IOC Report
H6ohQMZygb.exe

loading gif

Files

File Path
Type
Category
Malicious
H6ohQMZygb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5e0.0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5e0.2\UIxMarketPlugin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5e0.2\relay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5e0.2\run.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u5e0.3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AKFHCAKJDBKKEBFIIJJEGIJDAA
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\Canon_Inc_IC\UniversalInstaller\ServiceLog\CANON_UIX_SERVICELOG_20240423093808.TXT
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\DBKKFCBAKKFBGCBFHJDG
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DTBZGIOOSO.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EBGCFBGCBFHJECBGDAKKJDGHII
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\EHCBAAAF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FBFHDBKJEGHJJJKFIIJEBGIJKK
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FIJECAEHJJJKJKFIDGCB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GHJKECAA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JDDHMPCDUJ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\KATAXZVCPS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\LTKMYBSEYZ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_H6ohQMZygb.exe_17f352d9e82a7e27ed6bd19e3bb5c3d06d4827cd_71d76d1c_f19226d0-d6f4-4850-971d-ccfed2a97a9b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_u5e0.0.exe_9018e61475925ab2a6fce5ee63e45afcafdd78eb_8e21d969_a7a435be-c8af-4b3e-a727-f9e151f69f0a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER219D.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Apr 23 07:38:15 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER22E6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2316.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER87F8.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Apr 23 07:38:41 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8903.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8923.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\ONBQCLYSPU.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\RAYHIWGKDI.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\RAYHIWGKDI.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SFPUSAFIOL.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SUAVTZKNFL.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\VLZDGUKUTZ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\XZXHAVGRAG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\XZXHAVGRAG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\iolo technologies\logs\bootstrap.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\iolo\logs\WSComm.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\02b7d1436f6e86786e74c7f14b0eeb043810a2ded0b85707d2c8e2ec408053fe\b1b1595ca4ec4ed0834f9bd281245f67.tmp
ASCII text, with very long lines (504), with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\02b7d1436f6e86786e74c7f14b0eeb043810a2ded0b85707d2c8e2ec408053fe\b1b1595ca4ec4ed0834f9bd281245f67.trn (copy)
ASCII text, with very long lines (504), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\ApplicationInsights\02b7d1436f6e86786e74c7f14b0eeb043810a2ded0b85707d2c8e2ec408053fe\gllccsus.cks
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\iolo\dm\ioloDMLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\u5e0.1
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\u5e0.2\groupware.wav
data
dropped
C:\Users\user\AppData\Local\Temp\u5e0.2\macrospore.indd
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 48 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\H6ohQMZygb.exe
"C:\Users\user\Desktop\H6ohQMZygb.exe"
malicious
C:\Users\user\AppData\Local\Temp\u5e0.0.exe
"C:\Users\user\AppData\Local\Temp\u5e0.0.exe"
malicious
C:\Users\user\AppData\Local\Temp\u5e0.3.exe
"C:\Users\user\AppData\Local\Temp\u5e0.3.exe"
malicious
C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
"C:\Users\user\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
malicious
C:\Users\user\AppData\Local\Temp\u5e0.2\run.exe
"C:\Users\user\AppData\Local\Temp\u5e0.2\run.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6984 -s 1128
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7156 -s 2248

URLs

Name
IP
Malicious
185.172.128.76/3cd2b41cbde8fc9c.php
malicious
http://185.172.128.76/3cd2b41cbde8fc9c.php
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/sqlite3.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/softokn3.dll
185.172.128.76
malicious
http://185.172.128.76
unknown
malicious
http://185.172.128.76/3cd2b41cbde8fc9c.p
unknown
malicious
http://185.172.128.76/15f649199f40275b/nss3.dll
185.172.128.76
malicious
http://185.172.128.90/cpa/ping.php?substr=five&s=ab&sub=0
185.172.128.90
malicious
http://185.172.128.76/15f649199f40275b/mozglue.dll
185.172.128.76
malicious
http://185.172.128.76/15f649199f40275b/msvcp140.dll
185.172.128.76
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://monitor.azure.com//.default
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpph
unknown
https://snapshot.monitor.azure.com/&
unknown
http://185.172.128.228/BroomSetup.exe
185.172.128.228
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx.
unknown
https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
unknown
https://www.iolo.com/company/legal/sales-policy/
unknown
http://www.indyproject.org/
unknown
http://microsoft.co;
unknown
https://support.iolo.com/support/solutions/articles/44001781185?
unknown
https://www.iolo.com/company/legal/privacy/?
unknown
http://185.172.128.76/15f649199f40275b/mozglue.dll8
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpZ3
unknown
http://www.codeplex.com/CompositeWPF
unknown
https://support.iolo.com/support/solutions/articles/44001781185
unknown
https://scripts.sil.org/OFL
unknown
https://taskscheduler.codeplex.com/H
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpc5e2e12a748a569c5bd7a63a7e028release
unknown
https://www.iolo.com/company/legal/sales-policy/?
unknown
https://scripts.sil.org/OFLX8
unknown
https://westus2-2.in.applicationinsights.azure.com
unknown
https://webhooklistenersfunc.azurewebsites.net/api/lookup/constella-dark-web-alerts
unknown
http://185.172.128.76/15f649199f40275b/mozglue.dllT
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://indiantypefoundry.com
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpB3
unknown
https://download.avira.com/download/
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.pM
unknown
http://www.codeplex.com/prism#Microsoft.Practices.Prism.ViewModel
unknown
http://dejavu.sourceforge.net
unknown
http://185.172.128.76/15f649199f40275b/freebl3.dllZ
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php:3
unknown
https://www.iolo.com/company/legal/privacy/
unknown
https://mozilla.org0/
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php22
unknown
http://download.iolo.net/ds/4/en/images/dsUSB.imaRealDefense
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://rt.services.visualstudio.com/l
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://gdlp01.c-wss.com/rmds/ic/universalinstaller/common/checkconnection
unknown
https://dc.services.visualstudio.com/
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://dejavu.sourceforge.nethttp://dejavu.sourceforge.netFonts
unknown
https://iolo.comH42652B74-0AD8-4B60-B8FD-69ED38F7666B
unknown
https://dc.services.visualstudio.com/f
unknown
https://profiler.monitor.azure.com/
unknown
http://185.172.128.59/syncUpd.exe
185.172.128.59
https://www.newtonsoft.com/jsonschema
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe
unknown
https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.0.57/SystemMechanic.exe.6-
unknown
https://westus2-2.in.applicationinsights.azure.com/
unknown
https://www.iolo.com/company/legal/eula/?
unknown
http://dejavu.sourceforge.net/wiki/index.php/License
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php~3
unknown
https://scripts.sil.org/OFLThis
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://github.com/itfoundry/Poppins)&&&&z
unknown
https://github.com/itfoundry/Poppins)
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpB
unknown
https://snapshot.monitor.azure.com/
unknown
http://westus2-2.in.applicationinsights.azure.com
unknown
https://github.com/itfoundry/Poppins)&&&&v
unknown
http://ocsp.sectigo.com0
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpF
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.phpts
unknown
https://www.iolo.com/company/legal/eula/
unknown
https://www.newtonsoft.com/json
unknown
https://westus2-2.in.applicationinsights.azure.com/v2/track
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://185.172.128.76/3cd2b41cbde8fc9c.php4
unknown
http://google.com
unknown
https://dc.services.visualstudio.com/v2/track
unknown
http://www.codeplex.com/prism
unknown
https://taskscheduler.codeplex.com/
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://westus2-2.in.applicationinsights.azure.com/;LiveEndpoint=https://westus2.livediagnostics.mon
unknown
http://compositewpf.codeplex.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://sectigo.com/CPS0D
unknown
https://dc.services.visualstudio.com/Jhttps://rt.services.visualstudio.com/Fhttps://profiler.monitor
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17chost.exe
unknown
http://dejavu.sourceforge.net/wiki/index.php/Licensehttp://dejavu.sourceforge.net/wiki/index.php/Lic
unknown
https://rt.services.visualstudio.com/
unknown
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx
20.157.87.45
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
note.padd.cn.com
176.97.76.106
svc.iolo.com
20.157.87.45
westus2-2.in.applicationinsights.azure.com
unknown

IPs

IP
Domain
Country
Malicious
185.172.128.90
unknown
Russian Federation
malicious
185.172.128.76
unknown
Russian Federation
malicious
185.172.128.228
unknown
Russian Federation
20.157.87.45
svc.iolo.com
United States
176.97.76.106
note.padd.cn.com
United Kingdom
185.172.128.59
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\BroomCleaner
Installed
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
MaxSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications
Retention
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Mechanic
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Service Manager
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Shield
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\System Shield
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\ActiveCare
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\ActiveCare
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Installer
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Installer
TypesSupported
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Tune-Up Definitions
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\iolo Applications\Tune-Up Definitions
TypesSupported
\REGISTRY\A\{bbf7258d-3143-b07e-0afd-16f1a7b053bc}\Root\InventoryApplicationFile\h6ohqmzygb.exe|9b3854cea72bf01
ProgramId
\REGISTRY\A\{bbf7258d-3143-b07e-0afd-16f1a7b053bc}\Root\InventoryApplicationFile\h6ohqmzygb.exe|9b3854cea72bf01
FileId
\REGISTRY\A\{bbf7258d-3143-b07e-0afd-16f1a7b053bc}\Root\InventoryApplicationFile\h6ohqmzygb.exe|9b3854cea72bf01
LowerCaseLongPath
\REGISTRY\A\{bbf7258d-3143-b07e-0afd-16f1a7b053bc}\Root\InventoryApplicationFile\h6ohqmzygb.exe|9b3854cea72bf01
LongPathHash
\REGISTRY\A\{bbf7258d-3143-b07e-0afd-16f1a7b053bc}\Root\InventoryApplicationFile\h6ohqmzygb.exe|9b3854cea72bf01
Name
\REGISTRY\A\{bbf7258d-3143-b07e-0afd-16f1a7b053bc}\Root\InventoryApplicationFile\h6ohqmzygb.exe|9b3854cea72bf01
OriginalFileName
\REGISTRY\A\{bbf7258d-3143-b07e-0afd-16f1a7b053bc}\Root\InventoryApplicationFile\h6ohqmzygb.exe|9b3854cea72bf01
Publisher
\REGISTRY\A\{bbf7258d-3143-b07e-0afd-16f1a7b053bc}\Root\InventoryApplicationFile\h6ohqmzygb.exe|9b3854cea72bf01
Version
\REGISTRY\A\{bbf7258d-3143-b07e-0afd-16f1a7b053bc}\Root\InventoryApplicationFile\h6ohqmzygb.exe|9b3854cea72bf01
BinFileVersion
\REGISTRY\A\{bbf7258d-3143-b07e-0afd-16f1a7b053bc}\Root\InventoryApplicationFile\h6ohqmzygb.exe|9b3854cea72bf01
BinaryType
\REGISTRY\A\{bbf7258d-3143-b07e-0afd-16f1a7b053bc}\Root\InventoryApplicationFile\h6ohqmzygb.exe|9b3854cea72bf01
ProductName
\REGISTRY\A\{bbf7258d-3143-b07e-0afd-16f1a7b053bc}\Root\InventoryApplicationFile\h6ohqmzygb.exe|9b3854cea72bf01
ProductVersion
\REGISTRY\A\{bbf7258d-3143-b07e-0afd-16f1a7b053bc}\Root\InventoryApplicationFile\h6ohqmzygb.exe|9b3854cea72bf01
LinkDate
\REGISTRY\A\{bbf7258d-3143-b07e-0afd-16f1a7b053bc}\Root\InventoryApplicationFile\h6ohqmzygb.exe|9b3854cea72bf01
BinProductVersion
\REGISTRY\A\{bbf7258d-3143-b07e-0afd-16f1a7b053bc}\Root\InventoryApplicationFile\h6ohqmzygb.exe|9b3854cea72bf01
AppxPackageFullName
\REGISTRY\A\{bbf7258d-3143-b07e-0afd-16f1a7b053bc}\Root\InventoryApplicationFile\h6ohqmzygb.exe|9b3854cea72bf01
AppxPackageRelativeId
\REGISTRY\A\{bbf7258d-3143-b07e-0afd-16f1a7b053bc}\Root\InventoryApplicationFile\h6ohqmzygb.exe|9b3854cea72bf01
Size
\REGISTRY\A\{bbf7258d-3143-b07e-0afd-16f1a7b053bc}\Root\InventoryApplicationFile\h6ohqmzygb.exe|9b3854cea72bf01
Language
\REGISTRY\A\{bbf7258d-3143-b07e-0afd-16f1a7b053bc}\Root\InventoryApplicationFile\h6ohqmzygb.exe|9b3854cea72bf01
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1_RASMANCS
FileDirectory
\REGISTRY\A\{0ffaef41-f4cb-8c49-e805-3080ddc8cfea}\Root\InventoryApplicationFile\u5e0.0.exe|de43953c2329b4f2
ProgramId
\REGISTRY\A\{0ffaef41-f4cb-8c49-e805-3080ddc8cfea}\Root\InventoryApplicationFile\u5e0.0.exe|de43953c2329b4f2
FileId
\REGISTRY\A\{0ffaef41-f4cb-8c49-e805-3080ddc8cfea}\Root\InventoryApplicationFile\u5e0.0.exe|de43953c2329b4f2
LowerCaseLongPath
\REGISTRY\A\{0ffaef41-f4cb-8c49-e805-3080ddc8cfea}\Root\InventoryApplicationFile\u5e0.0.exe|de43953c2329b4f2
LongPathHash
\REGISTRY\A\{0ffaef41-f4cb-8c49-e805-3080ddc8cfea}\Root\InventoryApplicationFile\u5e0.0.exe|de43953c2329b4f2
Name
\REGISTRY\A\{0ffaef41-f4cb-8c49-e805-3080ddc8cfea}\Root\InventoryApplicationFile\u5e0.0.exe|de43953c2329b4f2
OriginalFileName
\REGISTRY\A\{0ffaef41-f4cb-8c49-e805-3080ddc8cfea}\Root\InventoryApplicationFile\u5e0.0.exe|de43953c2329b4f2
Publisher
\REGISTRY\A\{0ffaef41-f4cb-8c49-e805-3080ddc8cfea}\Root\InventoryApplicationFile\u5e0.0.exe|de43953c2329b4f2
Version
\REGISTRY\A\{0ffaef41-f4cb-8c49-e805-3080ddc8cfea}\Root\InventoryApplicationFile\u5e0.0.exe|de43953c2329b4f2
BinFileVersion
\REGISTRY\A\{0ffaef41-f4cb-8c49-e805-3080ddc8cfea}\Root\InventoryApplicationFile\u5e0.0.exe|de43953c2329b4f2
BinaryType
\REGISTRY\A\{0ffaef41-f4cb-8c49-e805-3080ddc8cfea}\Root\InventoryApplicationFile\u5e0.0.exe|de43953c2329b4f2
ProductName
\REGISTRY\A\{0ffaef41-f4cb-8c49-e805-3080ddc8cfea}\Root\InventoryApplicationFile\u5e0.0.exe|de43953c2329b4f2
ProductVersion
\REGISTRY\A\{0ffaef41-f4cb-8c49-e805-3080ddc8cfea}\Root\InventoryApplicationFile\u5e0.0.exe|de43953c2329b4f2
LinkDate
\REGISTRY\A\{0ffaef41-f4cb-8c49-e805-3080ddc8cfea}\Root\InventoryApplicationFile\u5e0.0.exe|de43953c2329b4f2
BinProductVersion
\REGISTRY\A\{0ffaef41-f4cb-8c49-e805-3080ddc8cfea}\Root\InventoryApplicationFile\u5e0.0.exe|de43953c2329b4f2
AppxPackageFullName
\REGISTRY\A\{0ffaef41-f4cb-8c49-e805-3080ddc8cfea}\Root\InventoryApplicationFile\u5e0.0.exe|de43953c2329b4f2
AppxPackageRelativeId
\REGISTRY\A\{0ffaef41-f4cb-8c49-e805-3080ddc8cfea}\Root\InventoryApplicationFile\u5e0.0.exe|de43953c2329b4f2
Size
\REGISTRY\A\{0ffaef41-f4cb-8c49-e805-3080ddc8cfea}\Root\InventoryApplicationFile\u5e0.0.exe|de43953c2329b4f2
Language
\REGISTRY\A\{0ffaef41-f4cb-8c49-e805-3080ddc8cfea}\Root\InventoryApplicationFile\u5e0.0.exe|de43953c2329b4f2
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000FF837ECD5
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 62 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
41F2000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
28F3DD70000
trusted library section
page read and write
malicious
28F25170000
trusted library section
page read and write
malicious
43C0000
direct allocation
page execute and read and write
malicious
28F22E1B000
unkown
page readonly
malicious
447000
unkown
page execute and read and write
malicious
5BB0000
direct allocation
page read and write
malicious
28F1FC1B000
unkown
page readonly
malicious
7FF4A8402000
trusted library allocation
page readonly
7FFD9B7A0000
trusted library allocation
page execute and read and write
28F1FBE0000
unkown
page readonly
6C210000
unkown
page read and write
4C40000
heap
page read and write
9CF000
heap
page read and write
28F25641000
trusted library allocation
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
2472A000
heap
page read and write
28F41EE7000
heap
page read and write
2FC7000
heap
page read and write
400000
unkown
page readonly
28F443A0000
trusted library allocation
page read and write
2533000
heap
page read and write
271B000
direct allocation
page read and write
28F42059000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
54FC000
stack
page read and write
7FFD9B6F2000
trusted library allocation
page read and write
6C01E000
unkown
page read and write
76D000
unkown
page read and write
427F000
heap
page read and write
2FB8000
heap
page read and write
2FC2000
heap
page read and write
95D16FC000
stack
page read and write
28F255E3000
trusted library allocation
page read and write
95D12FA000
stack
page read and write
28F4203D000
heap
page read and write
F28000
stack
page read and write
28F3DBA4000
heap
page read and write
2FC4000
heap
page read and write
7FF4A8400000
trusted library allocation
page readonly
9BE000
heap
page read and write
1E681000
heap
page read and write
28F3DB62000
heap
page read and write
28F25517000
trusted library allocation
page read and write
192000
stack
page read and write
2FD5000
heap
page read and write
28F25546000
trusted library allocation
page read and write
972000
heap
page read and write
24790000
heap
page read and write
2654000
direct allocation
page read and write
7FF4A841E000
trusted library allocation
page readonly
7FFD9B7D0000
trusted library allocation
page read and write
28F3E580000
trusted library allocation
page read and write
247F5000
heap
page read and write
28F23875000
heap
page read and write
4023000
unkown
page readonly
28F41F63000
heap
page read and write
28F3DAC0000
heap
page execute and read and write
24706000
heap
page read and write
42A0000
heap
page read and write
9C7000
heap
page read and write
2F9B000
heap
page read and write
53BE000
stack
page read and write
28F42072000
heap
page read and write
2636000
heap
page read and write
2746000
direct allocation
page read and write
2500000
heap
page read and write
2C3F000
unkown
page readonly
41C0000
heap
page read and write
2640000
direct allocation
page read and write
28F3DBC5000
heap
page read and write
2FB5000
heap
page read and write
275C000
direct allocation
page read and write
7FFD9B7C0000
trusted library allocation
page read and write
D2E000
stack
page read and write
28F42176000
heap
page read and write
1F0000
heap
page read and write
270C000
direct allocation
page read and write
2FBD000
heap
page read and write
766000
unkown
page read and write
264D000
direct allocation
page read and write
24726000
heap
page read and write
76F000
unkown
page read and write
95D19FC000
stack
page read and write
2AA6B000
heap
page read and write
28F41D99000
heap
page read and write
1E787000
heap
page read and write
2A7A0000
heap
page read and write
2754000
direct allocation
page read and write
95D13FA000
stack
page read and write
2738000
direct allocation
page read and write
28F3DBBD000
heap
page read and write
28F42025000
heap
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
28F44360000
heap
page execute and read and write
24703000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
1B10000
heap
page read and write
7FFD9B6A2000
trusted library allocation
page read and write
985000
heap
page read and write
FF1000
unkown
page execute read
1E21F000
stack
page read and write
28F42029000
heap
page read and write
4A86000
heap
page read and write
7FFD9B7C6000
trusted library allocation
page read and write
28F3E780000
trusted library section
page read and write
135B000
stack
page read and write
9E4000
heap
page read and write
2470D000
heap
page read and write
1A0E000
stack
page read and write
94B000
heap
page read and write
2472B000
heap
page read and write
2470C000
heap
page read and write
4D90000
trusted library allocation
page read and write
2E80000
heap
page read and write
28F41EEA000
heap
page read and write
982000
heap
page read and write
5D5E000
stack
page read and write
246F6000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FF4A8414000
trusted library allocation
page readonly
95D29FE000
stack
page read and write
28F42006000
heap
page read and write
41DC000
heap
page execute and read and write
7FFD9B520000
trusted library allocation
page read and write
28F3DB9D000
heap
page read and write
28F23666000
heap
page read and write
2EF7000
heap
page execute and read and write
7FF4A8403000
trusted library allocation
page execute read
264B000
direct allocation
page read and write
2DF0000
heap
page read and write
7FFD9B5B0000
trusted library allocation
page read and write
1698000
heap
page read and write
28F21A1B000
unkown
page readonly
5623000
heap
page read and write
3180000
heap
page read and write
7FFD9B5C0000
trusted library allocation
page execute and read and write
28F25A74000
trusted library allocation
page read and write
2EEE000
heap
page read and write
24707000
heap
page read and write
28F236DC000
heap
page read and write
28F442D0000
trusted library allocation
page read and write
6C00D000
unkown
page readonly
2FD1000
heap
page read and write
24706000
heap
page read and write
987000
heap
page read and write
4296000
heap
page read and write
2FBF000
heap
page read and write
24723000
heap
page read and write
61ED4000
direct allocation
page readonly
2729000
direct allocation
page read and write
28F3DCD0000
trusted library section
page read and write
5590000
heap
page read and write
246F7000
heap
page read and write
7FFD9B890000
trusted library allocation
page read and write
28F3DBE2000
heap
page read and write
2FA0000
heap
page read and write
28F41D92000
heap
page read and write
7FFD9B6B2000
trusted library allocation
page read and write
95D14FE000
stack
page read and write
28F2363C000
heap
page read and write
40F000
unkown
page readonly
905000
heap
page read and write
5660000
heap
page read and write
28F3DAD8000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
6C1CF000
unkown
page readonly
2FB0000
heap
page read and write
170E000
stack
page read and write
28F25619000
trusted library allocation
page read and write
1796000
heap
page read and write
2FBE000
heap
page read and write
978000
heap
page read and write
26FE000
direct allocation
page read and write
28F255A3000
trusted library allocation
page read and write
28F41F89000
heap
page read and write
2B4E000
stack
page read and write
400000
unkown
page execute and read and write
7FFD9B785000
trusted library allocation
page read and write
4021000
unkown
page read and write
2FC7000
heap
page read and write
7FFD9B5E6000
trusted library allocation
page execute and read and write
FF0000
unkown
page readonly
4ACD000
stack
page read and write
7FFD9B620000
trusted library allocation
page execute and read and write
28F250D0000
trusted library section
page read and write
95D18FE000
stack
page read and write
1E36E000
stack
page read and write
339E000
stack
page read and write
7FF4A8419000
trusted library allocation
page execute read
2A7F1000
heap
page read and write
28F41D44000
heap
page read and write
28F251B0000
heap
page read and write
2722000
direct allocation
page read and write
40C000
unkown
page readonly
61ED0000
direct allocation
page read and write
2A7A8000
heap
page read and write
28F41F65000
heap
page read and write
28F23625000
heap
page read and write
246F0000
heap
page read and write
1798000
heap
page read and write
24792000
heap
page read and write
28F253EE000
trusted library allocation
page read and write
26B4000
direct allocation
page read and write
2FB7000
heap
page read and write
761000
unkown
page read and write
7FFD9B774000
trusted library allocation
page read and write
27A0000
direct allocation
page execute and read and write
9DA000
heap
page read and write
2471F000
heap
page read and write
28F425E0000
trusted library section
page readonly
9A3000
heap
page read and write
FE0000
heap
page read and write
49CC000
stack
page read and write
28F3DFC0000
trusted library section
page read and write
30E0000
direct allocation
page read and write
2472B000
heap
page read and write
28F3DBB5000
heap
page read and write
5E5F000
stack
page read and write
2FBA000
heap
page read and write
28F23570000
heap
page read and write
28F2241B000
unkown
page readonly
30EE000
stack
page read and write
6C031000
unkown
page execute read
28F3DB6C000
heap
page read and write
928000
heap
page read and write
28F1FBE0000
unkown
page readonly
24710000
heap
page read and write
2471B000
heap
page read and write
2FC8000
heap
page read and write
28F3DBFA000
heap
page read and write
2A7F4000
heap
page read and write
28F3DB4F000
heap
page read and write
9B000
stack
page read and write
9D7000
heap
page read and write
2F33000
heap
page read and write
95D23FA000
stack
page read and write
2470C000
heap
page read and write
7FFD9B5B6000
trusted library allocation
page read and write
28F256B3000
trusted library allocation
page read and write
5EDE000
stack
page read and write
2DA5000
heap
page read and write
910000
heap
page read and write
2FA7000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
28F42035000
heap
page read and write
1797000
heap
page read and write
28F25554000
trusted library allocation
page read and write
2698000
direct allocation
page read and write
7FF4A841F000
trusted library allocation
page execute read
2656000
direct allocation
page read and write
28F42012000
heap
page read and write
980000
heap
page read and write
4023000
unkown
page readonly
61EB7000
direct allocation
page readonly
97000
stack
page read and write
28F236BF000
heap
page read and write
54BF000
stack
page read and write
28F23810000
trusted library allocation
page read and write
28F42094000
heap
page read and write
5650000
heap
page read and write
3161A000
heap
page read and write
7FFD9B750000
trusted library allocation
page read and write
2A7AF000
heap
page read and write
5C1E000
stack
page read and write
61ED3000
direct allocation
page read and write
2FC2000
heap
page read and write
28F41F67000
heap
page read and write
28F2591F000
trusted library allocation
page read and write
19B000
stack
page read and write
7FFD9B729000
trusted library allocation
page read and write
28F41EE2000
heap
page read and write
2472B000
heap
page read and write
2472B000
heap
page read and write
2790000
heap
page read and write
28F41F50000
trusted library allocation
page read and write
5BB0000
heap
page read and write
4050000
heap
page read and write
26BC000
direct allocation
page read and write
28F41E07000
heap
page read and write
1BE0000
heap
page read and write
95D0D5F000
stack
page read and write
7FFD9B782000
trusted library allocation
page read and write
2471E000
heap
page read and write
28F3DBD0000
heap
page read and write
95D1EF8000
stack
page read and write
4A70000
heap
page read and write
6C20E000
unkown
page read and write
2A9CF000
stack
page read and write
4AC2000
heap
page read and write
334F000
stack
page read and write
7FFD9B50D000
trusted library allocation
page execute and read and write
28F41F86000
heap
page read and write
28F236E9000
heap
page read and write
55FC000
stack
page read and write
267E000
direct allocation
page read and write
7FFD9B716000
trusted library allocation
page read and write
28F41F60000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
2730000
direct allocation
page read and write
9CD000
heap
page read and write
24707000
heap
page read and write
28F23800000
trusted library allocation
page read and write
95D1FF7000
stack
page read and write
28F41FFA000
heap
page read and write
2FBE000
heap
page read and write
6C20F000
unkown
page write copy
95D21FB000
stack
page read and write
636000
unkown
page execute and read and write
7FF4A841A000
trusted library allocation
page readonly
7FFD9B7D8000
trusted library allocation
page read and write
24710000
heap
page read and write
40D7000
heap
page read and write
1796000
heap
page read and write
95D28FA000
stack
page read and write
28F3527F000
trusted library allocation
page read and write
24704000
heap
page read and write
28F41E3F000
heap
page read and write
5DCB000
heap
page read and write
95D25F9000
stack
page read and write
2AA74000
heap
page read and write
7FFD9B700000
trusted library allocation
page read and write
2EEA000
heap
page read and write
6BF90000
unkown
page readonly
7FFD9B6E0000
trusted library allocation
page read and write
9DE000
heap
page read and write
7FFD9BA60000
trusted library allocation
page execute and read and write
28F255F5000
trusted library allocation
page read and write
1E4BD000
stack
page read and write
28F236E7000
heap
page read and write
19B000
stack
page read and write
95D24FE000
stack
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
9C0000
heap
page read and write
2471E000
heap
page read and write
349F000
stack
page read and write
28F1FBE2000
unkown
page readonly
268D000
direct allocation
page read and write
26EF000
direct allocation
page read and write
16B0000
heap
page read and write
28F236DE000
heap
page read and write
40D0000
heap
page read and write
96F000
heap
page read and write
2EE0000
heap
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
28F25100000
trusted library section
page read and write
549000
unkown
page execute and read and write
2C3F000
unkown
page readonly
19E000
stack
page read and write
77B000
unkown
page write copy
28F23590000
heap
page read and write
28F3E070000
trusted library section
page read and write
273F000
direct allocation
page read and write
5E9E000
stack
page read and write
F90000
heap
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
96D000
heap
page read and write
28F236FE000
heap
page read and write
2F5C000
heap
page read and write
24707000
heap
page read and write
2DF5000
heap
page read and write
7FFD9B55C000
trusted library allocation
page execute and read and write
2470B000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
28F3DB87000
heap
page read and write
7FFD9B7C8000
trusted library allocation
page read and write
246F6000
heap
page read and write
9ED000
heap
page read and write
9B9000
heap
page read and write
28F3DAC4000
heap
page execute and read and write
7FF4A8413000
trusted library allocation
page execute read
FDE000
stack
page read and write
24723000
heap
page read and write
28F235D0000
heap
page read and write
4290000
heap
page read and write
41F000
unkown
page readonly
95D11F7000
stack
page read and write
28F3DB9A000
heap
page read and write
197000
stack
page read and write
2FCC000
heap
page read and write
8FE000
stack
page read and write
28F41D9F000
heap
page read and write
30AB0000
trusted library allocation
page read and write
1DFCF000
stack
page read and write
24729000
heap
page read and write
2DEE000
stack
page read and write
5A00000
heap
page read and write
7FFD9B72B000
trusted library allocation
page read and write
2470B000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page execute and read and write
4A71000
heap
page read and write
178F000
heap
page read and write
2FCF000
heap
page read and write
95F000
heap
page read and write
28F41EA5000
heap
page read and write
2771000
direct allocation
page read and write
4400000
heap
page read and write
177F000
heap
page read and write
28F4208C000
heap
page read and write
6C215000
unkown
page readonly
967000
heap
page read and write
2A780000
heap
page read and write
28F3DB7B000
heap
page read and write
31610000
heap
page read and write
2A838000
heap
page read and write
FF0000
unkown
page readonly
7FFD9B810000
trusted library allocation
page read and write
16A0000
heap
page read and write
28F42032000
heap
page read and write
43BF000
stack
page read and write
2FD0000
heap
page read and write
32030000
heap
page read and write
2471E000
heap
page read and write
274D000
direct allocation
page read and write
994000
heap
page read and write
5D1F000
stack
page read and write
2470C000
heap
page read and write
2A83B000
heap
page read and write
2A7BC000
heap
page read and write
28F25120000
heap
page execute and read and write
324E000
stack
page read and write
28F3E520000
trusted library section
page read and write
177B000
heap
page read and write
28F3DBBB000
heap
page read and write
96D000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
9E0000
heap
page read and write
28F236E4000
heap
page read and write
28F42208000
heap
page read and write
9B0000
heap
page read and write
2C50000
heap
page read and write
2472B000
heap
page read and write
1213000
unkown
page readonly
7FF4A841B000
trusted library allocation
page execute read
3563000
heap
page read and write
400000
unkown
page readonly
194000
stack
page read and write
28F25988000
trusted library allocation
page read and write
4242000
heap
page read and write
95D2AFD000
stack
page read and write
269D000
direct allocation
page read and write
28F3E4F0000
trusted library allocation
page read and write
28F3E500000
trusted library section
page read and write
95D2CFF000
stack
page read and write
401000
unkown
page execute read
28F42674000
trusted library allocation
page read and write
1E60E000
stack
page read and write
28F2551B000
trusted library allocation
page read and write
1E3BE000
stack
page read and write
95D10EB000
stack
page read and write
28F41E38000
heap
page read and write
28F3DAD0000
heap
page read and write
31A0000
heap
page read and write
28F3DA90000
trusted library section
page read and write
6BF91000
unkown
page execute read
1209000
unkown
page write copy
9C5000
heap
page read and write
41C000
unkown
page write copy
26AB000
direct allocation
page read and write
28F420D0000
heap
page read and write
2650000
direct allocation
page read and write
4289000
heap
page read and write
28F250F3000
heap
page read and write
9AE000
heap
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
95D1CF4000
stack
page read and write
28F3527C000
trusted library allocation
page read and write
28F2363F000
heap
page read and write
28F25513000
trusted library allocation
page read and write
2FCD000
heap
page read and write
3560000
heap
page read and write
179B000
heap
page read and write
24707000
heap
page read and write
75E000
unkown
page read and write
7FFD9B503000
trusted library allocation
page execute and read and write
61ECD000
direct allocation
page readonly
7FF4A8412000
trusted library allocation
page readonly
2CEC000
stack
page read and write
7FFD9B70D000
trusted library allocation
page read and write
26F6000
direct allocation
page read and write
2A834000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
5EF0000
heap
page read and write
9AB000
heap
page read and write
1748000
heap
page read and write
246FD000
heap
page read and write
26A4000
direct allocation
page read and write
8B0000
heap
page read and write
1E50E000
stack
page read and write
119C000
unkown
page readonly
2471E000
heap
page read and write
24710000
heap
page read and write
28F235D5000
heap
page read and write
409E000
stack
page read and write
28F3DBB8000
heap
page read and write
1BE5000
heap
page read and write
28F42010000
heap
page read and write
59E5000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1789000
heap
page read and write
40D5000
heap
page read and write
28F41D4C000
heap
page read and write
7FFD9B730000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B87F000
trusted library allocation
page read and write
24706000
heap
page read and write
61E01000
direct allocation
page execute read
28F3DB59000
heap
page read and write
28F25591000
trusted library allocation
page read and write
2676000
direct allocation
page read and write
24710000
heap
page read and write
28F2101B000
unkown
page readonly
7FF4A8418000
trusted library allocation
page readonly
41CA000
heap
page read and write
28F2559D000
trusted library allocation
page read and write
28F2562D000
trusted library allocation
page read and write
2470D000
heap
page read and write
28F23600000
heap
page read and write
2A802000
heap
page read and write
246F6000
heap
page read and write
7FFD9B510000
trusted library allocation
page read and write
28F25110000
trusted library section
page read and write
61E00000
direct allocation
page execute and read and write
7FFD9B504000
trusted library allocation
page read and write
2FCD000
heap
page read and write
2AA73000
heap
page read and write
1E0CF000
stack
page read and write
7FFD9B524000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
28F41E4E000
heap
page read and write
41CE000
heap
page read and write
28F41FF3000
heap
page read and write
119C000
unkown
page readonly
28F250C0000
trusted library section
page read and write
263C000
heap
page read and write
7FFD9B52B000
trusted library allocation
page execute and read and write
28F25140000
heap
page read and write
953000
heap
page read and write
2A82C000
heap
page read and write
1E780000
trusted library allocation
page read and write
24703000
heap
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
24707000
heap
page read and write
2470A000
heap
page read and write
28F257A5000
trusted library allocation
page read and write
9E2000
heap
page read and write
9B2000
heap
page read and write
778000
unkown
page read and write
1E11E000
stack
page read and write
30DF000
stack
page read and write
4A80000
heap
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
28F3DC15000
heap
page read and write
28F42066000
heap
page read and write
28F3E1D0000
trusted library section
page read and write
2705000
direct allocation
page read and write
2530000
heap
page read and write
2DA0000
heap
page read and write
9EB000
heap
page read and write
28F23860000
trusted library allocation
page read and write
7FFD9B81B000
trusted library allocation
page read and write
75E000
unkown
page write copy
2D30000
heap
page read and write
28F3E4E0000
trusted library allocation
page read and write
7FF4A8411000
trusted library allocation
page execute read
26D9000
direct allocation
page read and write
28F421A3000
heap
page read and write
61EB4000
direct allocation
page read and write
1789000
heap
page read and write
95D1BF1000
stack
page read and write
2A805000
heap
page read and write
2FC5000
heap
page read and write
7FFD9B710000
trusted library allocation
page read and write
1680000
heap
page read and write
26D2000
direct allocation
page read and write
2FCB000
heap
page read and write
2663000
direct allocation
page read and write
429A000
heap
page read and write
28F41F40000
trusted library allocation
page read and write
28F41E43000
heap
page read and write
28F35298000
trusted library allocation
page read and write
2470C000
heap
page read and write
813000
unkown
page readonly
986000
heap
page read and write
7FFD9B6D4000
trusted library allocation
page read and write
1200000
unkown
page write copy
95D15FB000
stack
page read and write
2694000
direct allocation
page read and write
7FF4A8417000
trusted library allocation
page execute read
51CE000
stack
page read and write
1200000
unkown
page read and write
28F3DBC7000
heap
page read and write
266F000
direct allocation
page read and write
24729000
heap
page read and write
28F4205F000
heap
page read and write
2763000
direct allocation
page read and write
2AA79000
heap
page read and write
2A760000
heap
page read and write
28F41D5F000
heap
page read and write
28F3DB4C000
heap
page read and write
24708000
heap
page read and write
28F41EF1000
heap
page read and write
28F23560000
heap
page read and write
95D26FF000
stack
page read and write
26E1000
direct allocation
page read and write
28F23490000
unkown
page readonly
7FFD9B500000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
99D000
heap
page read and write
BEF000
stack
page read and write
2FB5000
heap
page read and write
7FFD9B8D7000
trusted library allocation
page read and write
28F351C1000
trusted library allocation
page read and write
7FF4A8416000
trusted library allocation
page readonly
7FFD9B6B0000
trusted library allocation
page read and write
28F3DB95000
heap
page read and write
87E000
unkown
page readonly
24708000
heap
page read and write
1720000
heap
page read and write
2DED000
stack
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
440B000
heap
page read and write
28F3DD60000
heap
page read and write
3B6E000
stack
page read and write
28F3DBCC000
heap
page read and write
7FFD9B877000
trusted library allocation
page read and write
28F3DB75000
heap
page read and write
2FD9000
heap
page read and write
28F351DC000
trusted library allocation
page read and write
624000
unkown
page execute and read and write
28F25090000
trusted library section
page read and write
2FC2000
heap
page read and write
26E8000
direct allocation
page read and write
1213000
unkown
page readonly
2714000
direct allocation
page read and write
2E00000
direct allocation
page execute and read and write
2685000
direct allocation
page read and write
28F42241000
heap
page read and write
9B6000
heap
page read and write
401000
unkown
page execute read
7FFD9B740000
trusted library allocation
page read and write
98B000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
276A000
direct allocation
page read and write
16B5000
heap
page read and write
28F237E0000
trusted library allocation
page read and write
2630000
heap
page read and write
28F42225000
heap
page read and write
920000
heap
page read and write
2AA6C000
heap
page read and write
2470C000
heap
page read and write
417000
unkown
page execute read
2470C000
heap
page read and write
31EF000
stack
page read and write
41C000
unkown
page execute read
2472B000
heap
page read and write
95D17FD000
stack
page read and write
24710000
heap
page read and write
95D20F6000
stack
page read and write
28F41DBE000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
97D000
heap
page read and write
1B0E000
stack
page read and write
4227000
heap
page read and write
2D7E000
stack
page read and write
1690000
heap
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
120A000
unkown
page read and write
1694000
heap
page read and write
FF1000
unkown
page execute read
247A2000
heap
page read and write
7FF4A8420000
trusted library allocation
page execute and read and write
2C4E000
stack
page read and write
28F42105000
heap
page read and write
28F3D54F000
heap
page read and write
28F3DBC3000
heap
page read and write
28F2550F000
trusted library allocation
page read and write
95D0DDF000
stack
page read and write
28F251C1000
trusted library allocation
page read and write
527E000
stack
page read and write
9C4000
heap
page read and write
2472C000
heap
page read and write
40D7000
heap
page read and write
28F42064000
heap
page read and write
774000
unkown
page read and write
28F3D1F0000
trusted library allocation
page read and write
28F250F0000
heap
page read and write
2FCF000
heap
page read and write
2FBF000
heap
page read and write
31B21000
heap
page read and write
28F442E0000
trusted library allocation
page read and write
95C000
heap
page read and write
28F41F72000
heap
page read and write
31C0000
heap
page read and write
28F3DBB3000
heap
page read and write
2F60000
heap
page read and write
28F42692000
trusted library allocation
page read and write
2AA40000
heap
page read and write
400000
unkown
page readonly
28F42009000
heap
page read and write
28F41FF8000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
45C000
unkown
page write copy
900000
heap
page read and write
7FF4A8415000
trusted library allocation
page execute read
139E000
stack
page read and write
28F42020000
heap
page read and write
32CF000
stack
page read and write
7FFD9B78C000
trusted library allocation
page read and write
7FFD9BA16000
trusted library allocation
page read and write
959000
heap
page read and write
95D0D9E000
stack
page read and write
7FFD9B5BC000
trusted library allocation
page execute and read and write
7FF4A8401000
trusted library allocation
page execute read
963000
heap
page read and write
28F4224D000
heap
page read and write
7FFD9B720000
trusted library allocation
page read and write
C2E000
stack
page read and write
28F443B0000
trusted library allocation
page read and write
2472B000
heap
page read and write
4A7B000
heap
page read and write
246F6000
heap
page read and write
3EB0000
heap
page read and write
7FFD9B513000
trusted library allocation
page read and write
94C000
heap
page read and write
2470C000
heap
page read and write
2A8CE000
stack
page read and write
24703000
heap
page read and write
24710000
heap
page read and write
1740000
heap
page read and write
28F41D40000
heap
page read and write
7FFD9B51D000
trusted library allocation
page execute and read and write
28F420B2000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
4A8A000
heap
page read and write
970000
heap
page read and write
95D1AFB000
stack
page read and write
246F7000
heap
page read and write
28F236E1000
heap
page read and write
6C022000
unkown
page readonly
4284000
heap
page read and write
537F000
stack
page read and write
2FCF000
heap
page read and write
76A000
unkown
page read and write
28F41F26000
heap
page read and write
9B5000
heap
page read and write
28F42027000
heap
page read and write
2E00000
heap
page read and write
28F235B0000
heap
page read and write
246F8000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9B6CE000
trusted library allocation
page read and write
9DC000
heap
page read and write
28F3E4D0000
trusted library allocation
page read and write
7FFD9B6CB000
trusted library allocation
page read and write
783000
unkown
page readonly
28F3DB7F000
heap
page read and write
9C000
stack
page read and write
401000
unkown
page execute read
2FB9000
heap
page read and write
95D1DFC000
stack
page read and write
28F41D7B000
heap
page read and write
28F25935000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page execute and read and write
1E681000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
28F23870000
heap
page read and write
951000
heap
page read and write
50CE000
stack
page read and write
1E680000
heap
page read and write
28F41FC9000
heap
page read and write
2A7B5000
heap
page read and write
1E670000
heap
page read and write
7FFD9B856000
trusted library allocation
page read and write
197000
stack
page read and write
7FFD9B888000
trusted library allocation
page read and write
416000
unkown
page write copy
2778000
direct allocation
page read and write
28F25130000
trusted library section
page read and write
6C030000
unkown
page readonly
28F23813000
trusted library allocation
page read and write
24729000
heap
page read and write
95D27FD000
stack
page read and write
5DEC000
heap
page read and write
28F2558D000
trusted library allocation
page read and write
1E26E000
stack
page read and write
4276000
heap
page read and write
2A7A3000
heap
page read and write
28F2061B000
unkown
page readonly
266C000
direct allocation
page read and write
There are 782 hidden memdumps, click here to show them.