IOC Report
photographed.dat.dll

loading gif

Files

File Path
Type
Category
Malicious
photographed.dat.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_34d063e1f8b4a0a973e2832d9ca94882ab2137_82810a17_1c1229dd\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_34d063e1f8b4a0a973e2832d9ca94882ab2137_82810a17_1dd23bb0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_34d063e1f8b4a0a973e2832d9ca94882ab2137_82810a17_1de23ba0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_fce87c8f307b30dca7c45f44ed2a364c18519efd_82810a17_13262a0c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_fce87c8f307b30dca7c45f44ed2a364c18519efd_82810a17_14da29be\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_fce87c8f307b30dca7c45f44ed2a364c18519efd_82810a17_1bd22a0c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_fce87c8f307b30dca7c45f44ed2a364c18519efd_82810a17_1d0a3a87\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_fce87c8f307b30dca7c45f44ed2a364c18519efd_82810a17_1d123b42\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER14BF.tmp.dmp
Mini DuMP crash report, 14 streams, Wed May 31 21:23:18 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER15E9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1657.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER20E4.tmp.dmp
Mini DuMP crash report, 14 streams, Wed May 31 21:23:21 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2337.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2396.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F8A.tmp.dmp
Mini DuMP crash report, 14 streams, Wed May 31 21:23:25 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2FB9.tmp.dmp
Mini DuMP crash report, 14 streams, Wed May 31 21:23:25 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER30F2.tmp.dmp
Mini DuMP crash report, 14 streams, Wed May 31 21:23:26 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3121.tmp.dmp
Mini DuMP crash report, 14 streams, Wed May 31 21:23:26 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER324B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER327A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER32B9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3318.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3567.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER35C6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3604.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3691.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB3A.tmp.dmp
Mini DuMP crash report, 14 streams, Wed May 31 21:23:16 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB78.tmp.dmp
Mini DuMP crash report, 14 streams, Wed May 31 21:23:16 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCD1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD01.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD10.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 63843 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\GM1SFAFG.htm
HTML document, Unicode text, UTF-8 text, with very long lines (540)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\t5[1]
ASCII text, with no line terminators
modified
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.tmp
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.tmp.LOG1
MS Windows registry file, NT/2000 or above
dropped
There are 31 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\photographed.dat.dll"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\photographed.dat.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\photographed.dat.dll,m?0?$_SpinWait@$00@details@Concurrency@@QAE@P6AXXZ@Z
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\photographed.dat.dll",#1
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5684 -s 660
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7136 -s 664
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\photographed.dat.dll,m?0?$_SpinWait@$0A@@details@Concurrency@@QAE@P6AXXZ@Z
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 652
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\photographed.dat.dll,m?0SchedulerPolicy@Concurrency@@QAA@IZZ
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7216 -s 648
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\photographed.dat.dll",m?0?$_SpinWait@$00@details@Concurrency@@QAE@P6AXXZ@Z
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\photographed.dat.dll",m?0?$_SpinWait@$0A@@details@Concurrency@@QAE@P6AXXZ@Z
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\photographed.dat.dll",m?0SchedulerPolicy@Concurrency@@QAA@IZZ
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\photographed.dat.dll",next
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\photographed.dat.dll",mwait_for_multiple@event@Concurrency@@SAIPAPAV12@I_NI@Z
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\photographed.dat.dll",mwait_for_all@agent@Concurrency@@SAXIPAPAV12@PAW4agent_status@2@I@Z
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7332 -s 652
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7340 -s 652
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7348 -s 648
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7416 -s 648
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\SysWOW64\ipconfig.exe
ipconfig /all
malicious
C:\Windows\SysWOW64\whoami.exe
whoami /all
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
There are 17 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.linkedin.com/talent/post-a-job?trk=homepage-basic_talent-finder-cta
unknown
https://sg.linkedin.com/
unknown
https://nz.linkedin.com/
unknown
https://www.linkedin.com/jobs/quality-assurance-jobs-h
unknown
https://www.linkedin.com/pulse/topics/marketing-s2461/
unknown
https://bo.linkedin.com/
unknown
https://cn.linkedin.com/
unknown
https://kr.linkedin.com/
unknown
https://sv.linkedin.com/
unknown
https://www.linkedin.com/signup?trk=guest_homepage-basic_directory
unknown
https://www.linkedin.com/legal/copyright-policy?trk=homepage-basic_footer-copyright-policy
unknown
https://static.licdn.com/aero-v1/sc/h/e12h2cd8ac580qen9qdd0qks8
unknown
https://about.linkedin.com/?trk=homepage-basic_directory_aboutUrl
unknown
https://www.linkedin.com/jobs/search?trk=guest_homepage-basic_guest_nav_menu_jobs
unknown
https://ec.linkedin.com/
unknown
https://about.linkedin.com?trk=homepage-basic_footer-about
unknown
https://ie.linkedin.com/
unknown
https://www.linkedin.com/learning/topics/business-software-and-tools?trk=homepage-basic_learning-cta
unknown
https://ae.linkedin.com/
unknown
https://uk.linkedin.com/
unknown
https://www.linkedin.com/salary/?trk=homepage-basic_directory_salaryHomeUrl
unknown
https://static.licdn.com/aero-v1/sc/h/75y9ng27ydl2d46fam5nanne5
unknown
https://developer.linkedin.com/?trk=homepage-basic_directory_developerMicrositeUrl
unknown
https://www.linkedin.com/directory/posts?trk=homepage-basic_directory_postsDirectoryUrl
unknown
https://www.linkedin.com/jobs/operations-jobs-h
unknown
https://www.linkedin.com/learning/topics/artificial-intelligence?trk=homepage-basic_learning-cta
unknown
https://www.linkedin.com/pulse/topics/healthcare-s282/
unknown
https://in.linkedin.com/
unknown
https://www.linkedin.com/directory/featured?trk=homepage-basic_directory_featuredDirectoryUrl
unknown
https://www.linkedin.com/learning/topics/audio-and-music?trk=homepage-basic_learning-cta
unknown
https://www.linkedin.com/learning/topics/training-and-education?trk=homepage-basic_learning-cta
unknown
https://hk.linkedin.com/
unknown
https://www.linkedin.com/learning/topics/visualization-and-real-time?trk=homepage-basic_learning-cta
unknown
https://at.linkedin.com/
unknown
https://www.linkedin.com/pulse/topics/construction-management-s831/
unknown
https://www.linkedin.com/jobs/education-jobs-h
unknown
https://www.linkedin.com/learning/topics/project-management?trk=homepage-basic_learning-cta
unknown
https://www.linkedin.com/directory/articles?trk=homepage-basic_directory_articlesDirectoryUrl
unknown
https://www.linkedin.com/pulse/topics/public-administration-s3697/
unknown
https://za.linkedin.com/
unknown
https://www.linkedin.com/directory/services?trk=homepage-basic_directory_servicesDirectoryUrl
unknown
https://jm.linkedin.com/
unknown
https://no.linkedin.com/
unknown
https://www.linkedin.com/directory/learning?trk=homepage-basic_directory_learningDirectoryUrl
unknown
https://www.linkedin.com/jobs/entrepreneurship-jobs-h
unknown
https://pe.linkedin.com/
unknown
https://www.linkedin.com/directory/advice?trk=homepage-basic_directory_adviceDirectoryUrl
unknown
https://au.linkedin.com/
unknown
https://static.licdn.com/aero-v1/sc/h/ddi43qwelxeqjxdd45pe3fvs1
unknown
https://www.linkedin.com/jobs/administrative-assistant-jobs-h
unknown
https://www.linkedin.com/legal/professional-community-policies?trk=homepage-basic_footer-community-g
unknown
https://www.linkedin.com/legal/cookie-policy?trk=homepage-basic_footer-cookie-policy
unknown
https://www.linkedin.com/signup?trk=guest_homepage-basic_nav-header-join
unknown
https://www.linkedin.com/signup?trk=homepage-basic_join-cta
unknown
https://www.linkedin.com/learning/topics/sales-3?trk=homepage-basic_learning-cta
unknown
https://www.linkedin.com/legal/cookie-policy
unknown
https://static.licdn.com/aero-v1/sc/h/51t74mlo1ty7vakn3a80a9jcp
unknown
https://static.licdn.com/aero-v1/sc/h/8fkga714vy9b2wk5auqo5reeb
unknown
https://www.linkedin.com/learning/topics/data-science?trk=homepage-basic_learning-cta
unknown
https://cr.linkedin.com/
unknown
https://www.linkedin.com/learning/topics/mobile-development?trk=homepage-basic_learning-cta
unknown
https://gt.linkedin.com/
unknown
https://ph.linkedin.com/
unknown
https://www.linkedin.com/learning/topics/leadership-and-management?trk=homepage-basic_learning-cta
unknown
https://www.linkedin.com/learning/topics/network-and-system-administration?trk=homepage-basic_learni
unknown
https://www.linkedin.com/learning/search?trk=guest_homepage-basic_guest_nav_menu_learning
unknown
https://www.linkedin.com/learning/topics/customer-service-3?trk=homepage-basic_learning-cta
unknown
https://www.linkedin.com/jobs/jobs-in-h
unknown
https://fr.linkedin.com/
unknown
https://mobile.linkedin.com/?trk=homepage-basic_directory_mobileMicrositeUrl
unknown
https://www.linkedin.com/jobs/purchasing-jobs-h
unknown
https://www.linkedin.com/learning/topics/security-3?trk=homepage-basic_learning-cta
unknown
https://www.linkedin.com/learning/search?trk=homepage-basic_brand-discovery_intent-module-thirdBtn
unknown
https://www.linkedin.com/learning/topics/it-help-desk-5?trk=homepage-basic_learning-cta
unknown
https://www.linkedin.com/jobs/arts-and-design-jobs-h
unknown
https://www.linkedin.com/directory/products?trk=homepage-basic_directory_productsDirectoryUrl
unknown
https://business.linkedin.com/talent-solutions?src=li-footer&utm_source=linkedin&utm_medium=
unknown
https://www.linkedin.com/directory/news?trk=homepage-basic_directory_newsDirectoryUrl
unknown
https://zw.linkedin.com/
unknown
https://co.linkedin.com/
unknown
https://ru.linkedin.com/
unknown
https://ca.linkedin.com/
unknown
https://ke.linkedin.com/
unknown
https://www.linkedin.com/learning/topics/career-development-5?trk=homepage-basic_learning-cta
unknown
https://www.linkedin.com/mypreferences/g/guest-cookies
unknown
https://www.linkedin.com/products?trk=homepage-basic_directory_productsHomeUrl
unknown
https://static.licdn.com/aero-v1/sc/h/7kb6sn3tm4cx918cx9a5jlb0
unknown
https://static.licdn.com/aero-v1/sc/h/8wykgzgbqy0t3fnkgborvz54u
unknown
https://de.linkedin.com/
unknown
https://static.licdn.com/aero-v1/sc/h/2r8kd5zqpi905lkzsshdlvvn5
unknown
https://www.linkedin.com/jobs/retail-associate-jobs-h
unknown
https://www.linkedin.com/learning/topics/product-and-manufacturing?trk=homepage-basic_learning-cta
unknown
https://www.linkedin.com/psettings/guest-controls?trk=homepage-basic_footer-guest-controls
unknown
https://business.linkedin.com/marketing-solutions?src=li-footer&utm_source=linkedin&utm_medi
unknown
https://www.linkedin.com/help/linkedin?lang=en&trk=homepage-basic_directory_helpCenterUrl
unknown
https://pk.linkedin.com/
unknown
https://jp.linkedin.com/
unknown
https://www.linkedin.com/learning/topics/human-resources-3?trk=homepage-basic_learning-cta
unknown
https://static.licdn.com/aero-v1/sc/h/al2o9zrvru7aqj8e1x2rzsrca
unknown
https://www.linkedin.com/jobs/real-estate-jobs-h
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
linkedin.com
13.107.42.14
www.linkedin.com
unknown

IPs

IP
Domain
Country
Malicious
91.165.188.74
unknown
France
malicious
2.82.8.80
unknown
Portugal
malicious
70.160.67.203
unknown
United States
malicious
75.143.236.149
unknown
United States
malicious
83.110.223.61
unknown
United Arab Emirates
malicious
84.215.202.8
unknown
Norway
malicious
184.182.66.109
unknown
United States
malicious
161.129.37.43
unknown
United States
malicious
92.186.69.229
unknown
France
malicious
174.4.89.3
unknown
Canada
malicious
161.142.103.187
unknown
Malaysia
malicious
116.74.164.144
unknown
India
malicious
76.185.109.16
unknown
United States
malicious
114.143.176.236
unknown
India
malicious
24.234.220.88
unknown
United States
malicious
14.192.241.76
unknown
Malaysia
malicious
123.3.240.16
unknown
Australia
malicious
173.88.135.179
unknown
United States
malicious
47.34.30.133
unknown
United States
malicious
183.87.163.165
unknown
India
malicious
184.181.75.148
unknown
United States
malicious
124.149.143.189
unknown
Australia
malicious
70.49.205.198
unknown
Canada
malicious
84.35.26.14
unknown
Netherlands
malicious
37.14.229.220
unknown
Spain
malicious
102.159.223.197
unknown
Tunisia
malicious
165.120.169.171
unknown
United States
malicious
79.92.15.6
unknown
France
malicious
68.203.69.96
unknown
United States
malicious
64.121.161.102
unknown
United States
malicious
96.56.197.26
unknown
United States
malicious
178.175.187.254
unknown
Moldova Republic of
malicious
186.64.67.30
unknown
Argentina
malicious
188.28.19.84
unknown
United Kingdom
malicious
125.99.76.102
unknown
India
malicious
103.87.128.228
unknown
India
malicious
86.248.228.57
unknown
France
malicious
59.28.84.65
unknown
Korea Republic of
malicious
76.86.31.59
unknown
United States
malicious
147.147.30.126
unknown
United Kingdom
malicious
96.87.28.170
unknown
United States
malicious
75.109.111.89
unknown
United States
malicious
78.92.133.215
unknown
Hungary
malicious
88.126.94.4
unknown
France
malicious
124.122.47.148
unknown
Thailand
malicious
85.57.212.13
unknown
Spain
malicious
47.205.25.170
unknown
United States
malicious
95.45.50.93
unknown
Ireland
malicious
80.12.88.148
unknown
France
malicious
69.133.162.35
unknown
United States
malicious
151.62.238.176
unknown
Italy
malicious
205.237.67.69
unknown
Canada
malicious
201.143.215.69
unknown
Mexico
malicious
94.30.98.134
unknown
United Kingdom
malicious
76.178.148.107
unknown
United States
malicious
69.242.31.249
unknown
United States
malicious
85.104.105.67
unknown
Turkey
malicious
92.239.81.124
unknown
United Kingdom
malicious
76.16.49.134
unknown
United States
malicious
201.244.108.183
unknown
Colombia
malicious
103.42.86.42
unknown
India
malicious
103.144.201.56
unknown
unknown
malicious
116.120.145.170
unknown
Korea Republic of
malicious
103.139.242.6
unknown
India
malicious
70.28.50.223
unknown
Canada
malicious
98.145.23.67
unknown
United States
malicious
81.229.117.95
unknown
Sweden
malicious
89.129.109.27
unknown
Spain
malicious
45.51.102.225
unknown
United States
malicious
27.109.19.90
unknown
India
malicious
122.186.210.254
unknown
India
malicious
79.77.142.22
unknown
United Kingdom
malicious
122.184.143.86
unknown
India
malicious
50.68.186.195
unknown
Canada
malicious
213.55.33.103
unknown
France
malicious
180.151.229.230
unknown
India
malicious
12.172.173.82
unknown
United States
malicious
47.199.241.39
unknown
United States
malicious
79.168.224.165
unknown
Portugal
malicious
199.27.66.213
unknown
United States
malicious
176.142.207.63
unknown
France
malicious
90.29.86.138
unknown
France
malicious
149.74.159.67
unknown
United States
malicious
174.58.146.57
unknown
United States
malicious
78.160.146.127
unknown
Turkey
malicious
223.166.13.95
unknown
China
malicious
58.186.75.42
unknown
Viet Nam
malicious
65.95.141.84
unknown
Canada
malicious
50.68.204.71
unknown
Canada
malicious
71.38.155.217
unknown
United States
malicious
117.195.29.126
unknown
India
malicious
220.240.164.182
unknown
Australia
malicious
103.123.223.133
unknown
India
malicious
198.2.51.242
unknown
United States
malicious
27.99.32.26
unknown
Australia
malicious
94.204.232.135
unknown
United Arab Emirates
malicious
109.50.149.241
unknown
Portugal
malicious
69.123.4.221
unknown
United States
malicious
74.136.224.98
unknown
United States
malicious
200.84.200.20
unknown
Venezuela
malicious
There are 90 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiOverridePath
\REGISTRY\A\{2fe06450-f544-2d7f-a095-8d192186fdf2}\Root\InventoryApplicationFile
WritePermissionsCheck
\REGISTRY\A\{2fe06450-f544-2d7f-a095-8d192186fdf2}\Root\InventoryApplicationFile
ProviderSyncId
\REGISTRY\A\{2fe06450-f544-2d7f-a095-8d192186fdf2}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProgramId
\REGISTRY\A\{2fe06450-f544-2d7f-a095-8d192186fdf2}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
FileId
\REGISTRY\A\{2fe06450-f544-2d7f-a095-8d192186fdf2}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LowerCaseLongPath
\REGISTRY\A\{2fe06450-f544-2d7f-a095-8d192186fdf2}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LongPathHash
\REGISTRY\A\{2fe06450-f544-2d7f-a095-8d192186fdf2}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Name
\REGISTRY\A\{2fe06450-f544-2d7f-a095-8d192186fdf2}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Publisher
\REGISTRY\A\{2fe06450-f544-2d7f-a095-8d192186fdf2}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Version
\REGISTRY\A\{2fe06450-f544-2d7f-a095-8d192186fdf2}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinFileVersion
\REGISTRY\A\{2fe06450-f544-2d7f-a095-8d192186fdf2}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinaryType
\REGISTRY\A\{2fe06450-f544-2d7f-a095-8d192186fdf2}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductName
\REGISTRY\A\{2fe06450-f544-2d7f-a095-8d192186fdf2}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductVersion
\REGISTRY\A\{2fe06450-f544-2d7f-a095-8d192186fdf2}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LinkDate
\REGISTRY\A\{2fe06450-f544-2d7f-a095-8d192186fdf2}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinProductVersion
\REGISTRY\A\{2fe06450-f544-2d7f-a095-8d192186fdf2}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Size
\REGISTRY\A\{2fe06450-f544-2d7f-a095-8d192186fdf2}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Language
\REGISTRY\A\{2fe06450-f544-2d7f-a095-8d192186fdf2}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsPeFile
\REGISTRY\A\{2fe06450-f544-2d7f-a095-8d192186fdf2}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800A5D423B5C
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800A5D423B5C
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800A5D423B5C
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800A5D423B5C
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\Jiydhyo
7bb37c13
HKEY_CURRENT_USER\Software\Microsoft\Jiydhyo
4e2cac5d
HKEY_CURRENT_USER\Software\Microsoft\Jiydhyo
4c6d8c21
HKEY_CURRENT_USER\Software\Microsoft\Jiydhyo
f4d1eb44
HKEY_CURRENT_USER\Software\Microsoft\Jiydhyo
89d9a4ce
HKEY_CURRENT_USER\Software\Microsoft\Jiydhyo
3165c3ab
HKEY_CURRENT_USER\Software\Microsoft\Jiydhyo
f690cb38
HKEY_CURRENT_USER\Software\Microsoft\Jiydhyo
4fa13e5
HKEY_CURRENT_USER\Software\Microsoft\Jiydhyo
7bb37c13
HKEY_CURRENT_USER\Software\Microsoft\Jiydhyo
7bb37c13
HKEY_CURRENT_USER\Software\Microsoft\Jiydhyo
7bb37c13
There are 40 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
48D0000
heap
page read and write
malicious
CDA000
heap
page read and write
malicious
2C27000
heap
page read and write
E0F000
heap
page read and write
4980000
heap
page read and write
10033000
unkown
page read and write
64D0000
heap
page read and write
62D1000
heap
page read and write
BF3CCF9000
stack
page read and write
49C000
stack
page read and write
348A000
heap
page read and write
E0F000
heap
page read and write
EE0000
heap
page read and write
479E000
stack
page read and write
494F000
heap
page read and write
11D000
stack
page read and write
A90000
heap
page read and write
BF3D179000
stack
page read and write
DEA000
heap
page read and write
8D0000
heap
page read and write
E1A000
heap
page read and write
2164BD80000
trusted library allocation
page read and write
4A0000
heap
page read and write
DEE000
stack
page read and write
DEA000
heap
page read and write
E0F000
heap
page read and write
61D1000
heap
page read and write
E0F000
heap
page read and write
E13000
heap
page read and write
5B85000
heap
page read and write
E13000
heap
page read and write
E0F000
heap
page read and write
E13000
heap
page read and write
99A000
heap
page read and write
4510000
heap
page read and write
10033000
unkown
page read and write
F12000
direct allocation
page readonly
11B0000
trusted library allocation
page read and write
5A0000
heap
page read and write
DFA000
heap
page read and write
69EC000
heap
page read and write
2435D802000
heap
page read and write
4DB000
stack
page read and write
87C000
stack
page read and write
EF0000
heap
page read and write
10034000
unkown
page write copy
BF3D379000
stack
page read and write
10001000
unkown
page execute read
71E000
stack
page read and write
2435D513000
heap
page read and write
494F000
heap
page read and write
C3E000
stack
page read and write
10034000
unkown
page write copy
E0F000
heap
page read and write
9E0000
heap
page read and write
4A90000
trusted library allocation
page read and write
E13000
heap
page read and write
AFE000
stack
page read and write
E13000
heap
page read and write
DFD000
heap
page read and write
10036000
unkown
page readonly
E13000
heap
page read and write
E1A000
heap
page read and write
47DF000
stack
page read and write
11B0000
trusted library allocation
page read and write
860000
heap
page read and write
E13000
heap
page read and write
11B0000
trusted library allocation
page read and write
720000
heap
page read and write
540000
heap
page read and write
E0F000
heap
page read and write
E13000
heap
page read and write
8FD000
stack
page read and write
3060000
heap
page read and write
990000
heap
page read and write
DFD000
heap
page read and write
83F000
stack
page read and write
9BE000
stack
page read and write
61DF000
heap
page read and write
2435D502000
heap
page read and write
2164BC8D000
heap
page read and write
61DF000
heap
page read and write
E13000
heap
page read and write
DE0000
heap
page read and write
2C20000
heap
page read and write
5B0000
heap
page read and write
10034000
unkown
page write copy
86E000
stack
page read and write
DEA000
heap
page read and write
62D1000
heap
page read and write
2164CA60000
heap
page readonly
CC0000
heap
page read and write
61D3000
heap
page read and write
CD0000
heap
page read and write
2D20000
heap
page read and write
61D1000
heap
page read and write
DE4000
heap
page read and write
61D3000
heap
page read and write
1231000
heap
page read and write
5D0000
heap
page read and write
BB0000
heap
page read and write
10000000
unkown
page readonly
64DD000
heap
page read and write
2164CAD0000
trusted library allocation
page read and write
2164CA50000
trusted library allocation
page read and write
2435D213000
unkown
page read and write
1AC000
stack
page read and write
10000000
unkown
page readonly
8BA000
heap
page read and write
2164BC51000
heap
page read and write
F7E000
stack
page read and write
11B0000
trusted library allocation
page read and write
3A0000
heap
page read and write
10036000
unkown
page readonly
E0F000
heap
page read and write
2164BD60000
heap
page read and write
2435D24F000
heap
page read and write
9FF000
stack
page read and write
DB0000
heap
page read and write
10036000
unkown
page readonly
51E000
stack
page read and write
2164BC8D000
heap
page read and write
B50000
heap
page read and write
10000000
unkown
page readonly
10034000
unkown
page write copy
FD0000
heap
page read and write
D90000
heap
page read and write
F0A000
direct allocation
page readonly
64D2000
heap
page read and write
2435D27B000
heap
page read and write
2C00000
heap
page read and write
10000000
unkown
page readonly
940000
heap
page read and write
E0F000
heap
page read and write
47AF000
heap
page read and write
DEA000
heap
page read and write
E13000
heap
page read and write
78C000
stack
page read and write
57B7000
heap
page read and write
10034000
unkown
page write copy
301000
stack
page read and write
4C5000
heap
page read and write
10000000
unkown
page readonly
11B0000
trusted library allocation
page read and write
4991000
heap
page read and write
10036000
unkown
page readonly
61D3000
heap
page read and write
10033000
unkown
page read and write
E1A000
heap
page read and write
2435D502000
heap
page read and write
730000
heap
page read and write
61E1000
heap
page read and write
2435D28E000
heap
page read and write
61D1000
heap
page read and write
4CA9779000
stack
page read and write
8B0000
heap
page read and write
2435D513000
heap
page read and write
430000
heap
page read and write
2435D24D000
unkown
page read and write
DEA000
heap
page read and write
B3F000
stack
page read and write
2164C7A0000
trusted library allocation
page read and write
E0F000
heap
page read and write
2164C810000
trusted library allocation
page read and write
4810000
heap
page read and write
53D000
stack
page read and write
2C3C000
heap
page read and write
5CC7000
heap
page read and write
10034000
unkown
page write copy
5AA000
heap
page read and write
E0F000
heap
page read and write
2164C790000
trusted library allocation
page read and write
3480000
heap
page read and write
DE4000
heap
page read and write
10000000
unkown
page readonly
E13000
heap
page read and write
4CA947C000
stack
page read and write
77F000
stack
page read and write
61D1000
heap
page read and write
2D6E000
stack
page read and write
EF0000
direct allocation
page read and write
D6F000
stack
page read and write
10001000
unkown
page execute read
2164BD40000
heap
page read and write
325C000
stack
page read and write
5F0000
heap
page read and write
E13000
heap
page read and write
6CD4000
heap
page read and write
5676000
heap
page read and write
E0F000
heap
page read and write
5CE000
stack
page read and write
11B0000
trusted library allocation
page read and write
2435D228000
heap
page read and write
1FE000
unkown
page read and write
10033000
unkown
page read and write
560000
heap
page read and write
DEA000
heap
page read and write
E60000
heap
page read and write
61E1000
heap
page read and write
2435D302000
trusted library allocation
page read and write
E0F000
heap
page read and write
140000
heap
page read and write
DFD000
heap
page read and write
DE0000
heap
page read and write
11B0000
trusted library allocation
page read and write
80A000
heap
page read and write
2164BB19000
heap
page read and write
319A000
heap
page read and write
4810000
heap
page read and write
E0F000
heap
page read and write
BB0000
heap
page read and write
D80000
heap
page read and write
62D1000
heap
page read and write
2435D0A0000
heap
page read and write
10033000
unkown
page read and write
1231000
heap
page read and write
10034000
unkown
page write copy
C7F000
stack
page read and write
190000
heap
page read and write
2435D24E000
heap
page read and write
E4F000
stack
page read and write
61DF000
heap
page read and write
DEA000
heap
page read and write
61D1000
heap
page read and write
DFA000
heap
page read and write
5875000
heap
page read and write
E13000
heap
page read and write
10001000
unkown
page execute read
E09000
heap
page read and write
329B000
stack
page read and write
62D1000
heap
page read and write
E13000
heap
page read and write
E0F000
heap
page read and write
2435D400000
heap
page read and write
E13000
heap
page read and write
DFA000
heap
page read and write
2435D2B9000
heap
page read and write
E09000
heap
page read and write
E13000
heap
page read and write
DFD000
heap
page read and write
2EAE000
stack
page read and write
3710000
heap
page read and write
61E1000
heap
page read and write
10000000
unkown
page readonly
3300000
heap
page read and write
10001000
unkown
page execute read
290000
heap
page read and write
10001000
unkown
page execute read
DFA000
heap
page read and write
4990000
heap
page read and write
C3B000
stack
page read and write
EE0000
direct allocation
page execute read
64D0000
heap
page read and write
A3D000
stack
page read and write
4720000
heap
page read and write
2FB000
stack
page read and write
2435D513000
heap
page read and write
10034000
unkown
page write copy
2164CA80000
trusted library allocation
page read and write
48F3000
heap
page read and write
2435D27A000
heap
page read and write
E13000
heap
page read and write
10036000
unkown
page readonly
E0F000
heap
page read and write
2435D23B000
heap
page read and write
E09000
heap
page read and write
BF3C8FD000
stack
page read and write
2164BB15000
heap
page read and write
4D6F000
stack
page read and write
2435D23C000
heap
page read and write
B0F000
stack
page read and write
ABE000
stack
page read and write
2435D27A000
heap
page read and write
2435D323000
heap
page read and write
2164BC85000
heap
page read and write
ACE000
stack
page read and write
2164BC8D000
heap
page read and write
10034000
unkown
page write copy
4BF000
stack
page read and write
4A0000
heap
page read and write
64DF000
heap
page read and write
2DAE000
stack
page read and write
DEA000
heap
page read and write
B5A000
heap
page read and write
530000
heap
page read and write
2435D24F000
heap
page read and write
2164BB10000
heap
page read and write
D60000
heap
page read and write
DEA000
heap
page read and write
B10000
heap
page read and write
E00000
heap
page read and write
3330000
heap
page read and write
2435D413000
heap
page read and write
2435D800000
heap
page read and write
2164BCA6000
heap
page read and write
10001000
unkown
page execute read
DEA000
heap
page read and write
870000
heap
page read and write
E0F000
heap
page read and write
620000
heap
page read and write
E0F000
heap
page read and write
10036000
unkown
page readonly
920000
heap
page read and write
E0F000
heap
page read and write
2E6E000
stack
page read and write
4CA9679000
stack
page read and write
ABF000
stack
page read and write
2E2E000
stack
page read and write
62D1000
heap
page read and write
10033000
unkown
page read and write
69E3000
heap
page read and write
10001000
unkown
page execute read
2164BD90000
trusted library allocation
page read and write
E13000
heap
page read and write
DE4000
heap
page read and write
FBF000
stack
page read and write
E0F000
heap
page read and write
1FC000
stack
page read and write
E09000
heap
page read and write
C00000
heap
page read and write
2164BC40000
heap
page read and write
A7B000
stack
page read and write
10036000
unkown
page readonly
1EB000
stack
page read and write
BF3D079000
stack
page read and write
2435D20D000
unkown
page read and write
6D0000
heap
page read and write
DFD000
heap
page read and write
10036000
unkown
page readonly
BEE000
stack
page read and write
10000000
unkown
page readonly
ADE000
stack
page read and write
4AA000
heap
page read and write
D2E000
stack
page read and write
D60000
heap
page read and write
9EC000
stack
page read and write
E0F000
heap
page read and write
648000
heap
page read and write
10001000
unkown
page execute read
97B000
stack
page read and write
2435D502000
heap
page read and write
4DE0000
heap
page read and write
10033000
unkown
page read and write
640000
heap
page read and write
E13000
heap
page read and write
69DC000
heap
page read and write
61D3000
heap
page read and write
61E000
stack
page read and write
10036000
unkown
page readonly
2435D28E000
unkown
page read and write
DE4000
heap
page read and write
E09000
heap
page read and write
DE4000
heap
page read and write
E0F000
heap
page read and write
2164C800000
trusted library allocation
page read and write
61D1000
heap
page read and write
89C000
stack
page read and write
E1A000
heap
page read and write
4CA96FE000
stack
page read and write
10033000
unkown
page read and write
CE1000
heap
page read and write
2435D315000
trusted library allocation
page read and write
E6A000
heap
page read and write
E13000
heap
page read and write
10000000
unkown
page readonly
E13000
heap
page read and write
10033000
unkown
page read and write
980000
heap
page read and write
C4F000
stack
page read and write
10001000
unkown
page execute read
B1F000
stack
page read and write
2435D502000
heap
page read and write
11B0000
trusted library allocation
page read and write
DFD000
heap
page read and write
64D8000
heap
page read and write
10000000
unkown
page readonly
11B0000
trusted library allocation
page read and write
47D000
stack
page read and write
2435D402000
heap
page read and write
DE4000
heap
page read and write
2435D500000
heap
page read and write
2435D505000
heap
page read and write
11B0000
trusted library allocation
page read and write
57F000
stack
page read and write
CD6000
heap
page read and write
2435D513000
heap
page read and write
2435D516000
heap
page read and write
10036000
unkown
page readonly
800000
heap
page read and write
2435D0B0000
trusted library allocation
page read and write
4CA95FB000
stack
page read and write
401000
stack
page read and write
2435D300000
trusted library allocation
page read and write
2435D2B9000
heap
page read and write
E0F000
heap
page read and write
345E000
stack
page read and write
DE4000
heap
page read and write
DE4000
heap
page read and write
5A0000
heap
page read and write
4C0000
heap
page read and write
BF3D27B000
stack
page read and write
E09000
heap
page read and write
5B73000
heap
page read and write
10033000
unkown
page read and write
10034000
unkown
page write copy
450000
heap
page read and write
2164BB00000
heap
page read and write
791000
stack
page read and write
E0F000
heap
page read and write
3190000
heap
page read and write
E13000
heap
page read and write
1241000
heap
page read and write
E13000
heap
page read and write
93C000
stack
page read and write
B60000
heap
page read and write
2435D110000
heap
page read and write
E13000
heap
page read and write
E13000
heap
page read and write
7D0000
heap
page read and write
62D1000
heap
page read and write
6EE4000
heap
page read and write
61E1000
heap
page read and write
F30000
heap
page read and write
3066000
heap
page read and write
2435D200000
unkown
page read and write
A30000
heap
page read and write
2435D518000
heap
page read and write
8DB000
stack
page read and write
2435D513000
heap
page read and write
61DF000
heap
page read and write
2435D524000
heap
page read and write
F0F000
direct allocation
page read and write
5C0000
heap
page read and write
4D0000
heap
page read and write
10001000
unkown
page execute read
CCB000
heap
page read and write
5A0000
heap
page read and write
2435D52A000
heap
page read and write
2164CA70000
trusted library allocation
page read and write
2435D502000
heap
page read and write
43E000
unkown
page read and write
E1A000
heap
page read and write
5D6000
heap
page read and write
B0000
heap
page read and write
69E8000
heap
page read and write
CB0000
heap
page read and write
4991000
heap
page read and write
15C000
stack
page read and write
830000
heap
page read and write
BF0000
heap
page read and write
E0F000
heap
page read and write
E1A000
heap
page read and write
2DEE000
stack
page read and write
EE0000
heap
page read and write
EF1000
direct allocation
page execute read
881000
stack
page read and write
71E4000
heap
page read and write
840000
remote allocation
page read and write
11B0000
trusted library allocation
page read and write
5946000
heap
page read and write
There are 450 hidden memdumps, click here to show them.