and write
1E77787B000
heap
page read and write
1E7711C3000
trusted library allocation
page read and write
23067FE000
unkown
page read and write
1E773DAD000
heap
page read and write
1E771190000
direct allocation
page read and write
1E76E484000
heap
page read and write
1E774053000
heap
page read and write
1E777838000
heap
page read and write
1E76E542000
heap
page read and write
1A6CB011000
direct allocation
page read and write
1E77775E000
heap
page read and write
1E76E6B7000
heap
page read and write
1E777865000
heap
page read and write
1E771230000
trusted library allocation
page read and write
2BB800278000
direct allocation
page read and write
9AC11FC000
stack
page read and write
1E777774000
heap
page read and write
1E7711A3000
trusted library allocation
page read and write
1A6CAC9F000
unkown
page readonly
1E76E4BE000
heap
page read and write
1E777B2E000
heap
page read and write
1A6C91D9000
heap
page read and write
1A6C91D7000
heap
page read and write
1E76E476000
heap
page read and write
16C0002C4000
trusted library allocation
page read and write
1E771330000
heap
page read and write
1A6C910F000
trusted library allocation
page read and write
16C0002B4000
trusted library allocation
page read and write
1E76E6B7000
heap
page read and write
1E77776D000
heap
page read and write
1E7776E0000
heap
page read and write
1E777AF4000
heap
page read and write
1E7711D0000
trusted library allocation
page read and write
1E777B81000
heap
page read and write
1E7715C4000
heap
page read and write
1E7712C0000
heap
page read and write
1A6C91B6000
heap
page read and write
1E7711B0000
trusted library allocation
page read and write
1E777822000
heap
page read and write
1E769A86000
heap
page read and write
1A6C9143000
heap
page readonly
1E7717A7000
heap
page read and write
1E777B50000
heap
page read and write
1A6CAAE8000
heap
page read and write
1E7778A8000
heap
page read and write
1E777B43000
heap
page read and write
1E7690E8000
heap
page read and write
9AC0A7E000
stack
page read and write
1E7779E4000
heap
page read and write
1E773EBA000
heap
page read and write
1E7779B7000
heap
page read and write
1E7690E4000
heap
page read and write
1A6C91F0000
heap
page read and write
1E771190000
direct allocation
page read and write
9ABCAFA000
stack
page read and write
1E770070000
trusted library allocation
page read and write
1E765463000
heap
page read and write
1E7779BF000
heap
page read and write
9AC137C000
stack
page read and write
1E771220000
trusted library allocation
page read and write
1A6C91E4000
heap
page read and write
1E77795F000
heap
page read and write
1A6C91D2000
heap
page read and write
9AC08FE000
stack
page read and write
1E7778BE000
heap
page read and write
1E771741000
heap
page read and write
1E762AB6000
unkown
page readonly
1E7778DB000
heap
page read and write
1E76E586000
heap
page read and write
1E777861000
heap
page read and write
1E774980000
heap
page read and write
1E777A9E000
heap
page read and write
1A6C9195000
heap
page read and write
1E7654A4000
heap
page read and write
1E7778A0000
heap
page read and write
1E771410000
direct allocation
page read and write
1E773D58000
heap
page read and write
1A6C91D7000
heap
page read and write
1E777852000
heap
page read and write
1E7654AE000
heap
page read and write
1E76E6C3000
trusted library allocation
page read and write
1E777A62000
heap
page read and write
1E7654A7000
heap
page read and write
1E76E6B7000
heap
page read and write
1E77410F000
heap
page read and write
1A6C91F6000
heap
page read and write
1E773F7F000
heap
page read and write
1E770080000
trusted library allocation
page read and write
9AC1AFF000
stack
page read and write
1E76A190000
heap
page read and write
1E77129C000
heap
page read and write
1E773F7F000
heap
page read and write
1E77787D000
heap
page read and write
1E76E2F2000
heap
page read and write
1E777926000
heap
page read and write
1E765449000
heap
page read and write
23087FE000
stack
page read and write
1E771240000
trusted library allocation
page read and write
1E76E5A4000
heap
page read and write
16C0002B4000
trusted library allocation
page read and write
1E76E0D1000
heap
page read and write
1E763A50000
unkown
page read and write
1E762610000
unkown
page readonly
9ABBFDB000
stack
page read and write
1E771400000
heap
page read and write
1E771348000
heap
page read and write
1E76E106000
heap
page read and write
1E777765000
heap
page read and write
1E77136F000
heap
page read and write
1E777AF8000
heap
page read and write
1E76A623000
trusted library allocation
page read and write
1E771578000
heap
page read and write
1E7711A0000
trusted library allocation
page read and write
1E76FFF9000
heap
page read and write
1A6C91CE000
heap
page read and write
9ABDFFE000
stack
page read and write
1A6C91DE000
heap
page read and write
1E777B54000
heap
page read and write
9ABF1F7000
stack
page read and write
1E76A624000
trusted library allocation
page read and write
1E7654BD000
heap
page read and write
1E773E96000
heap
page read and write
1E774125000
heap
page read and write
16C0002A0000
trusted library allocation
page read and write
1E76E09B000
heap
page read and write
1E777896000
heap
page read and write
1E773EC9000
heap
page read and write
1E777B07000
heap
page read and write
1E769AC4000
heap
page read and write
1E777770000
heap
page read and write
1E7778D5000
heap
page read and write
1A6CAA6E000
heap
page read and write
1E7777A8000
heap
page read and write
1E7711A0000
trusted library allocation
page read and write
2BB800220000
direct allocation
page read and write
1A6CAB30000
unkown
page readonly
1E771813000
heap
page read and write
1E76E586000
heap
page read and write
1A6C9195000
heap
page read and write
1E7711A0000
trusted library allocation
page read and write
1E7777FD000
heap
page read and write
1E76E117000
heap
page read and write
1E76E6CF000
trusted library allocation
page read and write
1E77787F000
heap
page read and write
1E7740B4000
heap
page read and write
1E771639000
heap
page read and write
2BB80024C000
direct allocation
page read and write
13D80420000
heap
page read and write
1E77143F000
direct allocation
page read and write
1E771300000
trusted library allocation
page read and write
1E77134F000
heap
page read and write
1E76FFF0000
heap
page read and write
1E7690D0000
heap
page read and write
16C00028C000
trusted library allocation
page read and write
1E777A53000
heap
page read and write
1E777870000
heap
page read and write
9ABBF90000
stack
page read and write
1E76E6C0000
trusted library allocation
page read and write
1E7711D0000
trusted library allocation
page read and write
1E771390000
direct allocation
page read and write
1E7712D0000
trusted library allocation
page read and write
1E6DED3F000
direct allocation
page read and write
1E77161A000
heap
page read and write
1E7654A7000
heap
page read and write
1E7740BF000
heap
page read and write
1E7711D3000
trusted library allocation
page read and write
1A6C91C0000
heap
page read and write
1E7654FE000
heap
page read and write
1E76E6C0000
trusted library allocation
page read and write
9ABCC74000
stack
page read and write
16C00020C000
trusted library allocation
page read and write
1E7712BA000
heap
page read and write
1E7715DC000
heap
page read and write
1E76E4BD000
heap
page read and write
1E777761000
heap
page read and write
1E777877000
heap
page read and write
1E777B30000
heap
page read and write
1E777872000
heap
page read and write
1A6C91D2000
heap
page read and write
1E777B6C000
heap
page read and write
16C00025C000
trusted library allocation
page read and write
1A6CD9A1000
direct allocation
page read and write
1E769A74000
heap
page read and write
16C0002AC000
trusted library allocation
page read and write
1E777802000
heap
page read and write
1E77412F000
heap
page read and write
1E76E10F000
heap
page read and write
9AC017C000
stack
page read and write
1E760453000
unkown
page readonly
9ABE47F000
stack
page read and write
1E770080000
trusted library allocation
page read and write
1E773EAA000
heap
page read and write
1E777804000
heap
page read and write
1E76E143000
heap
page read and write
1A6C9166000
heap
page read and write
1E777A91000
heap
page read and write
1E7654D3000
heap
page read and write
23077FE000
stack
page read and write
1E7654FA000
heap
page read and write
1E777849000
heap
page read and write
1E762AD6000
unkown
page readonly
1E77129D000
heap
page read and write
9AC1C7E000
stack
page read and write
1E777B70000
heap
page read and write
1A6C91E1000
heap
page read and write
1E777778000
heap
page read and write
1E76E547000
heap
page read and write
1E777772000
heap
page read and write
1E7654B8000
heap
page read and write
1E777B5D000
heap
page read and write
9ABE17F000
stack
page read and write
1E76E171000
heap
page read and write
1A6CD5C3000
direct allocation
page read and write
1E77410F000
heap
page read and write
1A6CAB50000
unkown
page readonly
1E7654A2000
heap
page read and write
1E7654E2000
heap
page read and write
2BB800248000
direct allocation
page read and write
7FF7D7780000
unkown
page readonly
1E7711B0000
trusted library allocation
page read and write
16C0002C4000
trusted library allocation
page read and write
1E7776CF000
heap
page read and write
1E7711C0000
trusted library allocation
page read and write
9ABFAFB000
stack
page read and write
1E7653BF000
heap
page read and write
1E777B6A000
heap
page read and write
1E76E587000
heap
page read and write
1E7713B8000
direct allocation
page read and write
1E7654E0000
heap
page read and write
1E777B8E000
heap
page read and write
16C0002D8000
trusted library allocation
page read and write
1E769A62000
heap
page read and write
1E771625000
heap
page read and write
1E777B79000
heap
page read and write
1E773E88000
heap
page read and write
1E777AE9000
heap
page read and write
9AC02F9000
stack
page read and write
9ABFE7D000
stack
page read and write
1E763A3A000
unkown
page read and write
1E777A28000
heap
page read and write
1A6C9100000
trusted library allocation
page read and write
1E7777A0000
heap
page read and write
1E771447000
direct allocation
page read and write
1E7777F9000
heap
page read and write
1E777B18000
heap
page read and write
9ABE8FF000
stack
page read and write
1E765449000
heap
page read and write
1A6CAB52000
unkown
page readonly
16C0002C8000
trusted library allocation
page read and write
1E76E61A000
heap
page read and write
1E7778B5000
heap
page read and write
9AC0D7C000
stack
page read and write
1E770073000
trusted library allocation
page read and write
1A6C9154000
heap
page read and write
1E77789E000
heap
page read and write
1E7713C1000
direct allocation
page read and write
1E7779FB000
heap
page read and write
1E771250000
trusted library allocation
page read and write
1E7653EA000
heap
page read and write
1E76E505000
heap
page read and write
1E770050000
trusted library allocation
page read and write
1E773EC5000
heap
page read and write
1E7777C4000
heap
page read and write
1E771434000
direct allocation
page read and write
1E76E710000
trusted library allocation
page read and write
1E774054000
heap
page read and write
1E76E23A000
heap
page read and write
1E76E3F7000
heap
page read and write
1A6CAB0D000
direct allocation
page readonly
16C000220000
trusted library allocation
page read and write
1A6C91B5000
heap
page read and write
1A6CDA17000
direct allocation
page read and write
1E777763000
heap
page read and write
16C000260000
trusted library allocation
page read and write
1A6CAA00000
heap
page read and write
1E773E93000
heap
page read and write
1E7777FB000
heap
page read and write
1E76E0D3000
heap
page read and write
9ABF37F000
stack
page read and write
1E773FC1000
heap
page read and write
1E7654B7000
heap
page read and write
9ABDB7F000
stack
page read and write
2306FFE000
unkown
page readonly
1E771410000
heap
page read and write
1E7654D0000
heap
page read and write
1E777B36000
heap
page read and write
13D807E4000
heap
page read and write
1E7654D0000
heap
page read and write
1E773EBB000
heap
page read and write
1E77788D000
heap
page read and write
1E7654D4000
heap
page read and write
1E777B7D000
heap
page read and write
1A6CAB0C000
unkown
page read and write
1E7654D0000
heap
page read and write
1E77143A000
direct allocation
page read and write
1E76294C000
unkown
page readonly
1E7779BB000
heap
page read and write
1E771346000
heap
page read and write
1E774130000
heap
page read and write
1E76E15E000
heap
page read and write
1E771633000
heap
page read and write
1E77789C000
heap
page read and write
1E769A68000
heap
page read and write
1A6CB014000
direct allocation
page read and write
1E765406000
heap
page read and write
1E7778C2000
heap
page read and write
9ABC67D000
stack
page read and write
1E777B63000
heap
page read and write
1E771369000
heap
page read and write
1E76E6F3000
trusted library allocation
page read and write
1E777B90000
heap
page read and write
2BB800230000
direct allocation
page read and write
1E773F2B000
heap
page read and write
9AC17FE000
stack
page read and write
2BB80029C000
direct allocation
page read and write
1E773E92000
heap
page read and write
1E777A4F000
heap
page read and write
7FF7D7F16000
unkown
page write copy
1E76E740000
trusted library allocation
page read and write
9ABEBFE000
stack
page read and write
1E77796C000
heap
page read and write
1A6C91A6000
heap
page read and write
1E77411B000
heap
page read and write
1A6C91B5000
heap
page read and write
1E771298000
heap
page read and write
1E777B1F000
heap
page read and write
1E7712DF000
heap
page read and write
1E7653D0000
heap
page read and write
9AC14FE000
stack
page read and write
1E7712C0000
trusted library allocation
page read and write
1E774115000
heap
page read and write
1A6CB01A000
direct allocation
page read and write
1E7654F6000
heap
page read and write
1E77775C000
heap
page read and write
1E774008000
heap
page read and write
1E771798000
heap
page read and write
1E76E5AD000
heap
page read and write
1E7717E4000
heap
page read and write
1E76E60B000
heap
page read and write
1A6C91EF000
heap
page read and write
1E76A628000
trusted library allocation
page read and write
1E7654E9000
heap
page read and write
1E771294000
heap
page read and write
1E771303000
trusted library allocation
page read and write
1E777AF6000
heap
page read and write
1A6CAAC9000
heap
page read and write
1E7779B2000
heap
page read and write
1E7749F7000
heap
page read and write
1E7654BD000
heap
page read and write
1A6C9196000
heap
page read and write
1E77795D000
heap
page read and write
1A6CDA41000
direct allocation
page read and write
1E76A632000
trusted library allocation
page read and write
1E777854000
heap
page read and write
1E7778FF000
heap
page read and write
1E76E551000
heap
page read and write
1E777A13000
heap
page read and write
2BB80025C000
direct allocation
page read and write
1E7639F3000
unkown
page read and write
1E76E54A000
heap
page read and write
1E7778AC000
heap
page read and write
1E771203000
trusted library allocation
page read and write
13D804D0000
heap
page read and write
1E771426000
direct allocation
page read and write
1E760450000
unkown
page readonly
1E771290000
heap
page read and write
1E7777FF000
heap
page read and write
1E76A220000
heap
page read and write
1E777939000
heap
page read and write
1E7654D7000
heap
page read and write
1E777769000
heap
page read and write
1E7713A3000
direct allocation
page read and write
1A6CDA1D000
direct allocation
page read and write
1E765452000
heap
page read and write
1E771203000
trusted library allocation
page read and write
1A6CD9FD000
direct allocation
page read and write
1E773EAA000
heap
page read and write
9ABE2FE000
stack
page read and write
1E7778AF000
heap
page read and write
1E777A24000
heap
page read and write
There are 932 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://www.free-pdf-creator.com/
https://www.free-pdf-creator.com/lps/typ/?offer=false
https://www.free-pdf-creator.com/lps/typ/?offer=false
https://www.free-pdf-creator.com/lps/typ/?offer=false
https://pdf.activegn.com/
https://pdf.activegn.com/
https://pdf.activegn.com/
file:///C:/Users/user/Downloads/download.htm
file:///C:/Users/user/Downloads/download%20(1).htm