IOC Report
qbot1.dll

loading gif

Files

File Path
Type
Category
Malicious
qbot1.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_9fb6f77b13131586566dd65310d5dce5865fec4f_82810a17_1995889c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_9fb6f77b13131586566dd65310d5dce5865fec4f_82810a17_19b56739\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_9fb6f77b13131586566dd65310d5dce5865fec4f_82810a17_19b96630\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c6a0b02083f29b4f045509d58da68ab1c531655_82810a17_192989f4\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c6a0b02083f29b4f045509d58da68ab1c531655_82810a17_1a9588cb\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c6a0b02083f29b4f045509d58da68ab1c531655_82810a17_1bc56fb5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c6a0b02083f29b4f045509d58da68ab1c531655_82810a17_1be17998\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5B33.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jun 2 04:23:58 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5C4C.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jun 2 04:23:58 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5E22.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5E90.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5F0C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5F6B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER66BC.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jun 2 04:24:01 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER69DA.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A1A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER716B.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jun 2 04:24:03 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER741B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER745B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7F07.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jun 2 04:24:07 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7F45.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jun 2 04:24:07 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8011.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jun 2 04:24:07 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER813A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8199.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER832E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER838C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER838D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8449.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 63843 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\J7NKSXWB.htm
HTML document, ASCII text, with very long lines (64945)
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\de-ch[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3929), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\t5[1]
ASCII text, with very long lines (784), with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.tmp
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.tmp.LOG1
MS Windows registry file, NT/2000 or above
dropped
There are 28 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\qbot1.dll"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\qbot1.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\qbot1.dll,m?0API@ScScript@@IAE@AAVEngine@1@H@Z
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\qbot1.dll",#1
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6336 -s 656
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6268 -s 660
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\qbot1.dll,m?0BinaryNode@ScScript@@QAE@ABUScanInfo@1@PAVNode@1@1@Z
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 672
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\qbot1.dll,m?0BreakpointInfo@ScScript@@QAE@ABV01@@Z
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5772 -s 648
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\qbot1.dll",m?0API@ScScript@@IAE@AAVEngine@1@H@Z
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\qbot1.dll",m?0BinaryNode@ScScript@@QAE@ABUScanInfo@1@PAVNode@1@1@Z
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\qbot1.dll",m?0BreakpointInfo@ScScript@@QAE@ABV01@@Z
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\qbot1.dll",next
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\qbot1.dll",munlockRef@Engine@ScScript@@QAEXABVVariant@ScCore@@@Z
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\qbot1.dll",mundefinedError@Callback@ScScript@@UAE_NAAVEngine@2@ABVVariant@ScCore@@1AAV45@@Z
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5428 -s 652
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7156 -s 652
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5444 -s 648
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\SysWOW64\ipconfig.exe
ipconfig /all
malicious
C:\Windows\SysWOW64\whoami.exe
whoami /all
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
There are 16 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://s.yimg.com/ss/rapid-3.53.38.js
unknown
https://outlook.live.com/owa/
unknown
https://s.yimg.com/uu/api/res/1.2/6lV3qkp5vhD2J.O5ha31Nw--~B/Zmk9c3RyaW07aD0zODY7cT04MDt3PTQ0MDthcHB
unknown
https://www.onenote.com/?omkt=de-CH
unknown
https://js.monitor.azure.com
unknown
https://s.yimg.com/uu/api/res/1.2/fiFKhsorJ_.XzJNVa7HgsQ--~B/Zmk9c3RyaW07aD0yNDY7cT04MDt3PTQ0MDthcHB
unknown
https://s.yimg.com/uu/api/res/1.2/h64YbbKcO2GsKYAy1QMRMw--~B/Zmk9c3RyaW07aD0zODY7cT04MDt3PTQ0MDthcHB
unknown
https://s.yimg.com/cx/pv/perf-vitals_3.1.0.js
unknown
https://s.yimg.com/aaq/spotim/
unknown
https://s.yimg.com/uu/api/res/1.2/p68hnTLk2asTrmg6nFL37A--~B/Zmk9c3RyaW07aD0zODY7cT04MDt3PTQ0MDthcHB
unknown
https://www.skype.com/de/
unknown
https://fp-graviton-home-gateway.media.yahoo.com/
unknown
https://s.yimg.com/uu/api/res/1.2/7mz1gUykvPcUcalzuGE1WQ--~B/Zmk9c3RyaW07aD0yNDY7cT04MDt3PTQ0MDthcHB
unknown
https://openweb.jac.yahoosandbox.com
unknown
https://s.yimg.com/uu/api/res/1.2/k8SbH9Gqa6W8a7JKyncC.A--~B/Zmk9c3RyaW07aD0xNDA7cT05MDt3PTE0MDthcHB
unknown
https://yahoo.com/
54.161.105.65
https://www.ad.com/?utm_source=yahoo-home&utm_medium=referral&utm_campaign=ad-feedback"
unknown
https://lptag.liveperson.net
unknown
https://search.yahoo.com/search?p=
unknown
https://xboxdesignlab.xbox.com/xbox-design-lab?recipeId=G4E9FNSC&icid=mscom_marcom_CPH4a_PrideXDLcon
unknown
http://schema.org
unknown
http://www.opensource.org/licenses/mit-license.php
unknown
https://analytics.tiktok.com
unknown
https://legal.yahoo.com/us/en/yahoo/privacy/adinfo/index.html"
unknown
https://5.ras.yahoo.com/adcount%7C2.0%7C5113.1%7C4830424%7C0%7C0%7CAdId=-41;BnId=0;ct=1864049394;st=
unknown
https://s.yimg.com/uu/api/res/1.2/H3vVA32ymLk3HFF8J_ZI5w--~B/Zmk9c3RyaW07aD0xNDA7cT05MDt3PTE0MDthcHB
unknown
https://www.instagram.com/microsoftch/
unknown
https://www.clarity.ms
unknown
https://cdnssl.clicktale.net/www32/ptc/05d32363-d534-4d93-9b65-cde674775e71.js
unknown
https://cdnssl.clicktale.net
unknown
https://publisher.liveperson.net
unknown
https://s.yimg.com/uu/api/res/1.2/4cg6h0vinH_o7ba.oxXthQ--~B/Zmk9c3RyaW07aD0zODg7cT05NTt3PTcyMDthcHB
unknown
https://s.yimg.com/uu/api/res/1.2/mzPB3eeJrxJuAn9uOhK0cA--~B/Zmk9c3RyaW07aD0xNDA7cT05MDt3PTE0MDthcHB
unknown
https://s.yimg.com/aaq/nel/js/spotIm.custom.SpotIMJAC.modal.9d3270fa67932556c75baaed2c09c955.js
unknown
https://d.impactradius-event.com
unknown
https://s.yimg.com/aaq/hc/homepage-pwa-defer-1.1.6.js
unknown
https://start.microsoftapp.net/start?pc_campaign=UHF_Banner_15mkts&adjust=y9xgnyl_5sblqid"
unknown
https://s.yimg.com/uu/api/res/1.2/2kRwuXH6fvmgKfpoQCf56g--~B/Zmk9c3RyaW07aD0xNDA7cT05MDt3PTE0MDthcHB
unknown
https://onedrive.live.com/about/de-ch/
unknown
https://s.yimg.com/aaq/vzm/cs_1.4.0.js
unknown
https://s.yimg.com/uu/api/res/1.2/c3dObtZQiIqjZKMWzeYQcw--~B/Zmk9c3RyaW07aD0yNDY7cT04MDt3PTQ0MDthcHB
unknown
https://lpcdn.lpsnmedia.net
unknown
http://www.yahoo.com/
87.248.100.215
https://www.youtube.com/user/MicrosoftCH
unknown
http://upx.sf.net
unknown
https://schema.org
unknown
https://s.yimg.com/uc/sf/0.1.322/js/safe.min.js
unknown
https://mem.gfx.ms
unknown
https://www.yahoo.com/
87.248.100.215
https://s.yimg.com/uu/api/res/1.2/5BZN9wyvjM8FfgniQrH0uw--~B/Zmk9c3RyaW07aD0yNDY7cT04MDt3PTQ0MDthcHB
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://www.yahoo.com/px.gif
unknown
https://s.yimg.com/uu/api/res/1.2/6DI2hkBaEy3aroPxqBStjQ--~B/Zmk9c3RyaW07aD0yNDY7cT04MDt3PTQ0MDthcHB
unknown
https://twitter.com/microsoft_ch
unknown
https://5.ras.yahoo.com/adcount%7C2.0%7C5113.1%7C4830441%7C0%7C225%7CAdId=11101911;BnId=2;ct=1864049
unknown
https://s.yimg.com/aaq/wf/wf-core-1.63.0.js
unknown
https://sb.scorecardresearch.com/p?c1=2&c2=7241469&c5=2023538075&c7=https%3A%2F%2Fwww.yahoo.com%2F&c
unknown
https://accdn.lpsnmedia.net
unknown
https://www.linkedin.com/company/1035
unknown
https://www.xbox.com/
unknown
http://schema.org/Organization
unknown
https://s.yimg.com/nn/lib/metro/g/myy/advertisement_0.0.19.js
unknown
https://yep.video.yahoo.com/oath/js/1/oath-player.js?ypv=8.5.43&lang=en-US
unknown
https://openweb.jac.yahoosandbox.com/1.5.0/jac.js
unknown
There are 54 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
new-fp-shed.wg1.b.yahoo.com
87.248.100.215
yahoo.com
54.161.105.65
windowsupdatebg.s.llnwi.net
178.79.225.128
www.yahoo.com
unknown

IPs

IP
Domain
Country
Malicious
2.82.8.80
unknown
Portugal
malicious
70.160.67.203
unknown
United States
malicious
75.143.236.149
unknown
United States
malicious
83.110.223.61
unknown
United Arab Emirates
malicious
86.195.14.72
unknown
France
malicious
27.253.11.10
unknown
Australia
malicious
184.182.66.109
unknown
United States
malicious
80.167.196.79
unknown
Denmark
malicious
92.186.69.229
unknown
France
malicious
89.32.156.5
unknown
Italy
malicious
174.4.89.3
unknown
Canada
malicious
161.142.103.187
unknown
Malaysia
malicious
213.64.33.92
unknown
Sweden
malicious
24.234.220.88
unknown
United States
malicious
14.192.241.76
unknown
Malaysia
malicious
125.63.125.205
unknown
India
malicious
173.88.135.179
unknown
United States
malicious
72.205.104.134
unknown
United States
malicious
69.160.121.6
unknown
Jamaica
malicious
47.34.30.133
unknown
United States
malicious
183.87.163.165
unknown
India
malicious
70.49.205.198
unknown
Canada
malicious
184.181.75.148
unknown
United States
malicious
84.35.26.14
unknown
Netherlands
malicious
100.4.163.158
unknown
United States
malicious
103.141.50.43
unknown
India
malicious
70.50.83.216
unknown
Canada
malicious
165.120.169.171
unknown
United States
malicious
79.92.15.6
unknown
France
malicious
68.203.69.96
unknown
United States
malicious
64.121.161.102
unknown
United States
malicious
96.56.197.26
unknown
United States
malicious
178.175.187.254
unknown
Moldova Republic of
malicious
188.28.19.84
unknown
United Kingdom
malicious
186.64.67.30
unknown
Argentina
malicious
98.187.21.2
unknown
United States
malicious
76.86.31.59
unknown
United States
malicious
96.87.28.170
unknown
United States
malicious
75.109.111.89
unknown
United States
malicious
88.126.94.4
unknown
France
malicious
103.101.203.177
unknown
Singapore
malicious
117.195.16.105
unknown
India
malicious
94.204.202.106
unknown
United Arab Emirates
malicious
47.205.25.170
unknown
United States
malicious
95.45.50.93
unknown
Ireland
malicious
80.12.88.148
unknown
France
malicious
98.37.25.99
unknown
United States
malicious
5.107.153.132
unknown
United Arab Emirates
malicious
81.111.108.123
unknown
United Kingdom
malicious
69.133.162.35
unknown
United States
malicious
205.237.67.69
unknown
Canada
malicious
201.143.215.69
unknown
Mexico
malicious
76.178.148.107
unknown
United States
malicious
69.242.31.249
unknown
United States
malicious
85.104.105.67
unknown
Turkey
malicious
201.244.108.183
unknown
Colombia
malicious
2.49.63.160
unknown
United Arab Emirates
malicious
80.6.50.34
unknown
United Kingdom
malicious
116.74.163.130
unknown
India
malicious
116.120.145.170
unknown
Korea Republic of
malicious
27.0.48.233
unknown
India
malicious
70.28.50.223
unknown
Canada
malicious
98.145.23.67
unknown
United States
malicious
47.149.134.231
unknown
United States
malicious
82.125.44.236
unknown
France
malicious
90.7.72.46
unknown
France
malicious
81.229.117.95
unknown
Sweden
malicious
46.246.254.242
unknown
Greece
malicious
45.243.142.31
unknown
Egypt
malicious
70.64.77.115
unknown
Canada
malicious
89.129.109.27
unknown
Spain
malicious
79.77.142.22
unknown
United Kingdom
malicious
122.184.143.86
unknown
India
malicious
50.68.186.195
unknown
Canada
malicious
213.55.33.103
unknown
France
malicious
45.62.70.33
unknown
Canada
malicious
83.249.198.100
unknown
Sweden
malicious
12.172.173.82
unknown
United States
malicious
47.199.241.39
unknown
United States
malicious
79.168.224.165
unknown
Portugal
malicious
199.27.66.213
unknown
United States
malicious
176.142.207.63
unknown
France
malicious
86.176.83.44
unknown
United Kingdom
malicious
92.154.17.149
unknown
France
malicious
90.29.86.138
unknown
France
malicious
223.166.13.95
unknown
China
malicious
58.186.75.42
unknown
Viet Nam
malicious
65.95.141.84
unknown
Canada
malicious
50.68.204.71
unknown
Canada
malicious
71.38.155.217
unknown
United States
malicious
77.126.99.230
unknown
Israel
malicious
220.240.164.182
unknown
Australia
malicious
103.123.223.133
unknown
India
malicious
2.36.64.159
unknown
Italy
malicious
198.2.51.242
unknown
United States
malicious
93.147.235.8
unknown
Italy
malicious
92.9.45.20
unknown
United Kingdom
malicious
54.161.105.65
yahoo.com
United States
87.248.100.215
new-fp-shed.wg1.b.yahoo.com
United Kingdom
192.168.2.1
unknown
unknown
There are 90 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiOverridePath
\REGISTRY\A\{773982ad-9edc-b2b9-b47e-22509337c710}\Root\InventoryApplicationFile
WritePermissionsCheck
\REGISTRY\A\{773982ad-9edc-b2b9-b47e-22509337c710}\Root\InventoryApplicationFile
ProviderSyncId
\REGISTRY\A\{773982ad-9edc-b2b9-b47e-22509337c710}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProgramId
\REGISTRY\A\{773982ad-9edc-b2b9-b47e-22509337c710}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
FileId
\REGISTRY\A\{773982ad-9edc-b2b9-b47e-22509337c710}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LowerCaseLongPath
\REGISTRY\A\{773982ad-9edc-b2b9-b47e-22509337c710}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LongPathHash
\REGISTRY\A\{773982ad-9edc-b2b9-b47e-22509337c710}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Name
\REGISTRY\A\{773982ad-9edc-b2b9-b47e-22509337c710}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Publisher
\REGISTRY\A\{773982ad-9edc-b2b9-b47e-22509337c710}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Version
\REGISTRY\A\{773982ad-9edc-b2b9-b47e-22509337c710}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinFileVersion
\REGISTRY\A\{773982ad-9edc-b2b9-b47e-22509337c710}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinaryType
\REGISTRY\A\{773982ad-9edc-b2b9-b47e-22509337c710}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductName
\REGISTRY\A\{773982ad-9edc-b2b9-b47e-22509337c710}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductVersion
\REGISTRY\A\{773982ad-9edc-b2b9-b47e-22509337c710}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LinkDate
\REGISTRY\A\{773982ad-9edc-b2b9-b47e-22509337c710}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinProductVersion
\REGISTRY\A\{773982ad-9edc-b2b9-b47e-22509337c710}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Size
\REGISTRY\A\{773982ad-9edc-b2b9-b47e-22509337c710}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Language
\REGISTRY\A\{773982ad-9edc-b2b9-b47e-22509337c710}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsPeFile
\REGISTRY\A\{773982ad-9edc-b2b9-b47e-22509337c710}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00184008C5A0EBAC
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00184008C5A0EBAC
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\Tqvpjiirdeeuu
91499fe5
HKEY_CURRENT_USER\Software\Microsoft\Tqvpjiirdeeuu
a4d64fab
HKEY_CURRENT_USER\Software\Microsoft\Tqvpjiirdeeuu
a6976fd7
HKEY_CURRENT_USER\Software\Microsoft\Tqvpjiirdeeuu
1e2b08b2
HKEY_CURRENT_USER\Software\Microsoft\Tqvpjiirdeeuu
63234738
HKEY_CURRENT_USER\Software\Microsoft\Tqvpjiirdeeuu
db9f205d
HKEY_CURRENT_USER\Software\Microsoft\Tqvpjiirdeeuu
1c6a28ce
HKEY_CURRENT_USER\Software\Microsoft\Tqvpjiirdeeuu
ee00f013
HKEY_CURRENT_USER\Software\Microsoft\Tqvpjiirdeeuu
39017712
HKEY_CURRENT_USER\Software\Microsoft\Tqvpjiirdeeuu
23ce9f35
HKEY_CURRENT_USER\Software\Microsoft\Tqvpjiirdeeuu
317b30db
HKEY_CURRENT_USER\Software\Microsoft\Tqvpjiirdeeuu
4c737f51
HKEY_CURRENT_USER\Software\Microsoft\Tqvpjiirdeeuu
91499fe5
HKEY_CURRENT_USER\Software\Microsoft\Tqvpjiirdeeuu
91499fe5
HKEY_CURRENT_USER\Software\Microsoft\Tqvpjiirdeeuu
91499fe5
HKEY_CURRENT_USER\Software\Microsoft\Tqvpjiirdeeuu
91499fe5
There are 41 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C4A000
heap
page read and write
malicious
4870000
heap
page read and write
malicious
4582000
heap
page read and write
5DDF000
heap
page read and write
2D10000
heap
page read and write
5D3C000
heap
page read and write
55E0000
trusted library allocation
page read and write
2F4C000
stack
page read and write
55E0000
trusted library allocation
page read and write
2CDF000
stack
page read and write
5828000
heap
page read and write
1A3314BE000
heap
page read and write
6D0000
heap
page read and write
E6F000
stack
page read and write
1A331472000
heap
page read and write
5F14000
heap
page read and write
55E0000
trusted library allocation
page read and write
5D4C000
heap
page read and write
2F0C000
stack
page read and write
9BB000
heap
page read and write
297C000
stack
page read and write
64F4000
heap
page read and write
5DBD000
heap
page read and write
2A20000
heap
page read and write
422F000
stack
page read and write
6050000
heap
page read and write
6F0B000
heap
page read and write
5D48000
heap
page read and write
5D3C000
heap
page read and write
4582000
heap
page read and write
4FC000
stack
page read and write
7F4000
heap
page read and write
48EF000
heap
page read and write
4582000
heap
page read and write
5DBD000
heap
page read and write
7F0000
heap
page read and write
55E0000
trusted library allocation
page read and write
1A331900000
heap
page read and write
5DEB000
heap
page read and write
10001000
unkown
page execute read
2EA0000
heap
page read and write
69F1000
unkown
page read and write
29DF000
stack
page read and write
5D48000
heap
page read and write
26D0000
heap
page read and write
7C0000
heap
page read and write
10000000
unkown
page readonly
2D4F000
stack
page read and write
6074000
heap
page read and write
5DDF000
heap
page read and write
5721000
heap
page read and write
290C000
stack
page read and write
85B77F9000
stack
page read and write
4582000
heap
page read and write
6A08000
heap
page read and write
4640000
heap
page read and write
457A000
heap
page read and write
1A331472000
heap
page read and write
6074000
heap
page read and write
3310000
heap
page read and write
2CE0000
heap
page read and write
67E000
stack
page read and write
1A33142F000
heap
page read and write
1A331813000
heap
page read and write
10094000
unkown
page read and write
6B0000
heap
page read and write
294B000
stack
page read and write
457A000
heap
page read and write
33D0000
heap
page read and write
332D000
heap
page read and write
38C000
stack
page read and write
5DED000
heap
page read and write
293A000
heap
page read and write
1A331913000
heap
page read and write
354E000
stack
page read and write
85B6FED000
stack
page read and write
1A331380000
heap
page read and write
10092000
unkown
page write copy
5DBD000
heap
page read and write
2D0E000
stack
page read and write
93E000
stack
page read and write
1A331483000
heap
page read and write
323C000
stack
page read and write
55E0000
trusted library allocation
page read and write
2D80000
heap
page read and write
6074000
heap
page read and write
29C2000
direct allocation
page readonly
890000
heap
page read and write
4582000
heap
page read and write
4582000
heap
page read and write
72E000
stack
page read and write
77CE000
heap
page read and write
72B2000
heap
page read and write
5D48000
heap
page read and write
10095000
unkown
page readonly
5D4C000
heap
page read and write
5DED000
heap
page read and write
4582000
heap
page read and write
1A331430000
heap
page read and write
1BB000
stack
page read and write
7F4000
heap
page read and write
5DED000
heap
page read and write
2A90000
heap
page read and write
1A331437000
heap
page read and write
45A1000
heap
page read and write
6050000
heap
page read and write
5DED000
heap
page read and write
69FA000
heap
page read and write
350D000
stack
page read and write
29C0000
heap
page read and write
29A1000
direct allocation
page execute read
1006A000
unkown
page readonly
1A331515000
trusted library allocation
page read and write
5DDF000
heap
page read and write
5D3C000
heap
page read and write
6BE000
unkown
page read and write
5DED000
heap
page read and write
640000
heap
page read and write
63E000
unkown
page read and write
9C6000
heap
page read and write
5721000
heap
page read and write
10094000
unkown
page read and write
4582000
heap
page read and write
641000
stack
page read and write
5DBC000
heap
page read and write
2A50000
heap
page read and write
4711000
heap
page read and write
652A000
heap
page read and write
8A0000
heap
page read and write
29BF000
direct allocation
page read and write
10001000
unkown
page execute read
750000
heap
page read and write
5DDF000
heap
page read and write
5721000
heap
page read and write
10095000
unkown
page readonly
CAF000
stack
page read and write
6DA000
heap
page read and write
30B0000
heap
page read and write
10092000
unkown
page write copy
10001000
unkown
page execute read
10000000
unkown
page readonly
7F4000
heap
page read and write
1A331310000
heap
page read and write
3317000
heap
page read and write
2990000
heap
page read and write
35CA000
heap
page read and write
54C000
stack
page read and write
5D3C000
heap
page read and write
87F000
stack
page read and write
5D3C000
heap
page read and write
1A331523000
heap
page read and write
46C0000
heap
page read and write
AD0000
heap
page read and write
1A331438000
heap
page read and write
10092000
unkown
page write copy
55E0000
trusted library allocation
page read and write
1A3314BE000
heap
page read and write
6050000
heap
page read and write
2FA0000
heap
page read and write
5B0000
heap
page read and write
5D48000
heap
page read and write
7A1000
stack
page read and write
2930000
heap
page read and write
880000
heap
page read and write
69F2000
heap
page read and write
3300000
heap
page read and write
10092000
unkown
page write copy
641000
stack
page read and write
4810000
trusted library allocation
page read and write
5B0000
heap
page read and write
580000
heap
page read and write
2D0E000
stack
page read and write
5D48000
heap
page read and write
35C0000
heap
page read and write
4582000
heap
page read and write
29BA000
direct allocation
page readonly
72B8000
heap
page read and write
490000
heap
page read and write
457A000
heap
page read and write
1A331500000
trusted library allocation
page read and write
28F0000
heap
page read and write
10000000
unkown
page readonly
4582000
heap
page read and write
6E0000
heap
page read and write
10094000
unkown
page read and write
5DED000
heap
page read and write
456F000
heap
page read and write
4F0000
heap
page read and write
5D4C000
heap
page read and write
5DED000
heap
page read and write
6074000
heap
page read and write
34D000
stack
page read and write
2A2A000
heap
page read and write
5721000
heap
page read and write
6050000
heap
page read and write
870000
heap
page read and write
1006A000
unkown
page readonly
2C40000
heap
page read and write
5DED000
heap
page read and write
110000
heap
page read and write
850000
heap
page read and write
2981000
stack
page read and write
457A000
heap
page read and write
710000
heap
page read and write
1A331472000
heap
page read and write
A90000
heap
page read and write
457A000
heap
page read and write
10000000
unkown
page readonly
1A331502000
trusted library allocation
page read and write
95E000
stack
page read and write
53B000
stack
page read and write
4514000
heap
page read and write
5D48000
heap
page read and write
5B0000
heap
page read and write
1A331400000
unkown
page read and write
55E0000
trusted library allocation
page read and write
717000
heap
page read and write
35AE000
stack
page read and write
5FF000
stack
page read and write
4582000
heap
page read and write
5D3C000
heap
page read and write
1006A000
unkown
page readonly
5D4C000
heap
page read and write
55E0000
trusted library allocation
page read and write
10094000
unkown
page read and write
6074000
heap
page read and write
6050000
heap
page read and write
6FE000
stack
page read and write
6074000
heap
page read and write
4582000
heap
page read and write
5DEB000
heap
page read and write
4E0000
heap
page read and write
1A331483000
heap
page read and write
470F000
stack
page read and write
10092000
unkown
page write copy
5D48000
heap
page read and write
4582000
heap
page read and write
730000
heap
page read and write
2980000
heap
page read and write
5DDF000
heap
page read and write
1006A000
unkown
page readonly
6AC000
stack
page read and write
6B63000
heap
page read and write
34CF000
stack
page read and write
1006A000
unkown
page readonly
2D4F000
stack
page read and write
85B76F9000
stack
page read and write
1A331431000
heap
page read and write
5D48000
heap
page read and write
29A0000
direct allocation
page read and write
2A1E000
stack
page read and write
83E000
stack
page read and write
28FA000
heap
page read and write
457A000
heap
page read and write
670000
heap
page read and write
5D3C000
heap
page read and write
327B000
stack
page read and write
10092000
unkown
page write copy
33B0000
heap
page read and write
10001000
unkown
page execute read
2C3E000
stack
page read and write
4D9E000
stack
page read and write
348E000
stack
page read and write
10095000
unkown
page readonly
10095000
unkown
page readonly
462E000
stack
page read and write
5721000
heap
page read and write
4711000
heap
page read and write
1A331483000
heap
page read and write
1006A000
unkown
page readonly
10000000
unkown
page readonly
2A40000
heap
page read and write
4710000
heap
page read and write
6050000
heap
page read and write
2A5A000
heap
page read and write
5D4C000
heap
page read and write
5DEB000
heap
page read and write
6050000
heap
page read and write
6074000
heap
page read and write
468F000
stack
page read and write
4DC0000
heap
page read and write
48EF000
heap
page read and write
9B0000
heap
page read and write
5DDF000
heap
page read and write
85B78FB000
stack
page read and write
7F4000
heap
page read and write
1A331428000
heap
page read and write
44F1000
heap
page read and write
2FF0000
heap
page read and write
2FF0000
heap
page read and write
71F9000
heap
page read and write
5DEB000
heap
page read and write
4DC000
stack
page read and write
5DEB000
heap
page read and write
85B7379000
stack
page read and write
3306000
heap
page read and write
6050000
heap
page read and write
2FEE000
stack
page read and write
4893000
heap
page read and write
5D48000
heap
page read and write
1A331438000
heap
page read and write
10095000
unkown
page readonly
2E30000
heap
page read and write
5DEB000
heap
page read and write
5DBD000
heap
page read and write
10000000
unkown
page readonly
880000
heap
page read and write
10001000
unkown
page execute read
770000
heap
page read and write
5DBD000
heap
page read and write
7F4000
heap
page read and write
2CE0000
heap
page read and write
59E000
stack
page read and write
675000
heap
page read and write
4582000
heap
page read and write
9D0000
heap
page read and write
4582000
heap
page read and write
5DEB000
heap
page read and write
10095000
unkown
page readonly
10095000
unkown
page readonly
7707000
heap
page read and write
2DD0000
heap
page read and write
2C20000
heap
page read and write
5D4C000
heap
page read and write
6074000
heap
page read and write
1A33140D000
unkown
page read and write
55E0000
trusted library allocation
page read and write
5DBD000
heap
page read and write
42A0000
heap
page read and write
3D0000
heap
page read and write
65B6000
heap
page read and write
10094000
unkown
page read and write
1A331800000
heap
page read and write
4582000
heap
page read and write
5DED000
heap
page read and write
63C000
stack
page read and write
5DBD000
heap
page read and write
5721000
heap
page read and write
457A000
heap
page read and write
30A0000
heap
page read and write
5A0000
heap
page read and write
6F00000
heap
page read and write
2E0000
heap
page read and write
457A000
heap
page read and write
9DE000
stack
page read and write
32E0000
heap
page read and write
1006A000
unkown
page readonly
64F6000
heap
page read and write
7F4000
heap
page read and write
4D0F000
stack
page read and write
10092000
unkown
page write copy
880000
direct allocation
page execute read
7DE000
stack
page read and write
5D3C000
heap
page read and write
10001000
unkown
page execute read
10094000
unkown
page read and write
5DDF000
heap
page read and write
3A0000
heap
page read and write
4582000
heap
page read and write
10000000
unkown
page readonly
63C000
stack
page read and write
344E000
stack
page read and write
2DDA000
heap
page read and write
1A331902000
heap
page read and write
550000
heap
page read and write
2C87000
heap
page read and write
9D7000
heap
page read and write
6EB000
stack
page read and write
1A331902000
heap
page read and write
17C000
stack
page read and write
750000
heap
page read and write
1A331413000
unkown
page read and write
55E0000
trusted library allocation
page read and write
6074000
heap
page read and write
1A331320000
trusted library allocation
page read and write
1A331472000
heap
page read and write
840000
heap
page read and write
4800000
heap
page read and write
5DEB000
heap
page read and write
4521000
heap
page read and write
690000
heap
page read and write
40AF000
stack
page read and write
5D3C000
heap
page read and write
10001000
unkown
page execute read
470000
heap
page read and write
5D4C000
heap
page read and write
83F000
stack
page read and write
44B0000
heap
page read and write
6050000
heap
page read and write
7F4000
heap
page read and write
5EDC000
heap
page read and write
5DDF000
heap
page read and write
A1F000
stack
page read and write
1006A000
unkown
page readonly
3F0000
heap
page read and write
79C000
stack
page read and write
87F000
stack
page read and write
A96000
heap
page read and write
51B000
stack
page read and write
10094000
unkown
page read and write
5FE000
stack
page read and write
2910000
heap
page read and write
91F000
stack
page read and write
4582000
heap
page read and write
2E3A000
heap
page read and write
9CE000
heap
page read and write
5D4C000
heap
page read and write
5DBD000
heap
page read and write
A20000
heap
page read and write
5030000
heap
page read and write
457A000
heap
page read and write
4520000
heap
page read and write
6F0A000
heap
page read and write
640000
heap
page read and write
7F4000
heap
page read and write
10092000
unkown
page write copy
10001000
unkown
page execute read
3380000
heap
page read and write
10000000
unkown
page readonly
5D4C000
heap
page read and write
99F000
stack
page read and write
8FC000
stack
page read and write
4582000
heap
page read and write
2C9E000
stack
page read and write
69F1000
heap
page read and write
1A331802000
heap
page read and write
97E000
stack
page read and write
4ECF000
stack
page read and write
1A331913000
heap
page read and write
10094000
unkown
page read and write
75A000
heap
page read and write
83E000
stack
page read and write
456F000
heap
page read and write
55E0000
trusted library allocation
page read and write
10095000
unkown
page readonly
83F000
stack
page read and write
There are 426 hidden memdumps, click here to show them.