IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3k0.0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u3k0.1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BKJEHCAKFBGDGCAAAFBG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DAEBFHJKJEBFCBFHDAEG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FHIDBKFCAAEBFIDHDBAECFIEGC
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GIDAECGDAFBAAAAAECGIIEBFCB
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HCBGDGCA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IPKGELNTQY.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\JDDHMPCDUJ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\JJECAAEHCFIEBGCBGHIEGCFIII
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\KFCFBAAEHCFHJJKEHJKJDHJDGI
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\KFHJJDHJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\LIJDSFKJZG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\LSBIHQFDVT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_u3k0.0.exe_ec6012433e44cca6cb8e1384d55326cab14adfb_b8fbbdc5_24d28e98-ae26-42bc-95bf-60a11e28efb9\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER80C7.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Apr 16 08:31:15 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER81F1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8221.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\NEBFQQYWPS.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\NEBFQQYWPS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\PALRGUCVEH.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\PALRGUCVEH.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\QNCYCDFIJJ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SUAVTZKNFL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\UBVUNTSCZJ.xlsx
HIT archive data
dropped
C:\ProgramData\ZQIXMVQGAH.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\iolo technologies\logs\bootstrap.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\iolo\logs\WSComm.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\cf36eaf21544e4a6681cdd9cabbb179d30ea8958ca2b1c00aff8db406d5550f6\a71084b0f680418dac18c455fadd94b0.tmp
ASCII text, with very long lines (500), with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\cf36eaf21544e4a6681cdd9cabbb179d30ea8958ca2b1c00aff8db406d5550f6\a71084b0f680418dac18c455fadd94b0.trn (copy)
ASCII text, with very long lines (500), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\cf36eaf21544e4a6681cdd9cabbb179d30ea8958ca2b1c00aff8db406d5550f6\sfqazuvd.fwy
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\iolo\dm\ioloDMLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 38 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\u3k0.0.exe
"C:\Users\user\AppData\Local\Temp\u3k0.0.exe"
malicious
C:\Users\user\AppData\Local\Temp\u3k0.1.exe
"C:\Users\user\AppData\Local\Temp\u3k0.1.exe"
malicious
C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
"C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5428 -s 2220

URLs

Name
IP
Malicious
http://185.172.128.209/15f649199f40275b/freebl3.dll
185.172.128.209
malicious
http://185.1
unknown
malicious
http://185.172.128.209
unknown
malicious
http://185.172.128.209/15f649199f40275b/nss3.dll
185.172.128.209
malicious
http://185.172.128.209/15f649199f40275b/vcruntime140.dll
185.172.128.209
malicious
http://185.172.128.209/15f649199f40275b/softokn3.dll
185.172.128.209
malicious
http://185.172.128.209/15f649199f40275b/mozglue.dll
185.172.128.209
malicious
http://185.172.128.90/cpa/ping.php?substr=seven&s=ab&sub=0
185.172.128.90
malicious
http://185.172.128.209/15f649199f40275b/sqlite3.dll
185.172.128.209
malicious
http://185.172.128.209/3cd2b
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://monitor.azure.com//.default
unknown
https://snapshot.monitor.azure.com/&
unknown
http://185.172.128.228/BroomSetup.exe
185.172.128.228
http://185.172.128.209/3cd2b41cbde8fc9c.phpre
unknown
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx.
unknown
https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
unknown
https://www.iolo.com/company/legal/sales-policy/
unknown
http://www.indyproject.org/
unknown
http://185.172.128.209/3cd2b41cbde8fc9c.phptX9
unknown
https://support.iolo.com/support/solutions/articles/44001781185?
unknown
https://www.iolo.com/company/legal/privacy/?
unknown
http://www.codeplex.com/CompositeWPF
unknown
https://support.iolo.com/support/solutions/articles/44001781185
unknown
https://scripts.sil.org/OFL
unknown
http://185.172.128.209/3cd2b41cbde8fc9c.php033b0a545a8d4e556e38c5092e86-release
unknown
https://taskscheduler.codeplex.com/H
unknown
http://185.172.128.209/15f649199f40275b/nss3.dll8
unknown
https://www.iolo.com/company/legal/sales-policy/?
unknown
https://scripts.sil.org/OFLX8
unknown
http://185.172.128.209/3cd2b41cbde8fc9c.phpsi
unknown
https://westus2-2.in.applicationinsights.azure.com
unknown
https://webhooklistenersfunc.azurewebsites.net/api/lookup/constella-dark-web-alerts
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://indiantypefoundry.com
unknown
https://download.avira.com/download/
unknown
http://www.codeplex.com/prism#Microsoft.Practices.Prism.ViewModel
unknown
http://dejavu.sourceforge.net
unknown
http://185.172.128.209/15f649199f40275b/vcruntime140.dllQ
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://www.iolo.com/company/legal/privacy/
unknown
https://mozilla.org0/
unknown
http://185.172.128.209/3cd2b41cbde8fc9c.phpWi
unknown
http://microsoft.co
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.elMx_wJzrE6l
unknown
http://download.iolo.net/ds/4/en/images/dsUSB.imaRealDefense
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://rt.services.visualstudio.com/l
unknown
https://dc.services.visualstudio.com/
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.
unknown
http://185.172.128.209/15f649199f40275b/mozglue.dllX
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://dejavu.sourceforge.nethttp://dejavu.sourceforge.netFonts
unknown
https://iolo.comH42652B74-0AD8-4B60-B8FD-69ED38F7666B
unknown
https://dc.services.visualstudio.com/f
unknown
https://profiler.monitor.azure.com/
unknown
http://185.172.128.59/syncUpd.exe
185.172.128.59
https://www.newtonsoft.com/jsonschema
unknown
http://185.172.128.209/15f649199f40275b/mozglue.dllN
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe
unknown
https://westus2-2.in.applicationinsights.azure.com/
unknown
http://185.172.128.209/3cd2b41cbde8fc9c.phpBrowser
unknown
https://www.iolo.com/company/legal/eula/?
unknown
http://dejavu.sourceforge.net/wiki/index.php/License
unknown
http://185.172.128.209/15f649199f40275b/softokn3.dllKH
unknown
https://scripts.sil.org/OFLThis
unknown
https://github.com/itfoundry/Poppins)&&&&z
unknown
https://github.com/itfoundry/Poppins)
unknown
https://snapshot.monitor.azure.com/
unknown
http://westus2-2.in.applicationinsights.azure.com
unknown
https://github.com/itfoundry/Poppins)&&&&v
unknown
http://ocsp.sectigo.com0
unknown
https://www.iolo.com/company/legal/eula/
unknown
https://www.newtonsoft.com/json
unknown
http://185.172.128.209/3cd2b41cbde8fc9c.phpI
unknown
https://westus2-2.in.applicationinsights.azure.com/v2/track
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.172.128.209/15f649199f40275b/sqlite3.dllr
unknown
http://google.com
unknown
https://dc.services.visualstudio.com/v2/track
unknown
http://185.172.128.209/3cd2bt
unknown
http://www.codeplex.com/prism
unknown
https://taskscheduler.codeplex.com/
unknown
https://westus2-2.in.applicationinsights.azure.com/;LiveEndpoint=https://westus2.livediagnostics.mon
unknown
http://compositewpf.codeplex.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://sectigo.com/CPS0D
unknown
http://185.1T
unknown
https://dc.services.visualstudio.com/Jhttps://rt.services.visualstudio.com/Fhttps://profiler.monitor
unknown
http://dejavu.sourceforge.net/wiki/index.php/Licensehttp://dejavu.sourceforge.net/wiki/index.php/Lic
unknown
https://rt.services.visualstudio.com/
unknown
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx
20.157.87.45
http://185.172.128.209/3cd2b41cbde8fc9c.phpk
unknown
http://185.172.128.209/3cd2b41cb1
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.06
unknown
http://185.172.128.209/3cd2b41cbde8fc9c.phps
unknown
http://www.sqlite.org/copyright.html.
unknown
https://github.com/JamesNK/Newtonsoft.Json
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
svc.iolo.com
20.157.87.45
westus2-2.in.applicationinsights.azure.com
unknown

IPs

IP
Domain
Country
Malicious
185.172.128.90
unknown
Russian Federation
malicious
185.172.128.209
unknown
Russian Federation
malicious
185.172.128.228
unknown
Russian Federation
20.157.87.45
svc.iolo.com
United States
185.172.128.59
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\BroomCleaner
Installed
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
MaxSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
Retention
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Shield
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Shield
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\ActiveCare
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\ActiveCare
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Search and Recover
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Search and Recover
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\DriveScrubber
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\DriveScrubber
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Installer
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Installer
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Guard
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Guard
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Launch Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Launch Manager
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Memory Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Memory Mechanic
TypesSupported
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileDirectory
\REGISTRY\A\{b5243bc5-3373-cd84-89e4-ad7dbaa7f4d7}\Root\InventoryApplicationFile\u3k0.0.exe|dc0f0f30d63d4404
ProgramId
\REGISTRY\A\{b5243bc5-3373-cd84-89e4-ad7dbaa7f4d7}\Root\InventoryApplicationFile\u3k0.0.exe|dc0f0f30d63d4404
FileId
\REGISTRY\A\{b5243bc5-3373-cd84-89e4-ad7dbaa7f4d7}\Root\InventoryApplicationFile\u3k0.0.exe|dc0f0f30d63d4404
LowerCaseLongPath
\REGISTRY\A\{b5243bc5-3373-cd84-89e4-ad7dbaa7f4d7}\Root\InventoryApplicationFile\u3k0.0.exe|dc0f0f30d63d4404
LongPathHash
\REGISTRY\A\{b5243bc5-3373-cd84-89e4-ad7dbaa7f4d7}\Root\InventoryApplicationFile\u3k0.0.exe|dc0f0f30d63d4404
Name
\REGISTRY\A\{b5243bc5-3373-cd84-89e4-ad7dbaa7f4d7}\Root\InventoryApplicationFile\u3k0.0.exe|dc0f0f30d63d4404
OriginalFileName
\REGISTRY\A\{b5243bc5-3373-cd84-89e4-ad7dbaa7f4d7}\Root\InventoryApplicationFile\u3k0.0.exe|dc0f0f30d63d4404
Publisher
\REGISTRY\A\{b5243bc5-3373-cd84-89e4-ad7dbaa7f4d7}\Root\InventoryApplicationFile\u3k0.0.exe|dc0f0f30d63d4404
Version
\REGISTRY\A\{b5243bc5-3373-cd84-89e4-ad7dbaa7f4d7}\Root\InventoryApplicationFile\u3k0.0.exe|dc0f0f30d63d4404
BinFileVersion
\REGISTRY\A\{b5243bc5-3373-cd84-89e4-ad7dbaa7f4d7}\Root\InventoryApplicationFile\u3k0.0.exe|dc0f0f30d63d4404
BinaryType
\REGISTRY\A\{b5243bc5-3373-cd84-89e4-ad7dbaa7f4d7}\Root\InventoryApplicationFile\u3k0.0.exe|dc0f0f30d63d4404
ProductName
\REGISTRY\A\{b5243bc5-3373-cd84-89e4-ad7dbaa7f4d7}\Root\InventoryApplicationFile\u3k0.0.exe|dc0f0f30d63d4404
ProductVersion
\REGISTRY\A\{b5243bc5-3373-cd84-89e4-ad7dbaa7f4d7}\Root\InventoryApplicationFile\u3k0.0.exe|dc0f0f30d63d4404
LinkDate
\REGISTRY\A\{b5243bc5-3373-cd84-89e4-ad7dbaa7f4d7}\Root\InventoryApplicationFile\u3k0.0.exe|dc0f0f30d63d4404
BinProductVersion
\REGISTRY\A\{b5243bc5-3373-cd84-89e4-ad7dbaa7f4d7}\Root\InventoryApplicationFile\u3k0.0.exe|dc0f0f30d63d4404
AppxPackageFullName
\REGISTRY\A\{b5243bc5-3373-cd84-89e4-ad7dbaa7f4d7}\Root\InventoryApplicationFile\u3k0.0.exe|dc0f0f30d63d4404
AppxPackageRelativeId
\REGISTRY\A\{b5243bc5-3373-cd84-89e4-ad7dbaa7f4d7}\Root\InventoryApplicationFile\u3k0.0.exe|dc0f0f30d63d4404
Size
\REGISTRY\A\{b5243bc5-3373-cd84-89e4-ad7dbaa7f4d7}\Root\InventoryApplicationFile\u3k0.0.exe|dc0f0f30d63d4404
Language
\REGISTRY\A\{b5243bc5-3373-cd84-89e4-ad7dbaa7f4d7}\Root\InventoryApplicationFile\u3k0.0.exe|dc0f0f30d63d4404
Usn
There are 46 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
20B9A620000
trusted library section
page read and write
malicious
20BFAAEB000
unkown
page readonly
malicious
9A8000
heap
page read and write
malicious
940000
direct allocation
page read and write
malicious
20BFDCEB000
unkown
page readonly
malicious
910000
direct allocation
page execute and read and write
malicious
20B9A280000
trusted library section
page read and write
malicious
400000
unkown
page execute and read and write
malicious
7FFB4B074000
trusted library allocation
page read and write
21060000
heap
page read and write
549000
unkown
page execute and read and write
980000
heap
page read and write
7FFB4B1F0000
trusted library allocation
page read and write
1ABAE000
stack
page read and write
7FFB4B0A0000
trusted library allocation
page execute and read and write
2106B000
heap
page read and write
61EB7000
direct allocation
page readonly
75E000
unkown
page read and write
400000
unkown
page readonly
6D3FF000
unkown
page readonly
9F0000
heap
page read and write
2FE0000
heap
page read and write
2FFE000
heap
page read and write
6D445000
unkown
page readonly
6D43F000
unkown
page write copy
7FFB4B02B000
trusted library allocation
page read and write
7FF4D23C2000
trusted library allocation
page readonly
21060000
heap
page read and write
20BFAAB2000
unkown
page readonly
401000
unkown
page execute read
3004000
heap
page read and write
C3B000
heap
page read and write
40C000
unkown
page readonly
2629000
direct allocation
page read and write
560000
heap
page read and write
20B9E7F5000
heap
page read and write
20B9E94B000
heap
page read and write
25B3000
direct allocation
page read and write
21048000
heap
page read and write
270F1000
heap
page read and write
20B9C52D000
heap
page read and write
21046000
heap
page read and write
20B9C570000
heap
page read and write
61ED3000
direct allocation
page read and write
2ED8000
heap
page read and write
2664000
direct allocation
page read and write
20B9A43D000
heap
page read and write
21055000
heap
page read and write
198000
stack
page read and write
7FFB4B2F0000
trusted library allocation
page read and write
6A6000
heap
page read and write
20BFC8EB000
unkown
page readonly
20B9EE24000
trusted library allocation
page read and write
20B8216C000
trusted library allocation
page read and write
7FF4D23C1000
trusted library allocation
page execute read
2FF0000
heap
page read and write
A44AF78000
stack
page read and write
21051000
heap
page read and write
20BA0AE0000
trusted library section
page read and write
4A0E000
stack
page read and write
33E80000
heap
page read and write
3007000
heap
page read and write
B3E000
heap
page read and write
2C3F000
stack
page read and write
7FF4D23D6000
trusted library allocation
page readonly
AE0000
heap
page read and write
20B9C6AA000
heap
page read and write
7FFB4AFD0000
trusted library allocation
page read and write
6E600000
unkown
page readonly
A44AC7D000
stack
page read and write
89E000
stack
page read and write
27FC000
stack
page read and write
B97000
heap
page read and write
6D260000
unkown
page readonly
2FF5000
heap
page read and write
470000
heap
page read and write
2D18E000
stack
page read and write
B30000
direct allocation
page execute and read and write
3005000
heap
page read and write
20BFE670000
heap
page read and write
7FFB4B085000
trusted library allocation
page read and write
20B9EA69000
heap
page read and write
20B81803000
trusted library allocation
page read and write
7FFB4B1A0000
trusted library allocation
page read and write
20B9E794000
heap
page read and write
2107C000
heap
page read and write
4B5E000
stack
page read and write
20B9C5EA000
heap
page read and write
21056000
heap
page read and write
2638000
direct allocation
page read and write
B57000
heap
page read and write
7FFB4B11D000
trusted library allocation
page read and write
401000
unkown
page execute read
2DCE000
stack
page read and write
7FFB4B330000
trusted library allocation
page read and write
7FFB4B08C000
trusted library allocation
page read and write
97000
stack
page read and write
B91000
heap
page read and write
7FFB4B050000
trusted library allocation
page read and write
2107B000
heap
page read and write
20B9E7A3000
heap
page read and write
20B9E800000
heap
page read and write
20B9E831000
heap
page read and write
7FFB4B200000
trusted library allocation
page read and write
20FA6000
heap
page read and write
268F000
direct allocation
page read and write
2107C000
heap
page read and write
61ED4000
direct allocation
page readonly
20BFD2EB000
unkown
page readonly
A449DFE000
stack
page read and write
26AC000
direct allocation
page read and write
2672000
direct allocation
page read and write
41F000
unkown
page readonly
7FFB4AE10000
trusted library allocation
page read and write
20BA0A70000
trusted library allocation
page read and write
B49000
heap
page read and write
7FFB4B030000
trusted library allocation
page read and write
4BE000
stack
page read and write
20B9E944000
heap
page read and write
21060000
heap
page read and write
20B9C623000
heap
page read and write
270DC000
heap
page read and write
20B9C577000
heap
page read and write
270E8000
heap
page read and write
2717B000
heap
page read and write
7FFB4AFC0000
trusted library allocation
page read and write
B6E000
heap
page read and write
20BA0AF0000
trusted library section
page read and write
85A000
unkown
page readonly
20B9A264000
heap
page execute and read and write
AB0000
heap
page read and write
2106E000
heap
page read and write
7FFB4AFD4000
trusted library allocation
page read and write
20B81991000
trusted library allocation
page read and write
A44A1F4000
stack
page read and write
7FFB4B0C6000
trusted library allocation
page read and write
20B9A2F0000
trusted library section
page read and write
7FF4D23C3000
trusted library allocation
page execute read
21055000
heap
page read and write
7FFB4AEB6000
trusted library allocation
page read and write
2842000
heap
page read and write
616000
heap
page read and write
20BFE470000
heap
page read and write
BFA000
heap
page read and write
20B9EAD0000
heap
page read and write
A449CFD000
stack
page read and write
61ECC000
direct allocation
page read and write
349A0000
heap
page read and write
2F60000
heap
page read and write
85A000
unkown
page readonly
3007000
heap
page read and write
7FFB4AFCE000
trusted library allocation
page read and write
20B9ED90000
trusted library section
page readonly
270B0000
heap
page read and write
400000
unkown
page readonly
7FFB4AE13000
trusted library allocation
page read and write
2114D000
heap
page read and write
7FFB4B0F0000
trusted library allocation
page read and write
7FFB4AE1D000
trusted library allocation
page execute and read and write
259B000
direct allocation
page read and write
3023000
heap
page read and write
2837000
heap
page read and write
7FFB4AFE0000
trusted library allocation
page read and write
20B9C528000
heap
page read and write
2823000
heap
page read and write
20F0B000
heap
page read and write
20B9E9AC000
heap
page read and write
C02000
heap
page execute and read and write
1AF90000
trusted library allocation
page read and write
3002000
heap
page read and write
61EB4000
direct allocation
page read and write
401000
unkown
page execute read
41F000
unkown
page readonly
270D6000
heap
page read and write
DEF000
stack
page read and write
210E1000
heap
page read and write
21053000
heap
page read and write
2655000
direct allocation
page read and write
29FE000
stack
page read and write
6E2000
heap
page read and write
2105C000
heap
page read and write
1AE91000
heap
page read and write
20B82140000
trusted library allocation
page read and write
25CE000
direct allocation
page read and write
7FFB4AFCB000
trusted library allocation
page read and write
624000
unkown
page execute and read and write
20B9C633000
heap
page read and write
20B9E80F000
heap
page read and write
435000
unkown
page write copy
7FFB4AE0D000
trusted library allocation
page execute and read and write
279E000
stack
page read and write
BB1000
heap
page read and write
2106B000
heap
page read and write
263F000
direct allocation
page read and write
21059000
heap
page read and write
20B9C4F7000
heap
page read and write
61ED0000
direct allocation
page read and write
7FF4D23DD000
trusted library allocation
page execute read
9E8000
heap
page read and write
B90000
heap
page read and write
BFE000
heap
page read and write
7FF4D23D8000
trusted library allocation
page readonly
B33000
heap
page read and write
20B9A353000
heap
page read and write
20B9ABF0000
trusted library section
page read and write
40C000
unkown
page readonly
2FFD000
heap
page read and write
20BA0B10000
heap
page execute and read and write
535000
heap
page read and write
20BA0AA0000
trusted library allocation
page read and write
20B81850000
trusted library allocation
page read and write
20B9A3D5000
heap
page read and write
20B81BC3000
trusted library allocation
page read and write
20B9A210000
trusted library section
page read and write
2105F000
heap
page read and write
7FFB4AFF2000
trusted library allocation
page read and write
B83000
heap
page read and write
7FFB4B320000
trusted library allocation
page execute and read and write
A449AFA000
stack
page read and write
20BA0AC0000
trusted library allocation
page read and write
7FFB4B316000
trusted library allocation
page read and write
20B81800000
trusted library allocation
page read and write
7FFB4B100000
trusted library allocation
page read and write
7FFB4AE2B000
trusted library allocation
page execute and read and write
950000
heap
page read and write
A44A2FB000
stack
page read and write
20B9A3CB000
heap
page read and write
A4493FF000
stack
page read and write
7FFB4AEBC000
trusted library allocation
page execute and read and write
7FFB4AE20000
trusted library allocation
page read and write
BA2000
heap
page read and write
B76000
heap
page read and write
B89000
heap
page read and write
21056000
heap
page read and write
20B91A0C000
trusted library allocation
page read and write
334D000
stack
page read and write
CEE000
stack
page read and write
20B81ED6000
trusted library allocation
page read and write
270EE000
heap
page read and write
20B9A3F6000
heap
page read and write
26C8000
direct allocation
page read and write
20B9A520000
heap
page read and write
A44A87D000
stack
page read and write
7FFB4AF20000
trusted library allocation
page execute and read and write
20BFE710000
heap
page read and write
7FF4D23DF000
trusted library allocation
page execute read
7FFB4B0D0000
trusted library allocation
page read and write
20B81860000
trusted library section
page read and write
7FFB4B310000
trusted library allocation
page read and write
7FF4D23D4000
trusted library allocation
page readonly
20BFE440000
heap
page read and write
A4497FD000
stack
page read and write
2106B000
heap
page read and write
20B9E815000
heap
page read and write
7FFB4B0C8000
trusted library allocation
page read and write
21055000
heap
page read and write
BB0000
heap
page read and write
25FB000
direct allocation
page read and write
7FFB4AEB0000
trusted library allocation
page read and write
40C000
unkown
page readonly
7FFB4B360000
trusted library allocation
page execute and read and write
B86000
heap
page read and write
783000
unkown
page readonly
6E2000
heap
page read and write
2646000
direct allocation
page read and write
B93000
heap
page read and write
20B9A565000
heap
page read and write
7FF4D23E0000
trusted library allocation
page execute and read and write
20B91991000
trusted library allocation
page read and write
20B91A0F000
trusted library allocation
page read and write
6D440000
unkown
page read and write
21058000
heap
page read and write
A44AA79000
stack
page read and write
20B81CEB000
trusted library allocation
page read and write
A44A4F6000
stack
page read and write
20B9EE42000
trusted library allocation
page read and write
77B000
unkown
page write copy
33360000
trusted library allocation
page read and write
21060000
heap
page read and write
2C7C000
stack
page read and write
2107C000
heap
page read and write
6EC000
heap
page read and write
19D000
stack
page read and write
20B82156000
trusted library allocation
page read and write
2AFF000
stack
page read and write
3008000
heap
page read and write
20B9E700000
trusted library allocation
page read and write
19B000
stack
page read and write
21060000
heap
page read and write
7FFB4B1B0000
trusted library allocation
page read and write
636000
unkown
page execute and read and write
21054000
heap
page read and write
6E692000
unkown
page readonly
20BFE4A6000
heap
page read and write
300F000
heap
page read and write
20B81CE7000
trusted library allocation
page read and write
3010000
heap
page read and write
2604000
direct allocation
page read and write
20B9E8FF000
heap
page read and write
85A000
unkown
page readonly
20B81870000
trusted library section
page read and write
B2F000
stack
page read and write
A3E000
stack
page read and write
20B9C4F0000
heap
page read and write
20BFE650000
heap
page read and write
27F0000
heap
page read and write
259D000
direct allocation
page read and write
A44A67E000
stack
page read and write
7FFB4B340000
trusted library allocation
page read and write
1AD5E000
stack
page read and write
7FFB4AE04000
trusted library allocation
page read and write
608000
heap
page read and write
2FF5000
heap
page read and write
850000
heap
page read and write
7FFB4B020000
trusted library allocation
page read and write
25A4000
direct allocation
page read and write
2FE7000
heap
page read and write
21054000
heap
page read and write
2696000
direct allocation
page read and write
A20000
heap
page read and write
836000
unkown
page readonly
20B99990000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
21072000
heap
page read and write
21055000
heap
page read and write
2107C000
heap
page read and write
B81000
heap
page read and write
B2C000
heap
page read and write
21045000
heap
page read and write
6D261000
unkown
page execute read
D20000
heap
page read and write
459000
unkown
page write copy
32DF000
heap
page read and write
905000
heap
page read and write
7FFB4B190000
trusted library allocation
page read and write
20BA0DB0000
trusted library allocation
page read and write
7FFB4B2E0000
trusted library allocation
page read and write
20B9EA79000
heap
page read and write
20B9C65F000
heap
page read and write
300F000
heap
page read and write
1AE80000
heap
page read and write
20B9C6EC000
heap
page read and write
20B9A3C7000
heap
page read and write
9C000
stack
page read and write
21046000
heap
page read and write
2C6D000
stack
page read and write
21052000
heap
page read and write
271E000
stack
page read and write
BB7000
heap
page read and write
27D0000
heap
page read and write
A7D000
heap
page read and write
7FFB4B00D000
trusted library allocation
page read and write
E3F000
stack
page read and write
20B9E710000
heap
page read and write
7FFB4B090000
trusted library allocation
page read and write
A449EFB000
stack
page read and write
2ECF000
stack
page read and write
75E000
unkown
page write copy
A44A63B000
stack
page read and write
270D0000
heap
page read and write
7FFB4B1C0000
trusted library allocation
page read and write
1AF93000
heap
page read and write
21060000
heap
page read and write
AF0000
heap
page read and write
21054000
heap
page read and write
2104A000
heap
page read and write
459000
unkown
page read and write
BA6000
heap
page read and write
20B81CCC000
trusted library allocation
page read and write
447000
unkown
page execute and read and write
A44AB7E000
stack
page read and write
AE6000
heap
page read and write
48CE000
stack
page read and write
20B81CFA000
trusted library allocation
page read and write
900000
heap
page read and write
21060000
heap
page read and write
300D000
heap
page read and write
20B82123000
trusted library allocation
page read and write
20B8215A000
trusted library allocation
page read and write
270E5000
heap
page read and write
2106A000
heap
page read and write
A07000
heap
page read and write
20B9A230000
trusted library section
page read and write
2D33C000
heap
page read and write
9CF000
stack
page read and write
20B9E6F0000
trusted library allocation
page read and write
7FFB4B177000
trusted library allocation
page read and write
A4496EB000
stack
page read and write
684000
heap
page read and write
33E8A000
heap
page read and write
20B9EAD6000
heap
page read and write
20B9EAFC000
heap
page read and write
20B91A29000
trusted library allocation
page read and write
21057000
heap
page read and write
2107C000
heap
page read and write
25A0000
direct allocation
page read and write
25ED000
direct allocation
page read and write
3002000
heap
page read and write
98A000
heap
page read and write
20BFE480000
heap
page read and write
1AE91000
heap
page read and write
7FFB4B0C0000
trusted library allocation
page read and write
2FF8000
heap
page read and write
20B9EA71000
heap
page read and write
7FFB4B0E0000
trusted library allocation
page read and write
BA9000
heap
page read and write
C4F000
stack
page read and write
7FF4D23C0000
trusted library allocation
page readonly
2107C000
heap
page read and write
2680000
direct allocation
page read and write
20B91A67000
trusted library allocation
page read and write
20B81ED0000
trusted library allocation
page read and write
324C000
stack
page read and write
20B81EEC000
trusted library allocation
page read and write
25C6000
direct allocation
page read and write
20B9EA97000
heap
page read and write
98E000
heap
page read and write
7FFB4AEC0000
trusted library allocation
page execute and read and write
20B9A54A000
heap
page read and write
40C000
unkown
page readonly
B69000
heap
page read and write
21056000
heap
page read and write
49CF000
stack
page read and write
20B9A3F1000
heap
page read and write
401000
unkown
page execute read
A44AD7C000
stack
page read and write
7FF4D23D9000
trusted library allocation
page execute read
21060000
heap
page read and write
2B3E000
stack
page read and write
1F0000
heap
page read and write
2FFA000
heap
page read and write
20B99D11000
heap
page read and write
A44B17E000
stack
page read and write
7FFB4B029000
trusted library allocation
page read and write
25D5000
direct allocation
page read and write
530000
heap
page read and write
B8D000
heap
page read and write
76D000
unkown
page read and write
20B9C59F000
heap
page read and write
20B9E757000
heap
page read and write
25E8000
direct allocation
page read and write
20BFE4E7000
heap
page read and write
698000
heap
page read and write
2D28F000
stack
page read and write
7FFB4B2D0000
trusted library allocation
page read and write
20B9C658000
heap
page read and write
778000
unkown
page read and write
3011000
heap
page read and write
7FFB4AE00000
trusted library allocation
page read and write
7FFB4B300000
trusted library allocation
page read and write
BAD000
heap
page read and write
2FFF000
heap
page read and write
2107C000
heap
page read and write
21040000
heap
page read and write
813000
unkown
page readonly
2FFE000
heap
page read and write
275E000
stack
page read and write
20BFAAB0000
unkown
page readonly
20B9EA6E000
heap
page read and write
20B9C61B000
heap
page read and write
CAE000
stack
page read and write
21060000
heap
page read and write
20B9EAF0000
heap
page read and write
20B9C53B000
heap
page read and write
20B9E9D2000
heap
page read and write
20B9E880000
heap
page read and write
7FF4D23D7000
trusted library allocation
page execute read
2105A000
heap
page read and write
7FFB4B11A000
trusted library allocation
page read and write
277E000
stack
page read and write
7FF4D23D1000
trusted library allocation
page execute read
20B81D10000
trusted library allocation
page read and write
2FFF000
heap
page read and write
2688000
direct allocation
page read and write
87E000
unkown
page readonly
41F000
unkown
page readonly
20B9C582000
heap
page read and write
20BFE489000
heap
page read and write
20B9A3DE000
heap
page read and write
6EC000
heap
page read and write
20B9E8A5000
heap
page read and write
21060000
heap
page read and write
B40000
heap
page read and write
BF0000
heap
page read and write
9DE000
stack
page read and write
6E68E000
unkown
page read and write
766000
unkown
page read and write
B64000
heap
page read and write
7FFB4B1D7000
trusted library allocation
page read and write
20B9E8AD000
heap
page read and write
6D43E000
unkown
page read and write
20B9EA4C000
heap
page read and write
AF8000
heap
page read and write
25DD000
direct allocation
page read and write
B51000
heap
page read and write
870000
heap
page read and write
6EC000
heap
page read and write
2D32E000
heap
page read and write
20B9E81B000
heap
page read and write
7FFB4AFA2000
trusted library allocation
page read and write
6E2000
heap
page read and write
2622000
direct allocation
page read and write
2D336000
heap
page read and write
4C0000
heap
page read and write
A44A97D000
stack
page read and write
2FF9000
heap
page read and write
3015000
heap
page read and write
A3B000
heap
page read and write
20B9A8F0000
trusted library section
page read and write
20BFBEEB000
unkown
page readonly
20B81980000
heap
page execute and read and write
7FFB4AFB0000
trusted library allocation
page read and write
20B9C521000
heap
page read and write
2106C000
heap
page read and write
20B9A40B000
heap
page read and write
9D0000
heap
page read and write
AB6000
heap
page read and write
7FF4D23DE000
trusted library allocation
page readonly
32BE000
heap
page read and write
3019000
heap
page read and write
20B9C64A000
heap
page read and write
25D0000
heap
page read and write
20BFE430000
heap
page read and write
2107C000
heap
page read and write
20B9AC00000
trusted library allocation
page read and write
20B9E93C000
heap
page read and write
20B9C57C000
heap
page read and write
7FFB4AE24000
trusted library allocation
page read and write
20B9A45C000
heap
page read and write
7FFB4B0B0000
trusted library allocation
page read and write
1A9AF000
stack
page read and write
4D10000
trusted library allocation
page read and write
774000
unkown
page read and write
20B9A552000
heap
page read and write
20B9A2B0000
trusted library section
page read and write
20B9E7D8000
heap
page read and write
26B3000
direct allocation
page read and write
C50000
heap
page read and write
7FFB4B156000
trusted library allocation
page read and write
B4E000
heap
page read and write
20B817D0000
trusted library allocation
page read and write
2CEE000
stack
page read and write
AEC000
heap
page read and write
20BA0AD0000
trusted library allocation
page read and write
20B81E5A000
trusted library allocation
page read and write
A44A777000
stack
page read and write
20B9A350000
heap
page read and write
7FFB4B110000
trusted library allocation
page read and write
D2B000
heap
page read and write
20B9E7FA000
heap
page read and write
7FFB4B2B0000
trusted library allocation
page execute and read and write
20B9EAE6000
heap
page read and write
633000
heap
page read and write
2105C000
heap
page read and write
2EF3000
heap
page read and write
B5B000
heap
page read and write
20B9A387000
heap
page read and write
7FFB4B380000
trusted library allocation
page read and write
7FFB4AE03000
trusted library allocation
page execute and read and write
99E000
stack
page read and write
7FFB4B0D8000
trusted library allocation
page read and write
AB0000
direct allocation
page execute and read and write
20B9A3B6000
heap
page read and write
836000
unkown
page readonly
5510000
heap
page read and write
20B9E835000
heap
page read and write
2590000
direct allocation
page read and write
300F000
heap
page read and write
20BFAAB0000
unkown
page readonly
21060000
heap
page read and write
6B5000
heap
page read and write
2E00000
heap
page read and write
27173000
heap
page read and write
2105A000
heap
page read and write
7FFB4AEE6000
trusted library allocation
page execute and read and write
20B9C517000
heap
page read and write
20B9E941000
heap
page read and write
20BA0A80000
trusted library allocation
page read and write
20B9EA37000
heap
page read and write
20B9A510000
heap
page read and write
20B9C560000
heap
page read and write
20B9C647000
heap
page read and write
300D000
heap
page read and write
7FFB4B2C0000
trusted library allocation
page read and write
992000
heap
page execute and read and write
B56000
heap
page read and write
76A000
unkown
page read and write
20B9C4F9000
heap
page read and write
20B9A460000
trusted library section
page read and write
7FFB4B010000
trusted library allocation
page read and write
20B9C557000
heap
page read and write
8DE000
stack
page read and write
7FFB4B082000
trusted library allocation
page read and write
1AE5E000
stack
page read and write
400000
remote allocation
page execute and read and write
21048000
heap
page read and write
20B999C0000
trusted library allocation
page read and write
7FFB4B188000
trusted library allocation
page read and write
21060000
heap
page read and write
61ECD000
direct allocation
page readonly
A449FFB000
stack
page read and write
192000
stack
page read and write
2800000
heap
page read and write
1ACED000
stack
page read and write
9B000
stack
page read and write
20B9C51D000
heap
page read and write
B7A000
heap
page read and write
2D328000
heap
page read and write
41C000
unkown
page execute read
7FF4D23D2000
trusted library allocation
page readonly
A60000
heap
page read and write
2D330000
heap
page read and write
4C5F000
stack
page read and write
300C000
heap
page read and write
7FFB4B1E0000
trusted library allocation
page read and write
A73000
heap
page read and write
7FFB4B016000
trusted library allocation
page read and write
9CE000
stack
page read and write
21075000
heap
page read and write
21066000
heap
page read and write
2D7C000
stack
page read and write
A4498FE000
stack
page read and write
20B9A870000
trusted library section
page read and write
270D4000
heap
page read and write
210E2000
heap
page read and write
417000
unkown
page execute read
2DEF000
stack
page read and write
194000
stack
page read and write
51E000
stack
page read and write
907000
heap
page read and write
2710000
heap
page read and write
761000
unkown
page read and write
300F000
heap
page read and write
21053000
heap
page read and write
A44A0F1000
stack
page read and write
B40000
heap
page read and write
20BFE4BD000
heap
page read and write
20B919AC000
trusted library allocation
page read and write
20B9E980000
heap
page read and write
A5B000
heap
page read and write
266B000
direct allocation
page read and write
540000
heap
page read and write
20B9E837000
heap
page read and write
20B9A1D0000
trusted library section
page read and write
260C000
direct allocation
page read and write
7FFB4B2A0000
trusted library allocation
page read and write
7FFB4B000000
trusted library allocation
page read and write
400000
unkown
page readonly
7FFB4B370000
trusted library allocation
page read and write
76F000
unkown
page read and write
9B000
stack
page read and write
265C000
direct allocation
page read and write
20B9A360000
heap
page read and write
4B0F000
stack
page read and write
7FFB4B060000
trusted library allocation
page read and write
600000
heap
page read and write
B85000
heap
page read and write
264E000
direct allocation
page read and write
26BA000
direct allocation
page read and write
20BFE4E9000
heap
page read and write
26A4000
direct allocation
page read and write
A449BFD000
stack
page read and write
20B8212C000
trusted library allocation
page read and write
459000
unkown
page write copy
7FFB4AE5C000
trusted library allocation
page execute and read and write
20BFE715000
heap
page read and write
2106B000
heap
page read and write
6E601000
unkown
page execute read
7FFB4B350000
trusted library allocation
page execute and read and write
26C1000
direct allocation
page read and write
400000
unkown
page readonly
3449C000
heap
page read and write
B42000
heap
page read and write
20BFB4EB000
unkown
page readonly
20B9EAB8000
heap
page read and write
1A8AF000
stack
page read and write
2820000
heap
page read and write
26DF000
stack
page read and write
7FFB4B220000
trusted library allocation
page execute and read and write
B40000
heap
page read and write
7FF4D23D3000
trusted library allocation
page execute read
20B9C50E000
heap
page read and write
9F5000
heap
page read and write
1ABEE000
stack
page read and write
20B9C626000
heap
page read and write
2679000
direct allocation
page read and write
33420000
heap
page read and write
25BC000
direct allocation
page read and write
21058000
heap
page read and write
20B9EAB4000
heap
page read and write
B2F000
heap
page read and write
20B9E805000
heap
page read and write
B3D000
heap
page read and write
907000
heap
page read and write
CEE000
stack
page read and write
20B9E899000
heap
page read and write
21060000
heap
page read and write
20B9A260000
heap
page execute and read and write
1AE90000
heap
page read and write
8B0000
heap
page read and write
21054000
heap
page read and write
7FFB4B040000
trusted library allocation
page read and write
20B81880000
heap
page read and write
300B000
heap
page read and write
20B9A532000
heap
page read and write
25BF000
direct allocation
page read and write
A44AE61000
stack
page read and write
21060000
heap
page read and write
20BFE475000
heap
page read and write
20BA0A90000
trusted library allocation
page read and write
1AAAF000
stack
page read and write
20B9C4F4000
heap
page read and write
25F4000
direct allocation
page read and write
2FF7000
heap
page read and write
A8E000
stack
page read and write
20B9C507000
heap
page read and write
41F000
unkown
page readonly
269D000
direct allocation
page read and write
A44A3F8000
stack
page read and write
20B9E83D000
heap
page read and write
D30000
heap
page read and write
400000
unkown
page readonly
B9E000
heap
page read and write
20B9A220000
trusted library section
page read and write
20B9E7E1000
heap
page read and write
6EC000
heap
page read and write
21060000
heap
page read and write
2105D000
heap
page read and write
AA0000
heap
page read and write
270D2000
heap
page read and write
A4499FE000
stack
page read and write
20B9A3FF000
heap
page read and write
DEF000
stack
page read and write
B47000
heap
page read and write
2631000
direct allocation
page read and write
7FF4D23D5000
trusted library allocation
page execute read
20B9A240000
heap
page read and write
8CF000
stack
page read and write
20BA0AB0000
trusted library allocation
page read and write
B55000
heap
page read and write
61E00000
direct allocation
page execute and read and write
25A6000
direct allocation
page read and write
BB1000
heap
page read and write
7FFB4B210000
trusted library allocation
page read and write
20B817F0000
trusted library allocation
page read and write
7FFB4AFB2000
trusted library allocation
page read and write
20B9A40F000
heap
page read and write
7FF4D23DC000
trusted library allocation
page readonly
21053000
heap
page read and write
3002000
heap
page read and write
27111000
heap
page read and write
401000
unkown
page execute read
A44A53E000
stack
page read and write
27131000
heap
page read and write
20B9E882000
heap
page read and write
19B000
stack
page read and write
25E4000
direct allocation
page read and write
7FFB4B070000
trusted library allocation
page read and write
21066000
heap
page read and write
B66000
heap
page read and write
20B81CD9000
trusted library allocation
page read and write
20BFE360000
unkown
page readonly
6E67D000
unkown
page readonly
There are 753 hidden memdumps, click here to show them.