IOC Report
050_qbot.dll

loading gif

Files

File Path
Type
Category
Malicious
050_qbot.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_419b281e7a1c62a2cfa3b86aa4ad63773747ea5_82810a17_086128fd\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_419b281e7a1c62a2cfa3b86aa4ad63773747ea5_82810a17_16b929a9\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_419b281e7a1c62a2cfa3b86aa4ad63773747ea5_82810a17_1c7d36d8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_f72750b22a9214184114f6be25e810eecaece948_82810a17_1c1d37b3\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2FD3.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Jun 7 03:25:50 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER309E.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Jun 7 03:25:51 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3199.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER31C9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3264.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER32C3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC4D.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Jun 7 03:25:41 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD28.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Jun 7 03:25:41 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE71.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREA1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREB0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREEF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.tmp
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.tmp.LOG1
MS Windows registry file, NT/2000 or above
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_419b281e7a1c62a2cfa3b86aa4ad63773747ea5_82810a17_1d45f7cb\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_419b281e7a1c62a2cfa3b86aa4ad63773747ea5_82810a17_1d5df7cb\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_419b281e7a1c62a2cfa3b86aa4ad63773747ea5_82810a17_1e260587\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_f72750b22a9214184114f6be25e810eecaece948_82810a17_1e060623\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER171.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1CF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER77.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDBA8.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Jun 7 03:12:34 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDC44.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Jun 7 03:12:34 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD10.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD6E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD6F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD9E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFEDF.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Jun 7 03:12:43 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFFD9.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Jun 7 03:12:44 2023, 0x1205a4 type
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\national[1].htm
HTML document, ASCII text, with very long lines (65212)
dropped
There are 28 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\050_qbot.dll"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_block_row
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",#1
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5700 -s 656
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 660
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\050_qbot.dll,lcopy_sample_rows
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\050_qbot.dll,ldiv_round_up
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lcopy_block_row
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lcopy_sample_rows
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",ldiv_round_up
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",next
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lround_up
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\050_qbot.dll",lpeg_write_tables
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 652
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7188 -s 668
malicious
C:\Windows\SysWOW64\wermgr.exe
C:\Windows\SysWOW64\wermgr.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7348 -s 652
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7360 -s 176
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7644 -s 652
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7716 -s 652
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown
https://www.xfinity.com/mobile/policies/broadband-disclosures
unknown
https://www.xfinity.com/learn/internet-service/acp
unknown
https://www.xfinity.com/networkmanagement
unknown
https://xfinity.com/
68.87.41.40

Domains

Name
IP
Malicious
xfinity.com
68.87.41.40
www.xfinity.com
unknown

IPs

IP
Domain
Country
Malicious
38.2.18.164
unknown
United States
malicious
2.82.8.80
unknown
Portugal
malicious
70.160.67.203
unknown
United States
malicious
83.110.223.61
unknown
United Arab Emirates
malicious
209.171.160.69
unknown
Canada
malicious
84.215.202.8
unknown
Norway
malicious
184.182.66.109
unknown
United States
malicious
200.84.211.255
unknown
Venezuela
malicious
125.99.69.178
unknown
India
malicious
174.4.89.3
unknown
Canada
malicious
121.121.108.120
unknown
Malaysia
malicious
161.142.103.187
unknown
Malaysia
malicious
213.64.33.92
unknown
Sweden
malicious
114.143.176.236
unknown
India
malicious
24.234.220.88
unknown
United States
malicious
67.70.120.249
unknown
Canada
malicious
73.88.173.113
unknown
United States
malicious
72.205.104.134
unknown
United States
malicious
117.195.17.148
unknown
India
malicious
69.160.121.6
unknown
Jamaica
malicious
176.133.4.230
unknown
France
malicious
183.87.163.165
unknown
India
malicious
184.181.75.148
unknown
United States
malicious
70.49.205.198
unknown
Canada
malicious
87.221.153.182
unknown
Spain
malicious
70.50.1.252
unknown
Canada
malicious
85.101.239.116
unknown
Turkey
malicious
181.4.225.225
unknown
Argentina
malicious
100.4.163.158
unknown
United States
malicious
103.141.50.43
unknown
India
malicious
70.50.83.216
unknown
Canada
malicious
92.1.170.110
unknown
United Kingdom
malicious
64.121.161.102
unknown
United States
malicious
96.56.197.26
unknown
United States
malicious
188.28.19.84
unknown
United Kingdom
malicious
125.99.76.102
unknown
India
malicious
81.101.185.146
unknown
United Kingdom
malicious
116.75.63.183
unknown
India
malicious
124.246.122.199
unknown
Singapore
malicious
147.147.30.126
unknown
United Kingdom
malicious
109.130.247.84
unknown
Belgium
malicious
75.109.111.89
unknown
United States
malicious
88.126.94.4
unknown
France
malicious
124.122.47.148
unknown
Thailand
malicious
66.241.183.99
unknown
United States
malicious
180.151.19.13
unknown
India
malicious
94.204.202.106
unknown
United Arab Emirates
malicious
47.205.25.170
unknown
United States
malicious
95.45.50.93
unknown
Ireland
malicious
103.212.19.254
unknown
India
malicious
85.61.165.153
unknown
Spain
malicious
91.160.70.68
unknown
France
malicious
201.143.215.69
unknown
Mexico
malicious
184.63.133.131
unknown
United States
malicious
203.109.44.236
unknown
India
malicious
90.104.151.37
unknown
France
malicious
201.244.108.183
unknown
Colombia
malicious
2.49.63.160
unknown
United Arab Emirates
malicious
103.42.86.42
unknown
India
malicious
80.6.50.34
unknown
United Kingdom
malicious
175.156.217.7
unknown
Singapore
malicious
103.139.242.6
unknown
India
malicious
27.0.48.233
unknown
India
malicious
70.28.50.223
unknown
Canada
malicious
173.17.45.60
unknown
United States
malicious
81.229.117.95
unknown
Sweden
malicious
70.64.77.115
unknown
Canada
malicious
87.252.106.39
unknown
Italy
malicious
79.77.142.22
unknown
United Kingdom
malicious
98.163.227.79
unknown
United States
malicious
93.187.148.45
unknown
United Kingdom
malicious
186.75.95.6
unknown
Panama
malicious
50.68.186.195
unknown
Canada
malicious
45.62.70.33
unknown
Canada
malicious
83.249.198.100
unknown
Sweden
malicious
12.172.173.82
unknown
United States
malicious
47.199.241.39
unknown
United States
malicious
79.168.224.165
unknown
Portugal
malicious
199.27.66.213
unknown
United States
malicious
200.44.198.47
unknown
Venezuela
malicious
176.142.207.63
unknown
France
malicious
86.173.2.12
unknown
United Kingdom
malicious
45.62.75.250
unknown
Canada
malicious
92.154.17.149
unknown
France
malicious
90.29.86.138
unknown
France
malicious
174.58.146.57
unknown
United States
malicious
223.166.13.95
unknown
China
malicious
5.192.141.228
unknown
United Arab Emirates
malicious
65.95.141.84
unknown
Canada
malicious
75.98.154.19
unknown
United States
malicious
77.126.99.230
unknown
Israel
malicious
103.123.223.133
unknown
India
malicious
74.12.147.139
unknown
Canada
malicious
92.9.45.20
unknown
United Kingdom
malicious
113.11.92.30
unknown
Bangladesh
malicious
77.86.98.236
unknown
United Kingdom
malicious
103.140.174.20
unknown
India
malicious
78.192.109.105
unknown
France
malicious
78.82.143.154
unknown
Sweden
malicious
68.87.41.40
xfinity.com
United States
192.168.2.1
unknown
unknown
There are 91 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiOverridePath
\REGISTRY\A\{e23ddb9a-673d-f6c9-ce1e-c23e62bb669b}\Root\InventoryApplicationFile
WritePermissionsCheck
\REGISTRY\A\{e23ddb9a-673d-f6c9-ce1e-c23e62bb669b}\Root\InventoryApplicationFile
ProviderSyncId
\REGISTRY\A\{e23ddb9a-673d-f6c9-ce1e-c23e62bb669b}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProgramId
\REGISTRY\A\{e23ddb9a-673d-f6c9-ce1e-c23e62bb669b}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
FileId
\REGISTRY\A\{e23ddb9a-673d-f6c9-ce1e-c23e62bb669b}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LowerCaseLongPath
\REGISTRY\A\{e23ddb9a-673d-f6c9-ce1e-c23e62bb669b}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LongPathHash
\REGISTRY\A\{e23ddb9a-673d-f6c9-ce1e-c23e62bb669b}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Name
\REGISTRY\A\{e23ddb9a-673d-f6c9-ce1e-c23e62bb669b}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Publisher
\REGISTRY\A\{e23ddb9a-673d-f6c9-ce1e-c23e62bb669b}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Version
\REGISTRY\A\{e23ddb9a-673d-f6c9-ce1e-c23e62bb669b}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinFileVersion
\REGISTRY\A\{e23ddb9a-673d-f6c9-ce1e-c23e62bb669b}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinaryType
\REGISTRY\A\{e23ddb9a-673d-f6c9-ce1e-c23e62bb669b}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductName
\REGISTRY\A\{e23ddb9a-673d-f6c9-ce1e-c23e62bb669b}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductVersion
\REGISTRY\A\{e23ddb9a-673d-f6c9-ce1e-c23e62bb669b}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LinkDate
\REGISTRY\A\{e23ddb9a-673d-f6c9-ce1e-c23e62bb669b}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinProductVersion
\REGISTRY\A\{e23ddb9a-673d-f6c9-ce1e-c23e62bb669b}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Size
\REGISTRY\A\{e23ddb9a-673d-f6c9-ce1e-c23e62bb669b}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Language
\REGISTRY\A\{e23ddb9a-673d-f6c9-ce1e-c23e62bb669b}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsPeFile
\REGISTRY\A\{e23ddb9a-673d-f6c9-ce1e-c23e62bb669b}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800A6CFCF3E8
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800A6CFCF3E8
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\Mmoqacuemo
9d198f8d
HKEY_CURRENT_USER\Software\Microsoft\Mmoqacuemo
a8865fc3
HKEY_CURRENT_USER\Software\Microsoft\Mmoqacuemo
aac77fbf
HKEY_CURRENT_USER\Software\Microsoft\Mmoqacuemo
127b18da
HKEY_CURRENT_USER\Software\Microsoft\Mmoqacuemo
6f735750
HKEY_CURRENT_USER\Software\Microsoft\Mmoqacuemo
d7cf3035
HKEY_CURRENT_USER\Software\Microsoft\Mmoqacuemo
103a38a6
HKEY_CURRENT_USER\Software\Microsoft\Mmoqacuemo
e250e07b
HKEY_CURRENT_USER\Software\Microsoft\Mmoqacuemo
d58e1049
HKEY_CURRENT_USER\Software\Microsoft\Mmoqacuemo
9d198f8d
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018000CAA868BB9
\REGISTRY\A\{5cd36e04-f07d-40da-c658-aa07a4483f02}\Root\InventoryApplicationFile
WritePermissionsCheck
\REGISTRY\A\{5cd36e04-f07d-40da-c658-aa07a4483f02}\Root\InventoryApplicationFile
ProviderSyncId
\REGISTRY\A\{5cd36e04-f07d-40da-c658-aa07a4483f02}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProgramId
\REGISTRY\A\{5cd36e04-f07d-40da-c658-aa07a4483f02}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
FileId
\REGISTRY\A\{5cd36e04-f07d-40da-c658-aa07a4483f02}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LowerCaseLongPath
\REGISTRY\A\{5cd36e04-f07d-40da-c658-aa07a4483f02}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LongPathHash
\REGISTRY\A\{5cd36e04-f07d-40da-c658-aa07a4483f02}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Name
\REGISTRY\A\{5cd36e04-f07d-40da-c658-aa07a4483f02}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Publisher
\REGISTRY\A\{5cd36e04-f07d-40da-c658-aa07a4483f02}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Version
\REGISTRY\A\{5cd36e04-f07d-40da-c658-aa07a4483f02}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinFileVersion
\REGISTRY\A\{5cd36e04-f07d-40da-c658-aa07a4483f02}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinaryType
\REGISTRY\A\{5cd36e04-f07d-40da-c658-aa07a4483f02}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductName
\REGISTRY\A\{5cd36e04-f07d-40da-c658-aa07a4483f02}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductVersion
\REGISTRY\A\{5cd36e04-f07d-40da-c658-aa07a4483f02}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LinkDate
\REGISTRY\A\{5cd36e04-f07d-40da-c658-aa07a4483f02}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinProductVersion
\REGISTRY\A\{5cd36e04-f07d-40da-c658-aa07a4483f02}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Size
\REGISTRY\A\{5cd36e04-f07d-40da-c658-aa07a4483f02}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Language
\REGISTRY\A\{5cd36e04-f07d-40da-c658-aa07a4483f02}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsPeFile
\REGISTRY\A\{5cd36e04-f07d-40da-c658-aa07a4483f02}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018000CAA868BB9
HKEY_CURRENT_USER\Software\Microsoft\Alvurasehc
8ac2389b
HKEY_CURRENT_USER\Software\Microsoft\Alvurasehc
bf5de8d5
HKEY_CURRENT_USER\Software\Microsoft\Alvurasehc
bd1cc8a9
HKEY_CURRENT_USER\Software\Microsoft\Alvurasehc
5a0afcc
HKEY_CURRENT_USER\Software\Microsoft\Alvurasehc
78a8e046
HKEY_CURRENT_USER\Software\Microsoft\Alvurasehc
c0148723
HKEY_CURRENT_USER\Software\Microsoft\Alvurasehc
7e18fb0
HKEY_CURRENT_USER\Software\Microsoft\Alvurasehc
f58b576d
HKEY_CURRENT_USER\Software\Microsoft\Alvurasehc
8ac2389b
HKEY_CURRENT_USER\Software\Microsoft\Alvurasehc
8ac2389b
HKEY_CURRENT_USER\Software\Microsoft\Alvurasehc
8ac2389b
HKEY_CURRENT_USER\Software\Microsoft\Alvurasehc
8ac2389b
There are 68 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4FC0000
heap
page read and write
malicious
34AA000
heap
page read and write
malicious
62AF000
heap
page read and write
2BA0000
heap
page read and write
80E000
stack
page read and write
D14000
heap
page read and write
3060000
heap
page read and write
279D0180000
trusted library allocation
page read and write
279CF69F000
heap
page read and write
33B0000
heap
page read and write
3320000
heap
page read and write
5324000
heap
page read and write
279CF5E0000
heap
page read and write
25658000000
unkown
page read and write
9EB000
heap
page read and write
5061000
heap
page read and write
6218000
heap
page read and write
32A0000
heap
page read and write
690000
heap
page read and write
62BD000
heap
page read and write
6ADEA000
unkown
page readonly
6ADF3000
unkown
page readonly
6AC9000
heap
page read and write
6B6AC7D000
stack
page read and write
BDF000
stack
page read and write
6218000
heap
page read and write
62AF000
heap
page read and write
6ADD7000
unkown
page readonly
279CF480000
heap
page read and write
279D03E0000
heap
page readonly
2A40000
heap
page read and write
6ADC7000
unkown
page readonly
628D000
heap
page read and write
628D000
heap
page read and write
6218000
heap
page read and write
62BD000
heap
page read and write
D48000
heap
page read and write
4AB0000
heap
page read and write
2565808D000
heap
page read and write
279D0190000
trusted library allocation
page read and write
4C00000
heap
page read and write
36C000
stack
page read and write
6ADFA000
unkown
page readonly
279CF829000
heap
page read and write
5300000
heap
page read and write
D3C000
heap
page read and write
D79000
heap
page read and write
D79000
heap
page read and write
6218000
heap
page read and write
25658300000
heap
page read and write
621C000
heap
page read and write
32E0000
heap
page read and write
3220000
heap
page read and write
3220000
heap
page read and write
32C4000
heap
page read and write
5324000
heap
page read and write
621C000
heap
page read and write
6ADF4000
unkown
page read and write
2B50000
heap
page read and write
5324000
heap
page read and write
358F000
stack
page read and write
D3E937B000
stack
page read and write
2E90000
heap
page read and write
32C4000
heap
page read and write
6AD80000
unkown
page readonly
4D56000
heap
page read and write
2565807B000
heap
page read and write
3AB000
stack
page read and write
6ADF3000
unkown
page readonly
3040000
heap
page read and write
256580BC000
heap
page read and write
326F000
stack
page read and write
620C000
heap
page read and write
6AC9000
heap
page read and write
628D000
heap
page read and write
D3E9879000
stack
page read and write
4C8F000
stack
page read and write
327E000
stack
page read and write
307B000
stack
page read and write
6AD81000
unkown
page execute read
62BB000
heap
page read and write
5060000
heap
page read and write
2AEB000
stack
page read and write
62AF000
heap
page read and write
62BB000
heap
page read and write
D79000
heap
page read and write
5300000
heap
page read and write
840000
heap
page read and write
256580EC000
heap
page read and write
2FB0000
heap
page read and write
6218000
heap
page read and write
30F0000
heap
page read and write
1220000
trusted library allocation
page read and write
6ADEA000
unkown
page readonly
320E000
stack
page read and write
3410000
heap
page read and write
6AC2000
heap
page read and write
32AA000
heap
page read and write
5CF2000
heap
page read and write
279D03D0000
trusted library allocation
page read and write
317F000
stack
page read and write
4D0E000
stack
page read and write
25657EA0000
trusted library allocation
page read and write
6ADEA000
unkown
page readonly
2BCE000
stack
page read and write
5300000
heap
page read and write
D79000
heap
page read and write
279CF678000
heap
page read and write
9B0000
heap
page read and write
6AD81000
unkown
page execute read
6AD80000
unkown
page readonly
10001000
direct allocation
page execute read
5324000
heap
page read and write
2E0000
heap
page read and write
279CF5C0000
heap
page read and write
6AD80000
unkown
page readonly
2BFB000
stack
page read and write
256580EC000
heap
page read and write
25658115000
trusted library allocation
page read and write
3080000
heap
page read and write
620C000
heap
page read and write
62AF000
heap
page read and write
6AC6000
heap
page read and write
621C000
heap
page read and write
279CF630000
heap
page read and write
9E0000
heap
page read and write
34D000
stack
page read and write
303C000
stack
page read and write
12A1000
heap
page read and write
680000
heap
page read and write
2DA0000
heap
page read and write
628D000
heap
page read and write
6AD80000
unkown
page readonly
2E3B000
stack
page read and write
3010000
heap
page read and write
63B000
stack
page read and write
95F000
stack
page read and write
30B0000
heap
page read and write
670000
heap
page read and write
5324000
heap
page read and write
32C4000
heap
page read and write
327B000
stack
page read and write
4E50000
heap
page read and write
5300000
heap
page read and write
25657F00000
heap
page read and write
6ADF3000
unkown
page readonly
2565807C000
heap
page read and write
6ADF3000
unkown
page readonly
2C90000
heap
page read and write
6ACF000
heap
page read and write
628D000
heap
page read and write
6FD000
stack
page read and write
4F30000
heap
page read and write
6B6B1F9000
stack
page read and write
6ADFA000
unkown
page readonly
2F20000
heap
page read and write
313E000
stack
page read and write
6ADFA000
unkown
page readonly
279CF820000
heap
page read and write
32C4000
heap
page read and write
3FE000
stack
page read and write
5300000
heap
page read and write
2FF0000
heap
page read and write
33FA000
heap
page read and write
2B50000
heap
page read and write
25658213000
heap
page read and write
62BD000
heap
page read and write
621C000
heap
page read and write
2E7A000
heap
page read and write
5324000
heap
page read and write
256580CB000
heap
page read and write
621C000
heap
page read and write
279D0110000
trusted library allocation
page read and write
6AD81000
unkown
page execute read
4270000
heap
page read and write
279CF67E000
heap
page read and write
628D000
heap
page read and write
D3E977D000
stack
page read and write
628D000
heap
page read and write
36B0000
heap
page read and write
6AD81000
unkown
page execute read
D79000
heap
page read and write
12A1000
heap
page read and write
65B4000
heap
page read and write
D79000
heap
page read and write
D3E97FE000
stack
page read and write
3230000
heap
page read and write
62AF000
heap
page read and write
6ADC7000
unkown
page readonly
25658028000
heap
page read and write
D4C000
heap
page read and write
6ADEA000
unkown
page readonly
7CF000
stack
page read and write
62BB000
heap
page read and write
2FFC000
stack
page read and write
CF1000
heap
page read and write
3290000
heap
page read and write
6ADF4000
unkown
page read and write
62BB000
heap
page read and write
65B6000
heap
page read and write
621C000
heap
page read and write
323C000
stack
page read and write
256580D3000
heap
page read and write
628D000
heap
page read and write
300E000
stack
page read and write
2F90000
heap
page read and write
5060000
heap
page read and write
2565807B000
heap
page read and write
5324000
heap
page read and write
6B6AE79000
stack
page read and write
32BE000
stack
page read and write
5324000
heap
page read and write
62BB000
heap
page read and write
62BD000
heap
page read and write
2CFC000
stack
page read and write
32C0000
heap
page read and write
279CF830000
trusted library allocation
page read and write
32C0000
heap
page read and write
25657E90000
heap
page read and write
6ADD7000
unkown
page readonly
32C4000
heap
page read and write
25658100000
trusted library allocation
page read and write
2BEC000
stack
page read and write
65BC000
heap
page read and write
25658313000
heap
page read and write
32C4000
heap
page read and write
7F0000
heap
page read and write
78E000
stack
page read and write
6FDA000
heap
page read and write
2FDE000
stack
page read and write
57E3000
heap
page read and write
4D4F000
stack
page read and write
10000000
direct allocation
page read and write
4370000
heap
page read and write
620C000
heap
page read and write
279CF677000
heap
page read and write
6AD80000
unkown
page readonly
25658102000
trusted library allocation
page read and write
256580CD000
heap
page read and write
1001A000
direct allocation
page readonly
6ADFA000
unkown
page readonly
256580EB000
heap
page read and write
2F8B000
stack
page read and write
32C4000
heap
page read and write
62AF000
heap
page read and write
6ADF7000
unkown
page readonly
25658123000
heap
page read and write
2565803C000
heap
page read and write
5300000
heap
page read and write
6ADF4000
unkown
page read and write
30E0000
heap
page read and write
65B2000
heap
page read and write
6ADFA000
unkown
page readonly
6ADC7000
unkown
page readonly
2565807C000
heap
page read and write
5BE4000
heap
page read and write
7FA000
heap
page read and write
6ABF000
heap
page read and write
6ADF7000
unkown
page readonly
503F000
heap
page read and write
48EF000
stack
page read and write
65B9000
heap
page read and write
25658302000
heap
page read and write
279D03F0000
trusted library allocation
page read and write
2E70000
heap
page read and write
503F000
heap
page read and write
D20000
heap
page read and write
621C000
heap
page read and write
62AF000
heap
page read and write
4C4E000
stack
page read and write
279CF638000
heap
page read and write
62BD000
heap
page read and write
65BE000
heap
page read and write
620C000
heap
page read and write
4E60000
trusted library allocation
page read and write
5061000
heap
page read and write
256580E8000
heap
page read and write
2E60000
heap
page read and write
279D0400000
trusted library allocation
page read and write
65B7000
heap
page read and write
256580E4000
heap
page read and write
279CF825000
heap
page read and write
25658302000
heap
page read and write
36C0000
heap
page read and write
256580D2000
heap
page read and write
63E4000
heap
page read and write
2EE0000
heap
page read and write
620C000
heap
page read and write
5300000
heap
page read and write
620C000
heap
page read and write
25658313000
heap
page read and write
304E000
stack
page read and write
256580D2000
heap
page read and write
308A000
heap
page read and write
4FE3000
heap
page read and write
370000
heap
page read and write
620C000
heap
page read and write
4AC0000
heap
page read and write
2DA0000
heap
page read and write
62AF000
heap
page read and write
6ADF4000
unkown
page read and write
6ADD7000
unkown
page readonly
33F0000
heap
page read and write
300000
heap
page read and write
D3E96F9000
stack
page read and write
D79000
heap
page read and write
2F10000
heap
page read and write
2D3B000
stack
page read and write
322A000
heap
page read and write
304A000
heap
page read and write
628D000
heap
page read and write
D50000
heap
page read and write
D79000
heap
page read and write
6ADF3000
unkown
page readonly
25658013000
unkown
page read and write
2B80000
heap
page read and write
279D0120000
trusted library allocation
page read and write
6ABB000
heap
page read and write
6218000
heap
page read and write
5300000
heap
page read and write
6ADC7000
unkown
page readonly
3DC000
stack
page read and write
3470000
heap
page read and write
10022000
direct allocation
page readonly
279CF67F000
heap
page read and write
3B0000
heap
page read and write
62BB000
heap
page read and write
62BD000
heap
page read and write
3F0000
heap
page read and write
256580FD000
heap
page read and write
2BBC000
stack
page read and write
2565803A000
heap
page read and write
2AAC000
stack
page read and write
279D0450000
trusted library allocation
page read and write
25658202000
heap
page read and write
84A000
heap
page read and write
2EF0000
heap
page read and write
9FA000
heap
page read and write
D21000
heap
page read and write
620C000
heap
page read and write
6AD81000
unkown
page execute read
D6F000
heap
page read and write
62BB000
heap
page read and write
5324000
heap
page read and write
6ADF7000
unkown
page readonly
621C000
heap
page read and write
6FC4000
heap
page read and write
6ADF4000
unkown
page read and write
62BB000
heap
page read and write
6ADF7000
unkown
page readonly
4D40000
direct allocation
page execute read
9F6000
heap
page read and write
6218000
heap
page read and write
345A000
heap
page read and write
2F0F000
stack
page read and write
62AF000
heap
page read and write
6ADD7000
unkown
page readonly
3450000
heap
page read and write
32C4000
heap
page read and write
62BD000
heap
page read and write
1001F000
direct allocation
page read and write
2F4C000
stack
page read and write
840000
heap
page read and write
620C000
heap
page read and write
D79000
heap
page read and write
D79000
heap
page read and write
628C000
heap
page read and write
621C000
heap
page read and write
6218000
heap
page read and write
62BD000
heap
page read and write
62BB000
heap
page read and write
6ADEA000
unkown
page readonly
92F000
stack
page read and write
341E000
stack
page read and write
25658200000
heap
page read and write
279CF490000
trusted library allocation
page read and write
34A0000
heap
page read and write
62BD000
heap
page read and write
6ACF000
heap
page read and write
850000
heap
page read and write
6ADF7000
unkown
page readonly
279CF67E000
heap
page read and write
6ADC7000
unkown
page readonly
7DE000
stack
page read and write
323B000
stack
page read and write
6218000
heap
page read and write
D6F000
heap
page read and write
6ADD7000
unkown
page readonly
5300000
heap
page read and write
2565803A000
heap
page read and write
3370000
heap
page read and write
63AC000
heap
page read and write
4D40000
heap
page read and write
There are 383 hidden memdumps, click here to show them.