IOC Report
7f3c2473d1e6.exe

loading gif

Files

File Path
Type
Category
Malicious
7f3c2473d1e6.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\HDBGDHDAEC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7f3c2473d1e6.exe_9fd92f15c492a799f891424d39a9530e3abb9da_28c5698f_38707e1e-3289-4837-89b3-2e85ae3a7731\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_HDBGDHDAEC.exe_9462198e3f37c7348675682c5e81fc8b21bdb95_86d98617_1d13e13d-72ca-4dda-b9b8-962e48f2eaab\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\a43486128347[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\sql[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\GCGHJEBGHJKE\AECAKE
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GCGHJEBGHJKE\AECAKE-shm
data
dropped
C:\ProgramData\GCGHJEBGHJKE\AEGDBA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GCGHJEBGHJKE\AFIEGC
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\GCGHJEBGHJKE\BFBFBF
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GCGHJEBGHJKE\BKFIJJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GCGHJEBGHJKE\DBFCBG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GCGHJEBGHJKE\FCAFIJ
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GCGHJEBGHJKE\HJDBFB
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\GCGHJEBGHJKE\JEHJKJ
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GCGHJEBGHJKE\JEHJKJ-shm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9B11.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Oct 4 13:45:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9B60.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9B80.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREBB6.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Oct 4 13:44:15 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREC15.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREC45.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\7f3c2473d1e6.exe
"C:\Users\user\Desktop\7f3c2473d1e6.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\ProgramData\HDBGDHDAEC.exe
"C:\ProgramData\HDBGDHDAEC.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5660 -s 272
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4476 -s 272
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\GCGHJEBGHJKE" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10

URLs

Name
IP
Malicious
https://feelystroll.buzz/api
104.21.0.152
malicious
http://proxy.johnmccrea.com//vcruntime140.dll
141.98.233.156
malicious
studennotediw.stor
malicious
http://proxy.johnmccrea.com//softokn3.dll
141.98.233.156
malicious
http://proxy.johnmccrea.com//nss3.dll
141.98.233.156
malicious
http://proxy.johnmccrea.com//mozglue.dll
141.98.233.156
malicious
spirittunek.stor
malicious
https://spirittunek.store/api
188.114.96.3
malicious
https://steamcommunity.com/profiles/76561199780418869
malicious
http://proxy.johnmccrea.com//msvcp140.dll
141.98.233.156
malicious
eaglepawnoy.stor
malicious
clearancek.site
malicious
mobbipenju.stor
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
licendfilteo.site
malicious
http://cowod.hopto.org/
45.132.206.251
malicious
http://proxy.johnmccrea.com//sql.dll
141.98.233.156
malicious
http://proxy.johnmccrea.com/
141.98.233.156
malicious
https://clearancek.site/api
188.114.97.3
malicious
https://dissapoiznw.store/api
188.114.96.3
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
https://studennotediw.store/api
188.114.96.3
malicious
https://mobbipenju.store/api
104.21.69.130
malicious
https://bathdoomgaz.store/api
188.114.97.3
malicious
http://proxy.johnmccrea.com//freebl3.dll
141.98.233.156
malicious
https://eaglepawnoy.store/api
172.67.156.136
malicious
bathdoomgaz.stor
malicious
dissapoiznw.stor
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://proxy.johnmccrea.com/ontent-Disposition:
unknown
https://duckduckgo.com/ac/?q=
unknown
http://cowod.hopto.org.com/data;
unknown
http://cowod.hopto.org
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://clearancek.site/D~k
unknown
http://cowod.hoptoCBGHCAA
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://proxy.johnmccrea.com/C
unknown
http://cowod.hopto.BGHCAA
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
https://spirittunek.store/
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
http://proxy.johnmccrea.com//freebl3.dll4
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://cowod.hopto.
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
http://cowod.DGHDGCBGHCAA
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://proxy.johnmccrea.com/gfdsgrewgdsfadsahttps://steamcommunity.com/profiles/76561199780418869u55
unknown
http://cowod.hopto
unknown
http://cowod.hopto.org/M
unknown
http://proxy.johnmccrea.com//mozglue.dllD
unknown
http://cowod.hopto.orgEGC
unknown
http://proxy.johnmccrea.com//nss3.dllV
unknown
http://proxy.johnmccrea.com//msvcp140.dllX
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://jask.powerforxes.shop/ldms/a43486128347.exe1kkkkoken
unknown
http://www.sqlite.org/copyright.html.
unknown
https://feelystroll.buzz/R_
unknown
https://t.me/ae5ed
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://feelystroll.buzz/
unknown
https://mozilla.org0/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://feelystroll.buzz//
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://upx.sf.net
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ost.exe
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://jask.powerforxes.shop/ldms/a43486128347.exerm-data;
unknown
https://feelystroll.buzz/0
unknown
https://support.mozilla.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://cowod.hopto.org854c41ac1nt-Disposition:
unknown
https://t.me/ae5edu55uhttps://steamcommunity.com/profiles/76561199780418869sql.dllsqlp.dllMozilla/5.
unknown
https://studennotediw.store/dT
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://jask.powerforxes.shop/ldms/a43486128347.exe
147.45.44.104
https://clearancek.site/apis
unknown
There are 80 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
feelystroll.buzz
104.21.0.152
malicious
cowod.hopto.org
45.132.206.251
malicious
bathdoomgaz.store
188.114.97.3
malicious
spirittunek.store
188.114.96.3
malicious
studennotediw.store
188.114.96.3
malicious
mobbipenju.store
104.21.69.130
malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
172.67.156.136
malicious
clearancek.site
188.114.97.3
malicious
dissapoiznw.store
188.114.96.3
malicious
proxy.johnmccrea.com
141.98.233.156
malicious
licendfilteo.site
unknown
malicious
fp2e7a.wpc.phicdn.net
192.229.221.95
jask.powerforxes.shop
147.45.44.104
s-part-0032.t-0009.t-msedge.net
13.107.246.60
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
172.67.156.136
eaglepawnoy.store
United States
malicious
141.98.233.156
proxy.johnmccrea.com
Russian Federation
malicious
188.114.97.3
bathdoomgaz.store
European Union
malicious
104.21.0.152
feelystroll.buzz
United States
malicious
104.21.69.130
mobbipenju.store
United States
malicious
188.114.96.3
spirittunek.store
European Union
malicious
104.102.49.254
steamcommunity.com
United States
malicious
45.132.206.251
cowod.hopto.org
Russian Federation
malicious
147.45.44.104
jask.powerforxes.shop
Russian Federation

Registry

Path
Value
Malicious
\REGISTRY\A\{26f24c6b-752e-f4d6-be44-cdce02c0b42a}\Root\InventoryApplicationFile\7f3c2473d1e6.exe|bb77c683361ceab5
ProgramId
malicious
\REGISTRY\A\{26f24c6b-752e-f4d6-be44-cdce02c0b42a}\Root\InventoryApplicationFile\7f3c2473d1e6.exe|bb77c683361ceab5
FileId
malicious
\REGISTRY\A\{26f24c6b-752e-f4d6-be44-cdce02c0b42a}\Root\InventoryApplicationFile\7f3c2473d1e6.exe|bb77c683361ceab5
LowerCaseLongPath
malicious
\REGISTRY\A\{26f24c6b-752e-f4d6-be44-cdce02c0b42a}\Root\InventoryApplicationFile\7f3c2473d1e6.exe|bb77c683361ceab5
LongPathHash
malicious
\REGISTRY\A\{26f24c6b-752e-f4d6-be44-cdce02c0b42a}\Root\InventoryApplicationFile\7f3c2473d1e6.exe|bb77c683361ceab5
Name
malicious
\REGISTRY\A\{26f24c6b-752e-f4d6-be44-cdce02c0b42a}\Root\InventoryApplicationFile\7f3c2473d1e6.exe|bb77c683361ceab5
OriginalFileName
malicious
\REGISTRY\A\{26f24c6b-752e-f4d6-be44-cdce02c0b42a}\Root\InventoryApplicationFile\7f3c2473d1e6.exe|bb77c683361ceab5
Publisher
malicious
\REGISTRY\A\{26f24c6b-752e-f4d6-be44-cdce02c0b42a}\Root\InventoryApplicationFile\7f3c2473d1e6.exe|bb77c683361ceab5
Version
malicious
\REGISTRY\A\{26f24c6b-752e-f4d6-be44-cdce02c0b42a}\Root\InventoryApplicationFile\7f3c2473d1e6.exe|bb77c683361ceab5
BinFileVersion
malicious
\REGISTRY\A\{26f24c6b-752e-f4d6-be44-cdce02c0b42a}\Root\InventoryApplicationFile\7f3c2473d1e6.exe|bb77c683361ceab5
BinaryType
malicious
\REGISTRY\A\{26f24c6b-752e-f4d6-be44-cdce02c0b42a}\Root\InventoryApplicationFile\7f3c2473d1e6.exe|bb77c683361ceab5
ProductName
malicious
\REGISTRY\A\{26f24c6b-752e-f4d6-be44-cdce02c0b42a}\Root\InventoryApplicationFile\7f3c2473d1e6.exe|bb77c683361ceab5
ProductVersion
malicious
\REGISTRY\A\{26f24c6b-752e-f4d6-be44-cdce02c0b42a}\Root\InventoryApplicationFile\7f3c2473d1e6.exe|bb77c683361ceab5
LinkDate
malicious
\REGISTRY\A\{26f24c6b-752e-f4d6-be44-cdce02c0b42a}\Root\InventoryApplicationFile\7f3c2473d1e6.exe|bb77c683361ceab5
BinProductVersion
malicious
\REGISTRY\A\{26f24c6b-752e-f4d6-be44-cdce02c0b42a}\Root\InventoryApplicationFile\7f3c2473d1e6.exe|bb77c683361ceab5
AppxPackageFullName
malicious
\REGISTRY\A\{26f24c6b-752e-f4d6-be44-cdce02c0b42a}\Root\InventoryApplicationFile\7f3c2473d1e6.exe|bb77c683361ceab5
AppxPackageRelativeId
malicious
\REGISTRY\A\{26f24c6b-752e-f4d6-be44-cdce02c0b42a}\Root\InventoryApplicationFile\7f3c2473d1e6.exe|bb77c683361ceab5
Size
malicious
\REGISTRY\A\{26f24c6b-752e-f4d6-be44-cdce02c0b42a}\Root\InventoryApplicationFile\7f3c2473d1e6.exe|bb77c683361ceab5
Language
malicious
\REGISTRY\A\{26f24c6b-752e-f4d6-be44-cdce02c0b42a}\Root\InventoryApplicationFile\7f3c2473d1e6.exe|bb77c683361ceab5
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{da02a28f-61a5-95dc-533a-f99c85e78f89}\Root\InventoryApplicationFile\hdbgdhdaec.exe|8f6c8e95c90446c8
ProgramId
\REGISTRY\A\{da02a28f-61a5-95dc-533a-f99c85e78f89}\Root\InventoryApplicationFile\hdbgdhdaec.exe|8f6c8e95c90446c8
FileId
\REGISTRY\A\{da02a28f-61a5-95dc-533a-f99c85e78f89}\Root\InventoryApplicationFile\hdbgdhdaec.exe|8f6c8e95c90446c8
LowerCaseLongPath
\REGISTRY\A\{da02a28f-61a5-95dc-533a-f99c85e78f89}\Root\InventoryApplicationFile\hdbgdhdaec.exe|8f6c8e95c90446c8
LongPathHash
\REGISTRY\A\{da02a28f-61a5-95dc-533a-f99c85e78f89}\Root\InventoryApplicationFile\hdbgdhdaec.exe|8f6c8e95c90446c8
Name
\REGISTRY\A\{da02a28f-61a5-95dc-533a-f99c85e78f89}\Root\InventoryApplicationFile\hdbgdhdaec.exe|8f6c8e95c90446c8
OriginalFileName
\REGISTRY\A\{da02a28f-61a5-95dc-533a-f99c85e78f89}\Root\InventoryApplicationFile\hdbgdhdaec.exe|8f6c8e95c90446c8
Publisher
\REGISTRY\A\{da02a28f-61a5-95dc-533a-f99c85e78f89}\Root\InventoryApplicationFile\hdbgdhdaec.exe|8f6c8e95c90446c8
Version
\REGISTRY\A\{da02a28f-61a5-95dc-533a-f99c85e78f89}\Root\InventoryApplicationFile\hdbgdhdaec.exe|8f6c8e95c90446c8
BinFileVersion
\REGISTRY\A\{da02a28f-61a5-95dc-533a-f99c85e78f89}\Root\InventoryApplicationFile\hdbgdhdaec.exe|8f6c8e95c90446c8
BinaryType
\REGISTRY\A\{da02a28f-61a5-95dc-533a-f99c85e78f89}\Root\InventoryApplicationFile\hdbgdhdaec.exe|8f6c8e95c90446c8
ProductName
\REGISTRY\A\{da02a28f-61a5-95dc-533a-f99c85e78f89}\Root\InventoryApplicationFile\hdbgdhdaec.exe|8f6c8e95c90446c8
ProductVersion
\REGISTRY\A\{da02a28f-61a5-95dc-533a-f99c85e78f89}\Root\InventoryApplicationFile\hdbgdhdaec.exe|8f6c8e95c90446c8
LinkDate
\REGISTRY\A\{da02a28f-61a5-95dc-533a-f99c85e78f89}\Root\InventoryApplicationFile\hdbgdhdaec.exe|8f6c8e95c90446c8
BinProductVersion
\REGISTRY\A\{da02a28f-61a5-95dc-533a-f99c85e78f89}\Root\InventoryApplicationFile\hdbgdhdaec.exe|8f6c8e95c90446c8
AppxPackageFullName
\REGISTRY\A\{da02a28f-61a5-95dc-533a-f99c85e78f89}\Root\InventoryApplicationFile\hdbgdhdaec.exe|8f6c8e95c90446c8
AppxPackageRelativeId
\REGISTRY\A\{da02a28f-61a5-95dc-533a-f99c85e78f89}\Root\InventoryApplicationFile\hdbgdhdaec.exe|8f6c8e95c90446c8
Size
\REGISTRY\A\{da02a28f-61a5-95dc-533a-f99c85e78f89}\Root\InventoryApplicationFile\hdbgdhdaec.exe|8f6c8e95c90446c8
Language
\REGISTRY\A\{da02a28f-61a5-95dc-533a-f99c85e78f89}\Root\InventoryApplicationFile\hdbgdhdaec.exe|8f6c8e95c90446c8
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00188010A91173E7
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 34 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A68000
unkown
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
B78000
unkown
page read and write
malicious
BD8000
unkown
page execute and read and write
B6E000
unkown
page readonly
D30000
heap
page read and write
C20000
heap
page read and write
A40000
unkown
page readonly
AFC000
stack
page read and write
45E000
remote allocation
page execute and read and write
D5E000
stack
page read and write
56B000
remote allocation
page execute and read and write
1D7AD000
direct allocation
page readonly
1D6C6000
direct allocation
page execute read
D10000
heap
page read and write
FAF000
stack
page read and write
CF0000
heap
page read and write
6CBE0000
unkown
page readonly
358A9000
heap
page read and write
14C4E000
stack
page read and write
450000
heap
page read and write
487000
heap
page read and write
C15000
heap
page read and write
17718000
heap
page read and write
99D000
stack
page read and write
43CFF000
stack
page read and write
AC0000
unkown
page execute and read and write
175B3000
heap
page read and write
11F0000
heap
page read and write
23A59000
heap
page read and write
656000
remote allocation
page execute and read and write
47A000
heap
page read and write
126CB000
stack
page read and write
1268D000
stack
page read and write
AC1000
unkown
page read and write
D25000
heap
page read and write
1D778000
direct allocation
page readonly
B6E000
unkown
page readonly
BE0000
heap
page read and write
17539000
heap
page read and write
B51000
unkown
page execute read
1010F000
stack
page read and write
2B00000
heap
page read and write
F10000
heap
page read and write
A5E000
unkown
page readonly
4A1DD000
stack
page read and write
DC0000
heap
page read and write
172DE000
stack
page read and write
17536000
heap
page read and write
7DFE000
stack
page read and write
1D76F000
direct allocation
page readonly
CE0000
heap
page read and write
1CD000
stack
page read and write
D8E000
heap
page read and write
1D7CF000
heap
page read and write
2A8E000
stack
page read and write
1D76D000
direct allocation
page execute read
A40000
unkown
page readonly
E8B000
heap
page read and write
1747A000
stack
page read and write
6CBCE000
unkown
page read and write
CE8000
heap
page read and write
128E000
stack
page read and write
B78000
unkown
page write copy
BDE000
stack
page read and write
47E000
heap
page read and write
1290000
heap
page read and write
2A3E000
stack
page read and write
118D000
stack
page read and write
C10000
heap
page read and write
318E000
stack
page read and write
ED7000
heap
page read and write
FCF000
heap
page read and write
A41000
unkown
page execute read
BDB000
unkown
page readonly
B50000
unkown
page readonly
B50000
heap
page read and write
9AE0000
heap
page read and write
D09000
heap
page read and write
CC000
stack
page read and write
2F938000
heap
page read and write
66C000
stack
page read and write
175D8000
heap
page read and write
1000E000
stack
page read and write
177DF000
heap
page read and write
175D1000
heap
page read and write
F0E000
heap
page read and write
8BF000
stack
page read and write
E40000
heap
page read and write
D9E000
stack
page read and write
D0D000
heap
page read and write
26BC000
stack
page read and write
D89000
heap
page read and write
49E2C000
stack
page read and write
158F000
stack
page read and write
4610000
heap
page read and write
BDA000
unkown
page read and write
299C4000
heap
page read and write
9A2000
stack
page read and write
77F000
stack
page read and write
129E000
heap
page read and write
174DA000
heap
page read and write
6CDC5000
unkown
page readonly
6CDBE000
unkown
page read and write
175A0000
heap
page read and write
8AC000
stack
page read and write
174C0000
heap
page read and write
294D000
stack
page read and write
2720000
heap
page read and write
1752B000
heap
page read and write
E48000
heap
page read and write
470000
heap
page read and write
6CBD2000
unkown
page readonly
124E000
stack
page read and write
1D561000
direct allocation
page execute read
2D60000
heap
page read and write
1DAE7000
heap
page read and write
304E000
stack
page read and write
1200000
heap
page read and write
13B0000
heap
page read and write
CFC000
heap
page read and write
6CDC0000
unkown
page read and write
298D000
stack
page read and write
2BB0000
heap
page read and write
4D2000
remote allocation
page execute and read and write
A41000
unkown
page execute read
EBB000
heap
page read and write
494000
remote allocation
page execute and read and write
1D7AA000
direct allocation
page readonly
48F000
remote allocation
page execute and read and write
440000
heap
page read and write
1D7A2000
direct allocation
page read and write
1038000
heap
page read and write
6CB41000
unkown
page execute read
177DD000
heap
page read and write
174C9000
heap
page read and write
A68000
unkown
page write copy
103D000
heap
page read and write
46B000
remote allocation
page execute and read and write
6CD7F000
unkown
page readonly
B51000
unkown
page execute read
463000
remote allocation
page execute and read and write
E0E000
heap
page read and write
2D68000
heap
page read and write
B9E000
stack
page read and write
6CB40000
unkown
page readonly
D85000
heap
page read and write
174EB000
heap
page read and write
58BE000
stack
page read and write
7BE000
stack
page read and write
DAC000
heap
page read and write
D90000
heap
page read and write
9AD0000
heap
page read and write
308E000
stack
page read and write
1D560000
direct allocation
page execute and read and write
FCC000
heap
page read and write
2F4E000
stack
page read and write
FDC000
heap
page read and write
2ABE000
stack
page read and write
C60000
heap
page read and write
D22000
heap
page read and write
9AD000
stack
page read and write
14D9D000
stack
page read and write
4B3000
remote allocation
page execute and read and write
2A7E000
stack
page read and write
108D000
stack
page read and write
E00000
heap
page read and write
12A6000
heap
page read and write
B50000
unkown
page readonly
C10000
heap
page read and write
BDB000
unkown
page readonly
EA5000
heap
page read and write
14D4F000
stack
page read and write
14C0C000
stack
page read and write
6CDBF000
unkown
page write copy
168F000
stack
page read and write
420000
heap
page read and write
4A2DD000
stack
page read and write
1014D000
stack
page read and write
175C0000
heap
page read and write
A5E000
unkown
page readonly
2AFE000
stack
page read and write
6CBBD000
unkown
page readonly
1D568000
direct allocation
page execute read
2E0E000
stack
page read and write
10AE000
stack
page read and write
1D7AF000
direct allocation
page readonly
2F0F000
stack
page read and write
400000
remote allocation
page execute and read and write
670000
remote allocation
page execute and read and write
49DEB000
stack
page read and write
67E000
stack
page read and write
17533000
heap
page read and write
129A000
heap
page read and write
17480000
heap
page read and write
6CBE1000
unkown
page execute read
9BD0000
unclassified section
page read and write
7EC000
stack
page read and write
E07000
heap
page read and write
467000
remote allocation
page execute and read and write
1737B000
stack
page read and write
3B814000
heap
page read and write
CAD000
stack
page read and write
17736000
heap
page read and write
AC3000
unkown
page readonly
417BE000
stack
page read and write
1753B000
heap
page read and write
AC3000
unkown
page readonly
There are 198 hidden memdumps, click here to show them.