IOC Report
XAcuSo8KDa.exe

loading gif

Files

File Path
Type
Category
Malicious
XAcuSo8KDa.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u4b4.0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u4b4.2\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u4b4.2\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u4b4.2\run.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u4b4.3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AKJDAEGC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\BAEHIEBGHDAFIEBGIEHJECGCGC
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\BKJEHCAKFBGDGCAAAFBG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\Canon_Inc_IC\UniversalInstaller\ServiceLog\CANON_UIX_SERVICELOG_20240423075716.TXT
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\DUUDTUBZFW.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\DUUDTUBZFW.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\GAOBCVIQIJ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\GHCAKKEG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GHJDGDBFCBKFHJKFHCBKKFIIDG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HMPPSXQPQV.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\IPKGELNTQY.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\JDAEHJJECAEGCAAAAEGIEBKEBK
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JEBKEHJJDAAAAKECBGHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KFCFBAAEHCFHJJKEHJKJDHJDGI
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\LSBIHQFDVT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\LSBIHQFDVT.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_XAcuSo8KDa.exe_d487d41808dfbb8f7badac695c3a12723fefaf_e4761738_ae048907-65bd-4705-ad1c-ac2818c45c6e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_u4b4.0.exe_f237c521b3ea58714db0c7921a2a6be2e19035e_2c1633d9_c6c4b2e0-6f53-460e-aa0d-80d4fa259581\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6C6E.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Apr 23 05:57:20 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6DC7.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6E06.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB9E2.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Apr 23 05:57:40 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBA9F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBAFD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\NEBFQQYWPS.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\NEBFQQYWPS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\PIVFAGEAAV.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\iolo technologies\logs\bootstrap.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\iolo\logs\WSComm.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\37b9fd302130fbc410584906fdfe42ca0b0153ded0384b9e9647b0fa7d1105f7\3f443474596b43deb65db02a4ad8d5ad.tmp
ASCII text, with very long lines (508), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\37b9fd302130fbc410584906fdfe42ca0b0153ded0384b9e9647b0fa7d1105f7\3f443474596b43deb65db02a4ad8d5ad.trn (copy)
ASCII text, with very long lines (508), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\37b9fd302130fbc410584906fdfe42ca0b0153ded0384b9e9647b0fa7d1105f7\c0abef3aa0254e6e8ba5a00f43f860e3.tmp
ASCII text, with very long lines (508), with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\37b9fd302130fbc410584906fdfe42ca0b0153ded0384b9e9647b0fa7d1105f7\c0abef3aa0254e6e8ba5a00f43f860e3.trn (copy)
ASCII text, with very long lines (508), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\37b9fd302130fbc410584906fdfe42ca0b0153ded0384b9e9647b0fa7d1105f7\ga0osbqm.1he
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\iolo\dm\ioloDMLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\u4b4.1
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\u4b4.2\groupware.wav
data
dropped
C:\Users\user\AppData\Local\Temp\u4b4.2\macrospore.indd
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 49 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\XAcuSo8KDa.exe
"C:\Users\user\Desktop\XAcuSo8KDa.exe"
malicious
C:\Users\user\AppData\Local\Temp\u4b4.0.exe
"C:\Users\user\AppData\Local\Temp\u4b4.0.exe"
malicious
C:\Users\user\AppData\Local\Temp\u4b4.3.exe
"C:\Users\user\AppData\Local\Temp\u4b4.3.exe"
malicious
C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
"C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
malicious
C:\Users\user\AppData\Local\Temp\u4b4.2\run.exe
"C:\Users\user\AppData\Local\Temp\u4b4.2\run.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5584 -s 1616
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5344 -s 2080

URLs

Name
IP
Malicious
http://185.1
unknown
malicious
185.172.128.76/3cd2b41cbde8fc9c.php
malicious
http://185.172.128.76/3cd2b41cbde8fc9c.php
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/sqlite3.dll
185.172.128.76
malicious
http://185.172.128.76/3cd2b41cbd
unknown
malicious
http://185.172.128.76/15f649199f40275b/softokn3.dll
185.172.128.76
malicious
http://185.172.128.7
unknown
malicious
http://185.172.128.76
unknown
malicious
http://185.172.128.76/
unknown
malicious
http://185.172.128.76/15f649199f40275b/nss3.dll
185.172.128.76
malicious
http://185.172.128.90/cpa/ping.php?substr=five&s=ab&sub=0
185.172.128.90
malicious
http://185.172.128.76/15f649199f40275b/mozglue.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/msvcp140.dll
185.172.128.76
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://monitor.azure.com//.default
unknown
https://snapshot.monitor.azure.com/&
unknown
http://185.172.128.228/BroomSetup.exe
185.172.128.228
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx.
unknown
https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
unknown
https://www.iolo.com/company/legal/sales-policy/
unknown
http://www.indyproject.org/
unknown
https://support.iolo.com/support/solutions/articles/44001781185?
unknown
https://www.iolo.com/company/legal/privacy/?
unknown
http://www.codeplex.com/CompositeWPF
unknown
https://support.iolo.com/support/solutions/articles/44001781185
unknown
https://scripts.sil.org/OFL
unknown
https://taskscheduler.codeplex.com/H
unknown
http://185.1;T
unknown
https://www.iolo.com/company/legal/sales-policy/?
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php8$Qk
unknown
https://scripts.sil.org/OFLX8
unknown
https://westus2-2.in.applicationinsights.azure.com
unknown
http://185.172.128.76/15f649199f40275b/mozglue.dllG
unknown
https://webhooklistenersfunc.azurewebsites.net/api/lookup/constella-dark-web-alerts
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.46
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://indiantypefoundry.com
unknown
https://download.avira.com/download/
unknown
http://www.codeplex.com/prism#Microsoft.Practices.Prism.ViewModel
unknown
http://dejavu.sourceforge.net
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://www.iolo.com/company/legal/privacy/
unknown
https://mozilla.org0/
unknown
http://185.172.128.76/ents
unknown
http://download.iolo.net/ds/4/en/images/dsUSB.imaRealDefense
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://185.172.128.76/15f649199f40275b/mozglue.dlli
unknown
https://rt.services.visualstudio.com/l
unknown
http://gdlp01.c-wss.com/rmds/ic/universalinstaller/common/checkconnection
unknown
https://dc.services.visualstudio.com/
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://dejavu.sourceforge.nethttp://dejavu.sourceforge.netFonts
unknown
https://iolo.comH42652B74-0AD8-4B60-B8FD-69ED38F7666B
unknown
https://dc.services.visualstudio.com/f
unknown
https://profiler.monitor.azure.com/
unknown
http://185.172.128.59/syncUpd.exe
185.172.128.59
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://www.newtonsoft.com/jsonschema
unknown
http://185.172.128.76/3cd2b41cbduB
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe
unknown
http://185.172.128.76/15f649199f40275b/nss3.dllY
unknown
https://westus2-2.in.applicationinsights.azure.com/
unknown
https://www.iolo.com/company/legal/eula/?
unknown
http://dejavu.sourceforge.net/wiki/index.php/License
unknown
https://scripts.sil.org/OFLThis
unknown
https://github.com/itfoundry/Poppins)&&&&z
unknown
https://github.com/itfoundry/Poppins)
unknown
https://snapshot.monitor.azure.com/
unknown
http://westus2-2.in.applicationinsights.azure.com
unknown
https://github.com/itfoundry/Poppins)&&&&v
unknown
http://ocsp.sectigo.com0
unknown
https://www.iolo.com/company/legal/eula/
unknown
https://www.newtonsoft.com/json
unknown
https://westus2-2.in.applicationinsights.azure.com/v2/track
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://google.com
unknown
http://185.172.128.76/15f649199f40275b/softokn3.dllU
unknown
https://dc.services.visualstudio.com/v2/track
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php9
unknown
http://www.codeplex.com/prism
unknown
https://taskscheduler.codeplex.com/
unknown
http://185.172.128.76/15f649199f40275b/softokn3.dllM
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://westus2-2.in.applicationinsights.azure.com/;LiveEndpoint=https://westus2.livediagnostics.mon
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpf
unknown
http://compositewpf.codeplex.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.172.128.76/3cd2b4zC
unknown
https://sectigo.com/CPS0D
unknown
https://dc.services.visualstudio.com/Jhttps://rt.services.visualstudio.com/Fhttps://profiler.monitor
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpP
unknown
http://dejavu.sourceforge.net/wiki/index.php/Licensehttp://dejavu.sourceforge.net/wiki/index.php/Lic
unknown
https://rt.services.visualstudio.com/
unknown
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx
20.157.87.45
http://www.sqlite.org/copyright.html.
unknown
https://github.com/JamesNK/Newtonsoft.Json
unknown
http://185.172.128.76c
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
note.padd.cn.com
176.97.76.106
svc.iolo.com
20.157.87.45
westus2-2.in.applicationinsights.azure.com
unknown

IPs

IP
Domain
Country
Malicious
185.172.128.90
unknown
Russian Federation
malicious
185.172.128.76
unknown
Russian Federation
malicious
185.172.128.228
unknown
Russian Federation
20.157.87.45
svc.iolo.com
United States
176.97.76.106
note.padd.cn.com
United Kingdom
185.172.128.59
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\BroomCleaner
Installed
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
MaxSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
Retention
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\ActiveCare
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\ActiveCare
TypesSupported
\REGISTRY\A\{70329310-11ae-b888-9119-7b244c8a0987}\Root\InventoryApplicationFile\xacuso8kda.exe|91cfa50427b1dc5d
ProgramId
\REGISTRY\A\{70329310-11ae-b888-9119-7b244c8a0987}\Root\InventoryApplicationFile\xacuso8kda.exe|91cfa50427b1dc5d
FileId
\REGISTRY\A\{70329310-11ae-b888-9119-7b244c8a0987}\Root\InventoryApplicationFile\xacuso8kda.exe|91cfa50427b1dc5d
LowerCaseLongPath
\REGISTRY\A\{70329310-11ae-b888-9119-7b244c8a0987}\Root\InventoryApplicationFile\xacuso8kda.exe|91cfa50427b1dc5d
LongPathHash
\REGISTRY\A\{70329310-11ae-b888-9119-7b244c8a0987}\Root\InventoryApplicationFile\xacuso8kda.exe|91cfa50427b1dc5d
Name
\REGISTRY\A\{70329310-11ae-b888-9119-7b244c8a0987}\Root\InventoryApplicationFile\xacuso8kda.exe|91cfa50427b1dc5d
OriginalFileName
\REGISTRY\A\{70329310-11ae-b888-9119-7b244c8a0987}\Root\InventoryApplicationFile\xacuso8kda.exe|91cfa50427b1dc5d
Publisher
\REGISTRY\A\{70329310-11ae-b888-9119-7b244c8a0987}\Root\InventoryApplicationFile\xacuso8kda.exe|91cfa50427b1dc5d
Version
\REGISTRY\A\{70329310-11ae-b888-9119-7b244c8a0987}\Root\InventoryApplicationFile\xacuso8kda.exe|91cfa50427b1dc5d
BinFileVersion
\REGISTRY\A\{70329310-11ae-b888-9119-7b244c8a0987}\Root\InventoryApplicationFile\xacuso8kda.exe|91cfa50427b1dc5d
BinaryType
\REGISTRY\A\{70329310-11ae-b888-9119-7b244c8a0987}\Root\InventoryApplicationFile\xacuso8kda.exe|91cfa50427b1dc5d
ProductName
\REGISTRY\A\{70329310-11ae-b888-9119-7b244c8a0987}\Root\InventoryApplicationFile\xacuso8kda.exe|91cfa50427b1dc5d
ProductVersion
\REGISTRY\A\{70329310-11ae-b888-9119-7b244c8a0987}\Root\InventoryApplicationFile\xacuso8kda.exe|91cfa50427b1dc5d
LinkDate
\REGISTRY\A\{70329310-11ae-b888-9119-7b244c8a0987}\Root\InventoryApplicationFile\xacuso8kda.exe|91cfa50427b1dc5d
BinProductVersion
\REGISTRY\A\{70329310-11ae-b888-9119-7b244c8a0987}\Root\InventoryApplicationFile\xacuso8kda.exe|91cfa50427b1dc5d
AppxPackageFullName
\REGISTRY\A\{70329310-11ae-b888-9119-7b244c8a0987}\Root\InventoryApplicationFile\xacuso8kda.exe|91cfa50427b1dc5d
AppxPackageRelativeId
\REGISTRY\A\{70329310-11ae-b888-9119-7b244c8a0987}\Root\InventoryApplicationFile\xacuso8kda.exe|91cfa50427b1dc5d
Size
\REGISTRY\A\{70329310-11ae-b888-9119-7b244c8a0987}\Root\InventoryApplicationFile\xacuso8kda.exe|91cfa50427b1dc5d
Language
\REGISTRY\A\{70329310-11ae-b888-9119-7b244c8a0987}\Root\InventoryApplicationFile\xacuso8kda.exe|91cfa50427b1dc5d
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileDirectory
\REGISTRY\A\{b523dd6b-37cc-7209-75a2-df60fc21f17f}\Root\InventoryApplicationFile\u4b4.0.exe|9d24c63d3a5eda39
ProgramId
\REGISTRY\A\{b523dd6b-37cc-7209-75a2-df60fc21f17f}\Root\InventoryApplicationFile\u4b4.0.exe|9d24c63d3a5eda39
FileId
\REGISTRY\A\{b523dd6b-37cc-7209-75a2-df60fc21f17f}\Root\InventoryApplicationFile\u4b4.0.exe|9d24c63d3a5eda39
LowerCaseLongPath
\REGISTRY\A\{b523dd6b-37cc-7209-75a2-df60fc21f17f}\Root\InventoryApplicationFile\u4b4.0.exe|9d24c63d3a5eda39
LongPathHash
\REGISTRY\A\{b523dd6b-37cc-7209-75a2-df60fc21f17f}\Root\InventoryApplicationFile\u4b4.0.exe|9d24c63d3a5eda39
Name
\REGISTRY\A\{b523dd6b-37cc-7209-75a2-df60fc21f17f}\Root\InventoryApplicationFile\u4b4.0.exe|9d24c63d3a5eda39
OriginalFileName
\REGISTRY\A\{b523dd6b-37cc-7209-75a2-df60fc21f17f}\Root\InventoryApplicationFile\u4b4.0.exe|9d24c63d3a5eda39
Publisher
\REGISTRY\A\{b523dd6b-37cc-7209-75a2-df60fc21f17f}\Root\InventoryApplicationFile\u4b4.0.exe|9d24c63d3a5eda39
Version
\REGISTRY\A\{b523dd6b-37cc-7209-75a2-df60fc21f17f}\Root\InventoryApplicationFile\u4b4.0.exe|9d24c63d3a5eda39
BinFileVersion
\REGISTRY\A\{b523dd6b-37cc-7209-75a2-df60fc21f17f}\Root\InventoryApplicationFile\u4b4.0.exe|9d24c63d3a5eda39
BinaryType
\REGISTRY\A\{b523dd6b-37cc-7209-75a2-df60fc21f17f}\Root\InventoryApplicationFile\u4b4.0.exe|9d24c63d3a5eda39
ProductName
\REGISTRY\A\{b523dd6b-37cc-7209-75a2-df60fc21f17f}\Root\InventoryApplicationFile\u4b4.0.exe|9d24c63d3a5eda39
ProductVersion
\REGISTRY\A\{b523dd6b-37cc-7209-75a2-df60fc21f17f}\Root\InventoryApplicationFile\u4b4.0.exe|9d24c63d3a5eda39
LinkDate
\REGISTRY\A\{b523dd6b-37cc-7209-75a2-df60fc21f17f}\Root\InventoryApplicationFile\u4b4.0.exe|9d24c63d3a5eda39
BinProductVersion
\REGISTRY\A\{b523dd6b-37cc-7209-75a2-df60fc21f17f}\Root\InventoryApplicationFile\u4b4.0.exe|9d24c63d3a5eda39
AppxPackageFullName
\REGISTRY\A\{b523dd6b-37cc-7209-75a2-df60fc21f17f}\Root\InventoryApplicationFile\u4b4.0.exe|9d24c63d3a5eda39
AppxPackageRelativeId
\REGISTRY\A\{b523dd6b-37cc-7209-75a2-df60fc21f17f}\Root\InventoryApplicationFile\u4b4.0.exe|9d24c63d3a5eda39
Size
\REGISTRY\A\{b523dd6b-37cc-7209-75a2-df60fc21f17f}\Root\InventoryApplicationFile\u4b4.0.exe|9d24c63d3a5eda39
Language
\REGISTRY\A\{b523dd6b-37cc-7209-75a2-df60fc21f17f}\Root\InventoryApplicationFile\u4b4.0.exe|9d24c63d3a5eda39
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 57 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1B8EFFB0000
trusted library section
page read and write
malicious
42D2000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
43E0000
direct allocation
page execute and read and write
malicious
5CE0000
direct allocation
page read and write
malicious
1B8F02D0000
trusted library section
page read and write
malicious
1B8EA18B000
unkown
page readonly
malicious
1B8ED38B000
unkown
page readonly
malicious
1B8EA150000
unkown
page readonly
43EE000
heap
page read and write
42AE000
heap
page read and write
CD5C7E000
stack
page read and write
2C7D000
stack
page read and write
1B8F0A40000
trusted library allocation
page read and write
7FFD34590000
trusted library allocation
page read and write
1B8F42B1000
heap
page read and write
CD3F7B000
stack
page read and write
2540000
heap
page read and write
196000
stack
page read and write
24865000
heap
page read and write
3117000
heap
page read and write
7FF494411000
trusted library allocation
page execute read
26B6000
direct allocation
page read and write
24856000
heap
page read and write
61E00000
direct allocation
page execute and read and write
24869000
heap
page read and write
25AC000
heap
page read and write
7FFD342C0000
trusted library allocation
page read and write
193000
stack
page read and write
24850000
heap
page read and write
7FF494417000
trusted library allocation
page execute read
24850000
heap
page read and write
A9F000
heap
page read and write
3060000
heap
page read and write
7FFD347D0000
trusted library allocation
page execute and read and write
2A8E2000
heap
page read and write
1B8EDAD0000
heap
page read and write
5D5E000
stack
page read and write
1B8F486F000
heap
page read and write
13DE000
stack
page read and write
24850000
heap
page read and write
1B8EDD70000
trusted library allocation
page read and write
2C05000
heap
page read and write
2A8E0000
heap
page read and write
8BC000
unkown
page readonly
25F5000
direct allocation
page read and write
401000
unkown
page execute read
1B880650000
trusted library allocation
page read and write
75E000
unkown
page read and write
1B8F478C000
heap
page read and write
7FFD34660000
trusted library allocation
page read and write
41F0000
heap
page read and write
1B8F68C0000
heap
page execute and read and write
711000
unkown
page execute read
2486D000
heap
page read and write
1B8F44B0000
trusted library allocation
page read and write
1B8EF790000
trusted library section
page read and write
A91000
heap
page read and write
1B880438000
trusted library allocation
page read and write
F10000
heap
page read and write
920000
unkown
page write copy
7FFD34510000
trusted library allocation
page read and write
2A8E6000
heap
page read and write
2C93000
heap
page read and write
26BD000
direct allocation
page read and write
1B8F439A000
heap
page read and write
448000
unkown
page execute and read and write
309DC000
heap
page read and write
1B8F0110000
trusted library section
page read and write
311F000
heap
page read and write
7FFD34670000
trusted library allocation
page read and write
2A921000
heap
page read and write
7FFD34535000
trusted library allocation
page read and write
7FFD34520000
trusted library allocation
page read and write
4210000
heap
page read and write
5CDF000
stack
page read and write
417000
unkown
page execute read
30F7000
heap
page read and write
933000
unkown
page readonly
1B8EFFE0000
heap
page read and write
1B8EDDE0000
heap
page execute and read and write
7FFD34578000
trusted library allocation
page read and write
24839000
heap
page read and write
268B000
direct allocation
page read and write
262C000
direct allocation
page read and write
7043000
heap
page read and write
7FFD343D0000
trusted library allocation
page execute and read and write
111B000
heap
page read and write
1B8F4583000
heap
page read and write
1B8F0D50000
trusted library section
page read and write
7FFD342B3000
trusted library allocation
page execute and read and write
7FFD344A2000
trusted library allocation
page read and write
CD42FA000
stack
page read and write
AA3000
heap
page read and write
6D190000
unkown
page readonly
774000
unkown
page read and write
25D3000
direct allocation
page read and write
311F000
heap
page read and write
2484C000
heap
page read and write
CD4EFD000
stack
page read and write
112F000
heap
page read and write
248CF000
heap
page read and write
41C000
unkown
page execute read
37AE7000
heap
page read and write
CD44FE000
stack
page read and write
24843000
heap
page read and write
6B99000
heap
page read and write
7FF494420000
trusted library allocation
page execute and read and write
CD567D000
stack
page read and write
7FFD345B0000
trusted library allocation
page read and write
1B8F7C28000
heap
page read and write
36B40000
heap
page read and write
2642000
direct allocation
page read and write
EFB000
stack
page read and write
7FFD34770000
trusted library allocation
page read and write
4021000
unkown
page read and write
1E7C1000
heap
page read and write
44B000
unkown
page execute and read and write
7FFD342DB000
trusted library allocation
page execute and read and write
920000
unkown
page read and write
1140000
heap
page read and write
68EE000
stack
page read and write
7FFD342C3000
trusted library allocation
page read and write
7FFD3430C000
trusted library allocation
page execute and read and write
19D000
stack
page read and write
1B8F4504000
heap
page read and write
4D5F000
stack
page read and write
24862000
heap
page read and write
7FFD344C6000
trusted library allocation
page read and write
4200000
heap
page read and write
61E01000
direct allocation
page execute read
61ED3000
direct allocation
page read and write
1B8F7BF3000
heap
page read and write
19B000
stack
page read and write
24845000
heap
page read and write
7FFD3453C000
trusted library allocation
page read and write
761000
unkown
page read and write
1B8EDE10000
heap
page execute and read and write
1B8F0A60000
trusted library allocation
page read and write
7FFD342D0000
trusted library allocation
page read and write
1B8F0219000
heap
page read and write
65BE000
stack
page read and write
1B8F46C3000
heap
page read and write
7FFD344E0000
trusted library allocation
page read and write
192000
stack
page read and write
2486D000
heap
page read and write
2486D000
heap
page read and write
2486D000
heap
page read and write
CD4CF4000
stack
page read and write
1B8F00BD000
heap
page read and write
1B8F4587000
heap
page read and write
61ECD000
direct allocation
page readonly
1B8F4676000
heap
page read and write
2484C000
heap
page read and write
41C000
unkown
page write copy
A9A000
heap
page read and write
19B000
stack
page read and write
3107000
heap
page read and write
A42000
heap
page read and write
710000
unkown
page readonly
2484A000
heap
page read and write
1B8EF64A000
heap
page read and write
1DFEF000
stack
page read and write
24845000
heap
page read and write
7053000
heap
page read and write
778000
unkown
page read and write
26E1000
direct allocation
page read and write
2C00000
heap
page read and write
7FFD346B0000
trusted library allocation
page read and write
4ACF000
stack
page read and write
1B8F4709000
heap
page read and write
1B8EFF80000
heap
page read and write
CD577E000
stack
page read and write
7FFD345C0000
trusted library allocation
page read and write
1B88035A000
trusted library allocation
page read and write
1B8EF7A0000
heap
page read and write
430A000
heap
page read and write
A87000
heap
page read and write
A51000
heap
page read and write
1B8F00C3000
heap
page read and write
7057000
heap
page read and write
24844000
heap
page read and write
4439000
heap
page read and write
404A000
unkown
page readonly
10B5000
heap
page read and write
61ED0000
direct allocation
page read and write
1B8F4872000
heap
page read and write
67AE000
stack
page read and write
7FFD34830000
trusted library allocation
page read and write
1B8EBF8B000
unkown
page readonly
7FFD34490000
trusted library allocation
page read and write
3117000
heap
page read and write
2A8A0000
heap
page read and write
1B8F44A0000
trusted library allocation
page read and write
24843000
heap
page read and write
2649000
direct allocation
page read and write
AB8000
heap
page read and write
5D81000
heap
page read and write
1B8F00C5000
heap
page read and write
25B9000
direct allocation
page read and write
40B5000
heap
page read and write
5D9A000
heap
page read and write
24869000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
310E000
heap
page read and write
1B8F4BF2000
trusted library allocation
page read and write
1B8F01FC000
heap
page read and write
1B8F477B000
heap
page read and write
AB1000
heap
page read and write
24850000
heap
page read and write
25C0000
direct allocation
page read and write
1B8EA152000
unkown
page readonly
416000
unkown
page write copy
783000
unkown
page readonly
7FFD345A0000
trusted library allocation
page read and write
2B7C000
stack
page read and write
2500000
heap
page read and write
24850000
heap
page read and write
549000
unkown
page execute and read and write
7FFD344D0000
trusted library allocation
page read and write
1B8EFFE3000
heap
page read and write
2483C000
heap
page read and write
1B8F7BEC000
heap
page read and write
6D231000
unkown
page execute read
1B8F4667000
heap
page read and write
419E000
stack
page read and write
6D191000
unkown
page execute read
7FFD34550000
trusted library allocation
page execute and read and write
1B8EB58B000
unkown
page readonly
1B8F42A0000
heap
page read and write
1B8F462A000
heap
page read and write
1B8F47B3000
heap
page read and write
7FFD34650000
trusted library allocation
page read and write
1B8F478A000
heap
page read and write
1B8F44F7000
heap
page read and write
43EA000
heap
page read and write
1F0000
heap
page read and write
36A10000
trusted library allocation
page read and write
7FFD34576000
trusted library allocation
page read and write
8B0000
heap
page read and write
1B8EDDF0000
trusted library section
page read and write
2675000
direct allocation
page read and write
3112000
heap
page read and write
76A000
unkown
page read and write
4430000
heap
page read and write
1B8F00CE000
heap
page read and write
311C000
heap
page read and write
1B8F488F000
heap
page read and write
1B8EDB96000
heap
page read and write
3118000
heap
page read and write
1DEEF000
stack
page read and write
2484A000
heap
page read and write
1B8EDB3F000
heap
page read and write
87E000
unkown
page readonly
2692000
direct allocation
page read and write
2486D000
heap
page read and write
1E7C0000
heap
page read and write
1B8F466C000
heap
page read and write
7FF494419000
trusted library allocation
page execute read
6B60000
heap
page read and write
1B8F474C000
heap
page read and write
24849000
heap
page read and write
1B8EDD83000
trusted library allocation
page read and write
1B8F435C000
heap
page read and write
813000
unkown
page readonly
7FFD34524000
trusted library allocation
page read and write
24862000
heap
page read and write
A4F000
heap
page read and write
2F00000
heap
page read and write
61EB7000
direct allocation
page readonly
7FFD34760000
trusted library allocation
page execute and read and write
2484A000
heap
page read and write
2486D000
heap
page read and write
310E000
heap
page read and write
A9C000
heap
page read and write
2C50000
heap
page read and write
D3F000
stack
page read and write
2A930000
heap
page read and write
7FFD344F0000
trusted library allocation
page read and write
CD49FB000
stack
page read and write
1B890001000
trusted library allocation
page read and write
7FF49441E000
trusted library allocation
page readonly
1B8F7BE9000
heap
page read and write
2485E000
heap
page read and write
404A000
unkown
page readonly
1B8F00E8000
heap
page read and write
1E7B0000
heap
page read and write
1B8F7BE4000
heap
page read and write
1B8F47A7000
heap
page read and write
2486D000
heap
page read and write
CD5236000
stack
page read and write
25C4000
direct allocation
page read and write
1B8900D9000
trusted library allocation
page read and write
7FFD347F0000
trusted library allocation
page read and write
1B8F46D3000
heap
page read and write
1B8F45B2000
heap
page read and write
1B8F00EE000
heap
page read and write
311D000
heap
page read and write
1B8F487F000
heap
page read and write
248CE000
heap
page read and write
4070000
heap
page read and write
1129000
heap
page read and write
1B8F0092000
heap
page read and write
1B8F021C000
heap
page read and write
636000
unkown
page execute and read and write
1E7C1000
heap
page read and write
248CE000
heap
page read and write
2484D000
heap
page read and write
CD513E000
stack
page read and write
1B880001000
trusted library allocation
page read and write
24849000
heap
page read and write
1B8F00D2000
heap
page read and write
CD4DF3000
stack
page read and write
1E8C0000
trusted library allocation
page read and write
7046000
heap
page read and write
4250000
heap
page read and write
2484C000
heap
page read and write
CD556F000
stack
page read and write
309E2000
heap
page read and write
24867000
heap
page read and write
26DA000
direct allocation
page read and write
310A000
heap
page read and write
68AF000
stack
page read and write
1B8F42EF000
heap
page read and write
1B8F4705000
heap
page read and write
24869000
heap
page read and write
310F000
heap
page read and write
7FFD34370000
trusted library allocation
page execute and read and write
2624000
direct allocation
page read and write
1B88061A000
trusted library allocation
page read and write
A93000
heap
page read and write
1B880347000
trusted library allocation
page read and write
2604000
direct allocation
page read and write
7FFD347C0000
trusted library allocation
page read and write
CD50F9000
stack
page read and write
1B8F01C0000
heap
page read and write
1B8EDB20000
heap
page read and write
6D20D000
unkown
page readonly
24836000
heap
page read and write
1B8EDD80000
trusted library allocation
page read and write
2485F000
heap
page read and write
7FFD34800000
trusted library allocation
page execute and read and write
1B8F0D30000
trusted library section
page read and write
4C5E000
stack
page read and write
24867000
heap
page read and write
7FFD34532000
trusted library allocation
page read and write
666E000
stack
page read and write
4023000
unkown
page readonly
5D80000
direct allocation
page read and write
1B8EDDD0000
trusted library allocation
page read and write
1B8F4876000
heap
page read and write
26AF000
direct allocation
page read and write
4048000
unkown
page read and write
6D415000
unkown
page readonly
24850000
heap
page read and write
624000
unkown
page execute and read and write
25BD000
direct allocation
page read and write
CD47FD000
stack
page read and write
7FFD34470000
trusted library allocation
page read and write
1B8EFFF0000
heap
page read and write
97000
stack
page read and write
2CBE000
stack
page read and write
26CC000
direct allocation
page read and write
1B8EF7E0000
trusted library allocation
page read and write
1B8F46B5000
heap
page read and write
1B89007F000
trusted library allocation
page read and write
35F0000
heap
page read and write
24856000
heap
page read and write
2A8FE000
heap
page read and write
7FFD34480000
trusted library allocation
page read and write
7FF494414000
trusted library allocation
page readonly
1B8F6900000
trusted library allocation
page read and write
7FF494402000
trusted library allocation
page readonly
9B000
stack
page read and write
1B89007C000
trusted library allocation
page read and write
BFF000
stack
page read and write
7FFD344BD000
trusted library allocation
page read and write
24848000
heap
page read and write
A74000
heap
page read and write
1B880356000
trusted library allocation
page read and write
5D90000
heap
page read and write
1B8F00E1000
heap
page read and write
265F000
direct allocation
page read and write
1B8EDDE4000
heap
page execute and read and write
1B8F4596000
heap
page read and write
1B8F4BD4000
trusted library allocation
page read and write
ABA000
heap
page read and write
2486D000
heap
page read and write
A98000
heap
page read and write
2A941000
heap
page read and write
1B880392000
trusted library allocation
page read and write
1B8F006B000
heap
page read and write
24845000
heap
page read and write
1B880550000
trusted library allocation
page read and write
24865000
heap
page read and write
2484C000
heap
page read and write
7FFD34690000
trusted library allocation
page read and write
1B8F44FB000
heap
page read and write
1B8F0AA0000
trusted library allocation
page read and write
4C0F000
stack
page read and write
260D000
direct allocation
page read and write
24936000
heap
page read and write
7FFD34780000
trusted library allocation
page read and write
36A4A000
heap
page read and write
CD4AFB000
stack
page read and write
929000
unkown
page write copy
76F000
unkown
page read and write
7FFD34540000
trusted library allocation
page read and write
35D0000
heap
page read and write
2666000
direct allocation
page read and write
40F000
unkown
page readonly
2484D000
heap
page read and write
CD46FB000
stack
page read and write
1E12E000
stack
page read and write
2C90000
heap
page read and write
24845000
heap
page read and write
61EB4000
direct allocation
page read and write
64AE000
stack
page read and write
1B8F45B5000
heap
page read and write
2658000
direct allocation
page read and write
7FFD34366000
trusted library allocation
page read and write
2C80000
heap
page read and write
409E000
stack
page read and write
7FFD3462F000
trusted library allocation
page read and write
A08000
heap
page read and write
2485D000
heap
page read and write
1B8F45BD000
heap
page read and write
25B0000
direct allocation
page read and write
7FFD3447B000
trusted library allocation
page read and write
1B8F4B40000
trusted library section
page readonly
2484B000
heap
page read and write
24836000
heap
page read and write
9E0000
heap
page read and write
1B8EDB30000
heap
page read and write
5D95000
heap
page read and write
1B8F471E000
heap
page read and write
24849000
heap
page read and write
1E3CE000
stack
page read and write
2485E000
heap
page read and write
F30000
heap
page read and write
25BB000
direct allocation
page read and write
310D000
heap
page read and write
1B8F43F1000
heap
page read and write
4360000
direct allocation
page execute and read and write
1B8F4322000
heap
page read and write
7FFD344A7000
trusted library allocation
page read and write
24849000
heap
page read and write
905000
heap
page read and write
2684000
direct allocation
page read and write
1E4CD000
stack
page read and write
1B8F00D4000
heap
page read and write
24850000
heap
page read and write
AAA000
heap
page read and write
1B8F4599000
heap
page read and write
900000
heap
page read and write
311B000
heap
page read and write
7FFD344B0000
trusted library allocation
page read and write
A65000
heap
page read and write
A00000
heap
page read and write
197000
stack
page read and write
5DDE000
stack
page read and write
40F000
unkown
page readonly
24849000
heap
page read and write
1B8EDE95000
heap
page read and write
7FFD34687000
trusted library allocation
page read and write
2DC0000
heap
page read and write
1B8F489E000
heap
page read and write
5610000
heap
page read and write
1B8F01D0000
heap
page read and write
1B8F45A4000
heap
page read and write
61ECC000
direct allocation
page read and write
1E8C5000
heap
page read and write
CD4FFE000
stack
page read and write
7FF494412000
trusted library allocation
page readonly
1B8F0061000
heap
page read and write
42A0000
heap
page read and write
1B8F00DD000
heap
page read and write
A61000
heap
page read and write
2DBF000
stack
page read and write
1B8F0520000
trusted library section
page read and write
311F000
heap
page read and write
1E22F000
stack
page read and write
710000
unkown
page readonly
445C000
heap
page read and write
6B7E000
heap
page read and write
7FF49441F000
trusted library allocation
page execute read
26E8000
direct allocation
page read and write
A73000
heap
page read and write
1B8804D4000
trusted library allocation
page read and write
1E26E000
stack
page read and write
A5A000
heap
page read and write
25FD000
direct allocation
page read and write
1B8EDD00000
heap
page read and write
43DE000
stack
page read and write
1B8EDB57000
heap
page read and write
2651000
direct allocation
page read and write
5E10000
heap
page read and write
1E74E000
stack
page read and write
1B8F0140000
trusted library section
page read and write
25A6000
heap
page read and write
1139000
heap
page read and write
24830000
heap
page read and write
76D000
unkown
page read and write
25DC000
direct allocation
page read and write
1B88047C000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
24845000
heap
page read and write
1B8F4401000
heap
page read and write
26A0000
direct allocation
page read and write
6D230000
unkown
page readonly
41C000
unkown
page write copy
7FFD34452000
trusted library allocation
page read and write
CD43F9000
stack
page read and write
1B8F4782000
heap
page read and write
1B8F46AB000
heap
page read and write
41EE000
stack
page read and write
676F000
stack
page read and write
24846000
heap
page read and write
7FFD34588000
trusted library allocation
page read and write
401000
unkown
page execute read
24869000
heap
page read and write
6B2C000
stack
page read and write
2A8F5000
heap
page read and write
4023000
unkown
page readonly
1B8F0B10000
trusted library allocation
page read and write
1B8F45BF000
heap
page read and write
7FFD34560000
trusted library allocation
page read and write
24850000
heap
page read and write
2A8C0000
heap
page read and write
24844000
heap
page read and write
266E000
direct allocation
page read and write
43E0000
heap
page read and write
7FF494400000
trusted library allocation
page readonly
1B8F43B4000
heap
page read and write
2484D000
heap
page read and write
30F0000
heap
page read and write
6F64000
heap
page read and write
24854000
heap
page read and write
2C40000
heap
page read and write
27F3000
heap
page read and write
27F0000
heap
page read and write
2A97A000
heap
page read and write
25A0000
heap
page read and write
A64000
heap
page read and write
3112000
heap
page read and write
345D000
stack
page read and write
24836000
heap
page read and write
335C000
stack
page read and write
A7E000
heap
page read and write
1B88038F000
trusted library allocation
page read and write
37FF0000
heap
page read and write
6D410000
unkown
page read and write
24845000
heap
page read and write
61ED4000
direct allocation
page readonly
2484F000
heap
page read and write
267C000
direct allocation
page read and write
5D80000
heap
page read and write
BB8000
stack
page read and write
311D000
heap
page read and write
A3B000
heap
page read and write
F15000
heap
page read and write
7FFD34627000
trusted library allocation
page read and write
2484D000
heap
page read and write
44D2000
heap
page read and write
2486D000
heap
page read and write
24867000
heap
page read and write
43FC000
heap
page execute and read and write
24850000
heap
page read and write
CD597B000
stack
page read and write
309D4000
heap
page read and write
1B8EDB00000
heap
page read and write
2485F000
heap
page read and write
416000
unkown
page write copy
7FFD347B0000
trusted library allocation
page read and write
2485D000
heap
page read and write
400000
unkown
page readonly
2C08000
heap
page read and write
400000
unkown
page readonly
1B8F7B60000
heap
page read and write
24861000
heap
page read and write
1B8F0A30000
trusted library allocation
page read and write
1B8EDE90000
heap
page read and write
ACC000
heap
page read and write
6D40E000
unkown
page read and write
2614000
direct allocation
page read and write
C3E000
stack
page read and write
7FFD342BD000
trusted library allocation
page execute and read and write
92A000
unkown
page read and write
A3E000
heap
page read and write
1B8F448D000
heap
page read and write
1B880352000
trusted library allocation
page read and write
1B8F43BC000
heap
page read and write
1B8F7BA7000
heap
page read and write
2484D000
heap
page read and write
1B8F00BA000
heap
page read and write
1E0EF000
stack
page read and write
12DE000
stack
page read and write
4E10000
trusted library allocation
page read and write
49CE000
stack
page read and write
7FFD347C6000
trusted library allocation
page read and write
7FFD344D4000
trusted library allocation
page read and write
3129000
heap
page read and write
25C6000
direct allocation
page read and write
4255000
heap
page read and write
6D222000
unkown
page readonly
CD48FE000
stack
page read and write
1B8F005B000
heap
page read and write
7FFD34484000
trusted library allocation
page read and write
CD45FA000
stack
page read and write
36A40000
heap
page read and write
7FFD344AA000
trusted library allocation
page read and write
42BC000
heap
page execute and read and write
309E4000
heap
page read and write
261B000
direct allocation
page read and write
1B8F44C0000
heap
page read and write
312D000
heap
page read and write
2485F000
heap
page read and write
1B8F438D000
heap
page read and write
5D9E000
stack
page read and write
7FF494401000
trusted library allocation
page execute read
2699000
direct allocation
page read and write
6D3CF000
unkown
page readonly
1E50E000
stack
page read and write
CD3FCF000
stack
page read and write
2486C000
heap
page read and write
2622000
direct allocation
page read and write
1B8EDAE0000
heap
page read and write
435F000
stack
page read and write
6F85000
heap
page read and write
4050000
heap
page read and write
2A901000
heap
page read and write
1B8EFF60000
trusted library section
page read and write
1B8EDB6F000
heap
page read and write
10E8000
heap
page read and write
1B8804AE000
trusted library allocation
page read and write
77B000
unkown
page write copy
766000
unkown
page read and write
2485F000
heap
page read and write
5DD2000
heap
page read and write
1140000
heap
page read and write
8BC000
unkown
page readonly
401000
unkown
page execute read
2A8E4000
heap
page read and write
1B8F0A80000
trusted library allocation
page read and write
1B8EDA00000
unkown
page readonly
7FFD3436C000
trusted library allocation
page execute and read and write
1B8F44F4000
heap
page read and write
7FF494403000
trusted library allocation
page execute read
1B8EAB8B000
unkown
page readonly
1B8EC98B000
unkown
page readonly
1B8EFF70000
trusted library section
page read and write
1B8F45AD000
heap
page read and write
2485E000
heap
page read and write
CD547A000
stack
page read and write
42AA000
heap
page read and write
1B8F0A90000
trusted library section
page read and write
1B8F01E2000
heap
page read and write
1E60F000
stack
page read and write
7FFD346D0000
trusted library allocation
page execute and read and write
7FFD34638000
trusted library allocation
page read and write
3112000
heap
page read and write
CD527E000
stack
page read and write
2484E000
heap
page read and write
7FF494413000
trusted library allocation
page execute read
40B7000
heap
page read and write
108E000
stack
page read and write
400000
unkown
page execute and read and write
311F000
heap
page read and write
7FFD34640000
trusted library allocation
page read and write
CD4BF1000
stack
page read and write
7FFD342B4000
trusted library allocation
page read and write
26D3000
direct allocation
page read and write
7FF49441C000
trusted library allocation
page readonly
1B8F4495000
heap
page read and write
25DF000
direct allocation
page read and write
1B8F46CB000
heap
page read and write
7FFD342B0000
trusted library allocation
page read and write
4399000
heap
page read and write
2608000
direct allocation
page read and write
1B880233000
trusted library allocation
page read and write
A66000
heap
page read and write
3120000
heap
page read and write
2484D000
heap
page read and write
AA1000
heap
page read and write
400000
unkown
page readonly
7FFD34396000
trusted library allocation
page execute and read and write
A6B000
heap
page read and write
1B8EDB6D000
heap
page read and write
2DD8000
heap
page read and write
2486D000
heap
page read and write
3100000
heap
page read and write
1B8EDB6B000
heap
page read and write
7FF49441D000
trusted library allocation
page execute read
25E6000
direct allocation
page read and write
1B8F42CD000
heap
page read and write
311F000
heap
page read and write
933000
unkown
page readonly
1129000
heap
page read and write
1136000
heap
page read and write
1E36E000
stack
page read and write
24841000
heap
page read and write
7FFD346A0000
trusted library allocation
page read and write
24849000
heap
page read and write
1B8F0A70000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
7FFD346C0000
trusted library allocation
page read and write
1B890099000
trusted library allocation
page read and write
A5E000
heap
page read and write
1B8803B2000
trusted library allocation
page read and write
CD587D000
stack
page read and write
4394000
heap
page read and write
4B0E000
stack
page read and write
24850000
heap
page read and write
2550000
direct allocation
page execute and read and write
7FFD34460000
trusted library allocation
page read and write
432B000
heap
page read and write
CD5A7B000
stack
page read and write
7FFD34462000
trusted library allocation
page read and write
7FFD34500000
trusted library allocation
page read and write
1B8EDD50000
trusted library allocation
page read and write
8FE000
stack
page read and write
7FFD34606000
trusted library allocation
page read and write
2A8F8000
heap
page read and write
7FF494416000
trusted library allocation
page readonly
104D000
stack
page read and write
5D7F000
stack
page read and write
7050000
heap
page read and write
10B0000
heap
page read and write
6B77000
heap
page read and write
A4C000
heap
page read and write
1B8F0073000
heap
page read and write
1B8F008E000
heap
page read and write
40B7000
heap
page read and write
2485E000
heap
page read and write
3105000
heap
page read and write
A57000
heap
page read and write
309DC000
heap
page read and write
10E0000
heap
page read and write
69EF000
stack
page read and write
40B0000
heap
page read and write
2A8EC000
heap
page read and write
1B8EDE00000
trusted library section
page read and write
75E000
unkown
page write copy
1B8EDB25000
heap
page read and write
1B8F0A50000
trusted library allocation
page read and write
6D21E000
unkown
page read and write
5CE0000
heap
page read and write
24843000
heap
page read and write
4206000
heap
page read and write
1B89001C000
trusted library allocation
page read and write
3115000
heap
page read and write
7FF494415000
trusted library allocation
page execute read
1B8F42E4000
heap
page read and write
711000
unkown
page execute read
1B8EA150000
unkown
page readonly
9C000
stack
page read and write
6A2C000
stack
page read and write
7FFD342D4000
trusted library allocation
page read and write
3121000
heap
page read and write
3105000
heap
page read and write
1B8F0730000
trusted library section
page read and write
64B0000
heap
page read and write
2485F000
heap
page read and write
7FFD345CB000
trusted library allocation
page read and write
1090000
heap
page read and write
7FFD34360000
trusted library allocation
page read and write
7FFD3447E000
trusted library allocation
page read and write
310F000
heap
page read and write
7FF494418000
trusted library allocation
page readonly
7FFD34570000
trusted library allocation
page read and write
A4E000
heap
page read and write
6D40F000
unkown
page write copy
3109000
heap
page read and write
7FFD34750000
trusted library allocation
page read and write
7FFD342CD000
trusted library allocation
page execute and read and write
111F000
heap
page read and write
A89000
heap
page read and write
3108000
heap
page read and write
1140000
heap
page read and write
CD537B000
stack
page read and write
7040000
heap
page read and write
25EE000
direct allocation
page read and write
26A8000
direct allocation
page read and write
ABF000
heap
page read and write
7FFD347E0000
trusted library allocation
page read and write
AA1000
heap
page read and write
7FFD34810000
trusted library allocation
page execute and read and write
2485E000
heap
page read and write
24840000
heap
page read and write
26C4000
direct allocation
page read and write
443B000
heap
page read and write
1B8EF750000
trusted library section
page read and write
428F000
stack
page read and write
1B8EDB98000
heap
page read and write
1E64E000
stack
page read and write
1B8F00C0000
heap
page read and write
2486D000
heap
page read and write
1B8F05D0000
trusted library section
page read and write
7FFD344C0000
trusted library allocation
page read and write
24835000
heap
page read and write
3114000
heap
page read and write
7FFD34580000
trusted library allocation
page read and write
3125000
heap
page read and write
1B880620000
trusted library allocation
page read and write
4150000
heap
page read and write
A7C000
heap
page read and write
There are 796 hidden memdumps, click here to show them.