IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\GCGHCBKFCF.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_GCGHCBKFCF.exe_ada9b7d733834e89c5d2bad1fe3376354d7d56ef_0600d451_92a08c37-cc9f-4019-a683-2fd9e0024dfc\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_d39b794c1828490422b2b358ab5c7d8e0ff5554_462595ac_0fd2c18d-71f9-410c-a9bb-26d8b08c90a2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\a43486128347[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\sql[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\CAKFIJDHJEGI\AFBFHD
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\CAKFIJDHJEGI\AKJDGD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CAKFIJDHJEGI\CAAKKF
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\CAKFIJDHJEGI\ECFHIJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\CAKFIJDHJEGI\FBKKJE
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\CAKFIJDHJEGI\GCGHCB
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\CAKFIJDHJEGI\GIEGHJ
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CAKFIJDHJEGI\GIEGHJ-shm
data
dropped
C:\ProgramData\CAKFIJDHJEGI\IJKJDA
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\CAKFIJDHJEGI\IJKJDA-shm
data
dropped
C:\ProgramData\CAKFIJDHJEGI\KFHJJJ
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CAKFIJDHJEGI\KJKJKF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5779.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Oct 4 07:52:42 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER57E8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5846.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9EB8.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Oct 4 07:51:55 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9F17.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9F47.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 28 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\ProgramData\GCGHCBKFCF.exe
"C:\ProgramData\GCGHCBKFCF.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6988 -s 304
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6988 -s 304
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\CAKFIJDHJEGI" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10

URLs

Name
IP
Malicious
http://proxy.johnmccrea.com//nss3.dll
141.98.233.156
malicious
abnomalrkmu.site
malicious
http://playd.healthnlife.pk/ldms/a43486128347.exe
147.45.44.104
malicious
absorptioniw.site
malicious
treatynreit.site
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
questionsmw.stor
malicious
http://proxy.johnmccrea.com//sql.dll
141.98.233.156
malicious
http://proxy.johnmccrea.com/
141.98.233.156
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
http://playd.healthnlife.pk/ldms/a43486128347.exeorm-data;
unknown
malicious
http://proxy.johnmccrea.com//vcruntime140.dll
141.98.233.156
malicious
http://playd.healthnlife.pk/ldms/a43486128347.exe1kkkktoken
unknown
malicious
http://proxy.johnmccrea.com//softokn3.dll
141.98.233.156
malicious
http://proxy.johnmccrea.com//mozglue.dll
141.98.233.156
malicious
https://steamcommunity.com/profiles/76561199780418869
malicious
chorusarorp.site
malicious
snarlypagowo.site
malicious
http://proxy.johnmccrea.com//msvcp140.dll
141.98.233.156
malicious
soldiefieop.site
malicious
http://cowod.hopto.org/
45.132.206.251
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://player.vimeo.com
unknown
http://proxy.johnmccrea.com/ontent-Disposition:
unknown
https://duckduckgo.com/ac/?q=
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
http://cowod.hopto.org
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://proxy.johnmccrea.com//softokn3.dllNMf
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://proxy.johnmccrea.com//nss3.dllp
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://beearvagueo.site/;
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://cowod.hopto.
unknown
http://proxy.johnmccrea.com/gfdsgrewgdsfadsahttps://steamcommunity.com/profiles/76561199780418869u55
unknown
http://cowod.hopto
unknown
http://cowod.hopto.org/M
unknown
https://s.ytimg.com;
unknown
https://steam.tv/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://t.me/ae5ed
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
http://www.entrust.net/rpa03
unknown
https://beearvagueo.site/i
unknown
http://store.steampowered.com/privacy_agreement/
unknown
http://cowod.hopto.BFIJDG
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://proxy.johnmccrea.com//msvcp140.dll6L
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://sketchfab.com
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://beearvagueo.site/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://t.me/ae5edu55uhttps://steamcommunity.com/profiles/76561199780418869sql.dllsqlp.dllMozilla/5.
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://store.steampowered.com/;
unknown
https://www.entrust.net/rpa0
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://steamcommunity.com/nN
unknown
http://ocsp.entrust.net03
unknown
http://ocsp.entrust.net02
unknown
http://cowod.GDAAKEBFIJDG
unknown
https://community.akamai.steamstatic.com/
unknown
http://proxy.johnmccrea.com//vcruntime140.dll0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://recaptcha.net/recaptcha/;
unknown
http://cowod.hoptoEBFIJDG
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
http://proxy.johnmccrea.com//freebl3.dllnLF
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://beearvagueo.site:443/apil
unknown
https://beearvagueo.site/api;
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=AeTz
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
http://www.sqlite.org/copyright.html.
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://cowod.hopto.orgJDG
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
cowod.hopto.org
45.132.206.251
malicious
beearvagueo.site
104.21.93.202
malicious
proxy.johnmccrea.com
141.98.233.156
malicious
treatynreit.site
unknown
malicious
mysterisop.site
unknown
malicious
chorusarorp.site
unknown
malicious
snarlypagowo.site
unknown
malicious
absorptioniw.site
unknown
malicious
abnomalrkmu.site
unknown
malicious
soldiefieop.site
unknown
malicious
playd.healthnlife.pk
147.45.44.104
s-part-0017.t-0009.t-msedge.net
13.107.246.45
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
217.20.57.18
fp2e7a.wpc.phicdn.net
192.229.221.95
questionsmw.store
unknown
There are 6 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
141.98.233.156
proxy.johnmccrea.com
Russian Federation
malicious
104.102.49.254
steamcommunity.com
United States
malicious
45.132.206.251
cowod.hopto.org
Russian Federation
malicious
104.21.93.202
beearvagueo.site
United States
malicious
147.45.44.104
playd.healthnlife.pk
Russian Federation

Registry

Path
Value
Malicious
\REGISTRY\A\{3b8b504f-7440-2167-06c3-cf44fc5f4100}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{3b8b504f-7440-2167-06c3-cf44fc5f4100}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{3b8b504f-7440-2167-06c3-cf44fc5f4100}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{3b8b504f-7440-2167-06c3-cf44fc5f4100}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{3b8b504f-7440-2167-06c3-cf44fc5f4100}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{3b8b504f-7440-2167-06c3-cf44fc5f4100}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{3b8b504f-7440-2167-06c3-cf44fc5f4100}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{3b8b504f-7440-2167-06c3-cf44fc5f4100}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{3b8b504f-7440-2167-06c3-cf44fc5f4100}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{3b8b504f-7440-2167-06c3-cf44fc5f4100}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{3b8b504f-7440-2167-06c3-cf44fc5f4100}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{3b8b504f-7440-2167-06c3-cf44fc5f4100}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{3b8b504f-7440-2167-06c3-cf44fc5f4100}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{3b8b504f-7440-2167-06c3-cf44fc5f4100}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{3b8b504f-7440-2167-06c3-cf44fc5f4100}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{3b8b504f-7440-2167-06c3-cf44fc5f4100}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{3b8b504f-7440-2167-06c3-cf44fc5f4100}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{3b8b504f-7440-2167-06c3-cf44fc5f4100}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{3b8b504f-7440-2167-06c3-cf44fc5f4100}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{c8ee8836-56b2-18bc-ba22-35170f184cf6}\Root\InventoryApplicationFile\gcghcbkfcf.exe|e8e2b85022dee8f9
ProgramId
\REGISTRY\A\{c8ee8836-56b2-18bc-ba22-35170f184cf6}\Root\InventoryApplicationFile\gcghcbkfcf.exe|e8e2b85022dee8f9
FileId
\REGISTRY\A\{c8ee8836-56b2-18bc-ba22-35170f184cf6}\Root\InventoryApplicationFile\gcghcbkfcf.exe|e8e2b85022dee8f9
LowerCaseLongPath
\REGISTRY\A\{c8ee8836-56b2-18bc-ba22-35170f184cf6}\Root\InventoryApplicationFile\gcghcbkfcf.exe|e8e2b85022dee8f9
LongPathHash
\REGISTRY\A\{c8ee8836-56b2-18bc-ba22-35170f184cf6}\Root\InventoryApplicationFile\gcghcbkfcf.exe|e8e2b85022dee8f9
Name
\REGISTRY\A\{c8ee8836-56b2-18bc-ba22-35170f184cf6}\Root\InventoryApplicationFile\gcghcbkfcf.exe|e8e2b85022dee8f9
OriginalFileName
\REGISTRY\A\{c8ee8836-56b2-18bc-ba22-35170f184cf6}\Root\InventoryApplicationFile\gcghcbkfcf.exe|e8e2b85022dee8f9
Publisher
\REGISTRY\A\{c8ee8836-56b2-18bc-ba22-35170f184cf6}\Root\InventoryApplicationFile\gcghcbkfcf.exe|e8e2b85022dee8f9
Version
\REGISTRY\A\{c8ee8836-56b2-18bc-ba22-35170f184cf6}\Root\InventoryApplicationFile\gcghcbkfcf.exe|e8e2b85022dee8f9
BinFileVersion
\REGISTRY\A\{c8ee8836-56b2-18bc-ba22-35170f184cf6}\Root\InventoryApplicationFile\gcghcbkfcf.exe|e8e2b85022dee8f9
BinaryType
\REGISTRY\A\{c8ee8836-56b2-18bc-ba22-35170f184cf6}\Root\InventoryApplicationFile\gcghcbkfcf.exe|e8e2b85022dee8f9
ProductName
\REGISTRY\A\{c8ee8836-56b2-18bc-ba22-35170f184cf6}\Root\InventoryApplicationFile\gcghcbkfcf.exe|e8e2b85022dee8f9
ProductVersion
\REGISTRY\A\{c8ee8836-56b2-18bc-ba22-35170f184cf6}\Root\InventoryApplicationFile\gcghcbkfcf.exe|e8e2b85022dee8f9
LinkDate
\REGISTRY\A\{c8ee8836-56b2-18bc-ba22-35170f184cf6}\Root\InventoryApplicationFile\gcghcbkfcf.exe|e8e2b85022dee8f9
BinProductVersion
\REGISTRY\A\{c8ee8836-56b2-18bc-ba22-35170f184cf6}\Root\InventoryApplicationFile\gcghcbkfcf.exe|e8e2b85022dee8f9
AppxPackageFullName
\REGISTRY\A\{c8ee8836-56b2-18bc-ba22-35170f184cf6}\Root\InventoryApplicationFile\gcghcbkfcf.exe|e8e2b85022dee8f9
AppxPackageRelativeId
\REGISTRY\A\{c8ee8836-56b2-18bc-ba22-35170f184cf6}\Root\InventoryApplicationFile\gcghcbkfcf.exe|e8e2b85022dee8f9
Size
\REGISTRY\A\{c8ee8836-56b2-18bc-ba22-35170f184cf6}\Root\InventoryApplicationFile\gcghcbkfcf.exe|e8e2b85022dee8f9
Language
\REGISTRY\A\{c8ee8836-56b2-18bc-ba22-35170f184cf6}\Root\InventoryApplicationFile\gcghcbkfcf.exe|e8e2b85022dee8f9
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00F90438F38
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 34 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
5D8000
unkown
page read and write
malicious
331F000
stack
page read and write
1340000
heap
page read and write
46B000
remote allocation
page execute and read and write
35EBC000
heap
page read and write
132E000
stack
page read and write
B9A000
heap
page read and write
1793B000
stack
page read and write
11D0000
heap
page read and write
1330000
heap
page read and write
B1E000
stack
page read and write
115D000
stack
page read and write
B48000
heap
page read and write
6CD1F000
unkown
page write copy
BF8000
heap
page read and write
15DB000
heap
page read and write
BE8000
heap
page read and write
31E000
unkown
page readonly
4DB0000
heap
page read and write
159A000
heap
page read and write
4B3000
remote allocation
page execute and read and write
98C000
stack
page read and write
17A9A000
heap
page read and write
77D000
stack
page read and write
6CB40000
unkown
page readonly
30AC000
stack
page read and write
17B60000
heap
page read and write
1DB80000
direct allocation
page execute and read and write
D3F000
stack
page read and write
3BE2A000
heap
page read and write
6CCDF000
unkown
page readonly
1751000
heap
page read and write
1DDCF000
direct allocation
page readonly
84D0000
heap
page read and write
17E2A000
heap
page read and write
1DB88000
direct allocation
page execute read
8FC000
stack
page read and write
A1A000
heap
page read and write
329F000
stack
page read and write
868E000
heap
page read and write
5B0000
unkown
page readonly
88C000
stack
page read and write
A1E000
heap
page read and write
261E000
stack
page read and write
17C23000
heap
page read and write
9E0000
heap
page read and write
6CD20000
unkown
page read and write
9B0000
heap
page read and write
2FF49000
heap
page read and write
1162000
stack
page read and write
301000
unkown
page execute read
7C0000
heap
page read and write
638000
unkown
page execute and read and write
17E28000
heap
page read and write
467000
remote allocation
page execute and read and write
29FDE000
heap
page read and write
63B000
unkown
page readonly
3370000
heap
page read and write
6CB1D000
unkown
page readonly
301000
unkown
page execute read
CDA000
heap
page read and write
383000
unkown
page readonly
4D2000
remote allocation
page execute and read and write
84BF000
stack
page read and write
12C0D000
stack
page read and write
300000
unkown
page readonly
106CF000
stack
page read and write
960000
heap
page read and write
4A89D000
stack
page read and write
670000
remote allocation
page execute and read and write
1508000
heap
page read and write
67C000
stack
page read and write
AFE000
stack
page read and write
17BEE000
stack
page read and write
B8D000
heap
page read and write
1DD8D000
direct allocation
page execute read
31E000
unkown
page readonly
9F0000
heap
page read and write
157A000
heap
page read and write
28AE000
stack
page read and write
3250000
heap
page read and write
6CAA1000
unkown
page execute read
5CE000
unkown
page readonly
266F000
stack
page read and write
17A89000
heap
page read and write
12C4E000
stack
page read and write
56B000
remote allocation
page execute and read and write
4A32B000
stack
page read and write
17A40000
heap
page read and write
442CE000
stack
page read and write
6CAA0000
unkown
page readonly
300000
unkown
page readonly
4A36C000
stack
page read and write
6CD25000
unkown
page readonly
6CB32000
unkown
page readonly
AD0000
heap
page read and write
1518D000
stack
page read and write
E7F000
stack
page read and write
B00000
heap
page read and write
2CED000
stack
page read and write
1DCE6000
direct allocation
page execute read
B6D000
heap
page read and write
1500000
heap
page read and write
12ED000
stack
page read and write
17AFA000
heap
page read and write
CAE000
stack
page read and write
2406D000
heap
page read and write
1789C000
stack
page read and write
17A80000
heap
page read and write
306C000
stack
page read and write
BF0000
heap
page read and write
CDE000
heap
page read and write
17C00000
heap
page read and write
279D000
stack
page read and write
1DB81000
direct allocation
page execute read
4A79D000
stack
page read and write
3110000
heap
page read and write
866C000
stack
page read and write
C3E000
stack
page read and write
B5D000
heap
page read and write
1535D000
stack
page read and write
6CD1E000
unkown
page read and write
B40000
heap
page read and write
CD0000
heap
page read and write
8687000
heap
page read and write
A1D0000
unclassified section
page read and write
17C1C000
heap
page read and write
9E5000
heap
page read and write
271D000
stack
page read and write
5FC000
stack
page read and write
5D8000
unkown
page write copy
656000
remote allocation
page execute and read and write
63B000
unkown
page readonly
380000
unkown
page execute and read and write
D7E000
stack
page read and write
15CD000
heap
page read and write
85D0000
heap
page read and write
106C000
stack
page read and write
1E0FA000
heap
page read and write
2E4F000
stack
page read and write
16AB000
heap
page read and write
1DD98000
direct allocation
page readonly
322E000
stack
page read and write
16A2000
heap
page read and write
3230000
heap
page read and write
B82000
heap
page read and write
463000
remote allocation
page execute and read and write
6CB2E000
unkown
page read and write
1549000
heap
page read and write
1565000
heap
page read and write
7B0000
heap
page read and write
D3E000
stack
page read and write
5CE000
unkown
page readonly
8680000
heap
page read and write
275D000
stack
page read and write
1DDCD000
direct allocation
page readonly
63A000
unkown
page read and write
27A0000
heap
page read and write
5B0000
unkown
page readonly
5B1000
unkown
page execute read
17AAB000
heap
page read and write
116C000
stack
page read and write
17A3A000
stack
page read and write
152FF000
stack
page read and write
328000
unkown
page read and write
151FE000
stack
page read and write
17D81000
heap
page read and write
C6F000
stack
page read and write
32DE000
stack
page read and write
48F000
remote allocation
page execute and read and write
6CB41000
unkown
page execute read
1DD8F000
direct allocation
page readonly
381000
unkown
page read and write
1DDCA000
direct allocation
page readonly
17D63000
heap
page read and write
5B1000
unkown
page execute read
2D4E000
stack
page read and write
17AF2000
heap
page read and write
1DDE2000
heap
page read and write
17AEB000
heap
page read and write
B60000
heap
page read and write
328000
unkown
page write copy
9AE000
stack
page read and write
45E000
remote allocation
page execute and read and write
5F7E000
stack
page read and write
862E000
stack
page read and write
3377000
heap
page read and write
383000
unkown
page readonly
84E2000
heap
page read and write
1DDC2000
direct allocation
page read and write
E3F000
stack
page read and write
A10000
heap
page read and write
17B73000
heap
page read and write
There are 185 hidden memdumps, click here to show them.