IOC Report
NdSXVNeoET.exe

loading gif

Files

File Path
Type
Category
Malicious
NdSXVNeoET.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MSBuild.exe_6913a4814265af35d1c2eeb9537142ca1e6c434_05bdfb8c_01c81d05-e7fd-45f2-a953-3f26df44e844\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MSBuild.exe_d8d3983d841f7bc8992a6bd0403237a385643319_05bdfb8c_7738099b-b168-4295-900b-67daf82a37a6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_NdSXVNeoET.exe_75c9d237eb8ab43cf8887475a4937cb8b4eddaf_5ed69546_1b010ea4-4a28-404c-baab-b7bdfb15ad8e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\userIDHDGDHJEG.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\a43486128347[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AFCBAEBAEBFHCAKFCAKECFCAFC
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\AFIDGDBGCAAFIDHIJKEHDGDGII
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\AKECBFBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\BGHIDGCAFCBAAAAAFHDA
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\EGIDAAFIEHIEHJKFHCAEGCBFHJ
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GCAKKECA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HJEHIJEBKEBFBFHIIDHI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IIIEBGCBGIDHDGCAKJEBAKJJKE
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IJEGDBGDBFIJKECBAKFB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_userIDHDGDHJ_a4f64afacf7a214abf56dc6ccc12fb37bf76a90_ac7cc043_1f7f4b2d-10d8-4a14-8286-0ee08e46afc6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER23DF.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 16:00:17 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER248C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER24DB.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5CE0.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 16:00:32 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5D30.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5D7F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6695.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Oct 7 16:00:34 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER679F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER67C0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6E17.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Oct 7 16:00:36 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6F21.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6F61.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\NdSXVNeoET.exe
"C:\Users\user\Desktop\NdSXVNeoET.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Users\userIDHDGDHJEG.exe
"C:\Users\userIDHDGDHJEG.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5796 -s 272
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\userIDHDGDHJEG.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 272
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6292 -s 1636
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6292 -s 1576

URLs

Name
IP
Malicious
frizzettei.sbs
malicious
http://46.8.231.109/c4754d4f680ead72.php
46.8.231.109
malicious
http://46.8.231.109/c4754d4f680ead72.phpnu
unknown
malicious
http://46.8.231.109/1309cdeb8f4c8736/vcruntime140.dll-
unknown
malicious
http://46.8.231.109/c4754d4f680ead72.phpY
unknown
malicious
http://46.8.231.109/1309cdeb8f4c8736/msvcp140.dll
46.8.231.109
malicious
http://46.8.231.109/c4754d4f680ead72.phpS
unknown
malicious
laddyirekyi.sbs
malicious
isoplethui.sbs
malicious
http://46.8.231.109/c4754d4f680ead72.phpry=----GCAKKECAEGDGCBFIJEGHefault-release
unknown
malicious
http://46.8.231.109/
46.8.231.109
malicious
http://46.8.231.109/1309cdeb8f4c8736/nss3.dll
46.8.231.109
malicious
http://46.8.231.109/1309cdeb8f4c8736/mozglue.dlll
unknown
malicious
http://46.8.231.109/1309cdeb8f4c8736/softokn3.dll
46.8.231.109
malicious
http://46.8.231.109/c4754d4f680ead72.phpootn
unknown
malicious
http://46.8.231.109/1309cdeb8f4c8736/vcruntime140.dll
46.8.231.109
malicious
invinjurhey.sbs
malicious
https://exemplarou.sbs/api
188.114.97.3
malicious
exilepolsiy.sbs
malicious
http://46.8.231.109DGDHJEG-data;
unknown
malicious
http://46.8.231.109/1309cdeb8f4c8736/freebl3.dll
46.8.231.109
malicious
http://46.8.231.109/1309cdeb8f4c8736/sqlite3.dll.
unknown
malicious
http://46.8.231.109/1309cdeb8f4c8736/softokn3.dllT
unknown
malicious
http://46.8.231.109
unknown
malicious
http://46.8.231.109/1309cdeb8f4c8736/mozglue.dll
46.8.231.109
malicious
http://46.8.231.109/1309cdeb8f4c8736/msvcp140.dll8
unknown
malicious
bemuzzeki.sbs
malicious
http://46.8.231.109/1309cdeb8f4c8736/sqlite3.dll
46.8.231.109
malicious
http://46.8.231.109/c4754d4f680ead72.phpw
unknown
malicious
exemplarou.sbs
malicious
wickedneatr.sbs
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://exemplarou.sbs/
unknown
https://duckduckgo.com/ac/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
http://nsdm.cumpar-auto-orice-tip.ro/ldms/a43486128347.exe
147.45.44.104
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.sqlite.org/copyright.html.
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://exemplarou.sbs/apin
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
There are 48 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
exemplarou.sbs
188.114.97.3
malicious
bg.microsoft.map.fastly.net
199.232.210.172
nsdm.cumpar-auto-orice-tip.ro
147.45.44.104
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
46.8.231.109
unknown
Russian Federation
malicious
188.114.97.3
exemplarou.sbs
European Union
malicious
147.45.44.104
nsdm.cumpar-auto-orice-tip.ro
Russian Federation

Registry

Path
Value
Malicious
\REGISTRY\A\{6d89daee-5553-6de4-3f2b-46b17fc9ff6a}\Root\InventoryApplicationFile\ndsxvneoet.exe|c1dd2f9775b5be34
ProgramId
\REGISTRY\A\{6d89daee-5553-6de4-3f2b-46b17fc9ff6a}\Root\InventoryApplicationFile\ndsxvneoet.exe|c1dd2f9775b5be34
FileId
\REGISTRY\A\{6d89daee-5553-6de4-3f2b-46b17fc9ff6a}\Root\InventoryApplicationFile\ndsxvneoet.exe|c1dd2f9775b5be34
LowerCaseLongPath
\REGISTRY\A\{6d89daee-5553-6de4-3f2b-46b17fc9ff6a}\Root\InventoryApplicationFile\ndsxvneoet.exe|c1dd2f9775b5be34
LongPathHash
\REGISTRY\A\{6d89daee-5553-6de4-3f2b-46b17fc9ff6a}\Root\InventoryApplicationFile\ndsxvneoet.exe|c1dd2f9775b5be34
Name
\REGISTRY\A\{6d89daee-5553-6de4-3f2b-46b17fc9ff6a}\Root\InventoryApplicationFile\ndsxvneoet.exe|c1dd2f9775b5be34
OriginalFileName
\REGISTRY\A\{6d89daee-5553-6de4-3f2b-46b17fc9ff6a}\Root\InventoryApplicationFile\ndsxvneoet.exe|c1dd2f9775b5be34
Publisher
\REGISTRY\A\{6d89daee-5553-6de4-3f2b-46b17fc9ff6a}\Root\InventoryApplicationFile\ndsxvneoet.exe|c1dd2f9775b5be34
Version
\REGISTRY\A\{6d89daee-5553-6de4-3f2b-46b17fc9ff6a}\Root\InventoryApplicationFile\ndsxvneoet.exe|c1dd2f9775b5be34
BinFileVersion
\REGISTRY\A\{6d89daee-5553-6de4-3f2b-46b17fc9ff6a}\Root\InventoryApplicationFile\ndsxvneoet.exe|c1dd2f9775b5be34
BinaryType
\REGISTRY\A\{6d89daee-5553-6de4-3f2b-46b17fc9ff6a}\Root\InventoryApplicationFile\ndsxvneoet.exe|c1dd2f9775b5be34
ProductName
\REGISTRY\A\{6d89daee-5553-6de4-3f2b-46b17fc9ff6a}\Root\InventoryApplicationFile\ndsxvneoet.exe|c1dd2f9775b5be34
ProductVersion
\REGISTRY\A\{6d89daee-5553-6de4-3f2b-46b17fc9ff6a}\Root\InventoryApplicationFile\ndsxvneoet.exe|c1dd2f9775b5be34
LinkDate
\REGISTRY\A\{6d89daee-5553-6de4-3f2b-46b17fc9ff6a}\Root\InventoryApplicationFile\ndsxvneoet.exe|c1dd2f9775b5be34
BinProductVersion
\REGISTRY\A\{6d89daee-5553-6de4-3f2b-46b17fc9ff6a}\Root\InventoryApplicationFile\ndsxvneoet.exe|c1dd2f9775b5be34
AppxPackageFullName
\REGISTRY\A\{6d89daee-5553-6de4-3f2b-46b17fc9ff6a}\Root\InventoryApplicationFile\ndsxvneoet.exe|c1dd2f9775b5be34
AppxPackageRelativeId
\REGISTRY\A\{6d89daee-5553-6de4-3f2b-46b17fc9ff6a}\Root\InventoryApplicationFile\ndsxvneoet.exe|c1dd2f9775b5be34
Size
\REGISTRY\A\{6d89daee-5553-6de4-3f2b-46b17fc9ff6a}\Root\InventoryApplicationFile\ndsxvneoet.exe|c1dd2f9775b5be34
Language
\REGISTRY\A\{6d89daee-5553-6de4-3f2b-46b17fc9ff6a}\Root\InventoryApplicationFile\ndsxvneoet.exe|c1dd2f9775b5be34
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
\REGISTRY\A\{1f82cbde-ca3a-ded8-faf1-58120f990adf}\Root\InventoryApplicationFile\useridhdgdhj|62be9db353f20c1d
ProgramId
\REGISTRY\A\{1f82cbde-ca3a-ded8-faf1-58120f990adf}\Root\InventoryApplicationFile\useridhdgdhj|62be9db353f20c1d
FileId
\REGISTRY\A\{1f82cbde-ca3a-ded8-faf1-58120f990adf}\Root\InventoryApplicationFile\useridhdgdhj|62be9db353f20c1d
LowerCaseLongPath
\REGISTRY\A\{1f82cbde-ca3a-ded8-faf1-58120f990adf}\Root\InventoryApplicationFile\useridhdgdhj|62be9db353f20c1d
LongPathHash
\REGISTRY\A\{1f82cbde-ca3a-ded8-faf1-58120f990adf}\Root\InventoryApplicationFile\useridhdgdhj|62be9db353f20c1d
Name
\REGISTRY\A\{1f82cbde-ca3a-ded8-faf1-58120f990adf}\Root\InventoryApplicationFile\useridhdgdhj|62be9db353f20c1d
OriginalFileName
\REGISTRY\A\{1f82cbde-ca3a-ded8-faf1-58120f990adf}\Root\InventoryApplicationFile\useridhdgdhj|62be9db353f20c1d
Publisher
\REGISTRY\A\{1f82cbde-ca3a-ded8-faf1-58120f990adf}\Root\InventoryApplicationFile\useridhdgdhj|62be9db353f20c1d
Version
\REGISTRY\A\{1f82cbde-ca3a-ded8-faf1-58120f990adf}\Root\InventoryApplicationFile\useridhdgdhj|62be9db353f20c1d
BinFileVersion
\REGISTRY\A\{1f82cbde-ca3a-ded8-faf1-58120f990adf}\Root\InventoryApplicationFile\useridhdgdhj|62be9db353f20c1d
BinaryType
\REGISTRY\A\{1f82cbde-ca3a-ded8-faf1-58120f990adf}\Root\InventoryApplicationFile\useridhdgdhj|62be9db353f20c1d
ProductName
\REGISTRY\A\{1f82cbde-ca3a-ded8-faf1-58120f990adf}\Root\InventoryApplicationFile\useridhdgdhj|62be9db353f20c1d
ProductVersion
\REGISTRY\A\{1f82cbde-ca3a-ded8-faf1-58120f990adf}\Root\InventoryApplicationFile\useridhdgdhj|62be9db353f20c1d
LinkDate
\REGISTRY\A\{1f82cbde-ca3a-ded8-faf1-58120f990adf}\Root\InventoryApplicationFile\useridhdgdhj|62be9db353f20c1d
BinProductVersion
\REGISTRY\A\{1f82cbde-ca3a-ded8-faf1-58120f990adf}\Root\InventoryApplicationFile\useridhdgdhj|62be9db353f20c1d
AppxPackageFullName
\REGISTRY\A\{1f82cbde-ca3a-ded8-faf1-58120f990adf}\Root\InventoryApplicationFile\useridhdgdhj|62be9db353f20c1d
AppxPackageRelativeId
\REGISTRY\A\{1f82cbde-ca3a-ded8-faf1-58120f990adf}\Root\InventoryApplicationFile\useridhdgdhj|62be9db353f20c1d
Size
\REGISTRY\A\{1f82cbde-ca3a-ded8-faf1-58120f990adf}\Root\InventoryApplicationFile\useridhdgdhj|62be9db353f20c1d
Language
\REGISTRY\A\{1f82cbde-ca3a-ded8-faf1-58120f990adf}\Root\InventoryApplicationFile\useridhdgdhj|62be9db353f20c1d
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProgramId
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
FileId
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LowerCaseLongPath
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LongPathHash
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Name
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
OriginalFileName
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Publisher
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Version
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinFileVersion
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinaryType
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductName
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductVersion
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LinkDate
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinProductVersion
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageFullName
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageRelativeId
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Size
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Language
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
IsOsComponent
\REGISTRY\A\{84576d5d-0b7d-6cf6-dcde-3c60e8cf7f66}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Usn
There are 54 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1387000
heap
page read and write
malicious
8CD000
unkown
page read and write
malicious
1DD000
unkown
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
217A5000
heap
page read and write
278B7000
heap
page read and write
1B1000
unkown
page execute read
181C000
heap
page read and write
6CB5E000
unkown
page read and write
61ECC000
direct allocation
page read and write
13F0000
heap
page read and write
FE8000
stack
page read and write
278A6000
heap
page read and write
21783000
heap
page read and write
F95000
heap
page read and write
ABE000
stack
page read and write
1B1BE000
stack
page read and write
1B700000
heap
page read and write
61ED0000
direct allocation
page read and write
170F000
stack
page read and write
D5F000
stack
page read and write
485000
remote allocation
page execute and read and write
61ECD000
direct allocation
page readonly
1B45D000
stack
page read and write
1B0000
unkown
page readonly
8A0000
unkown
page readonly
65C000
remote allocation
page execute and read and write
6CB70000
unkown
page readonly
1250000
heap
page read and write
A70000
heap
page read and write
FED000
stack
page read and write
8A1000
unkown
page execute read
FE0000
heap
page read and write
21798000
heap
page read and write
2DB0000
heap
page read and write
217B9000
heap
page read and write
1B3FF000
stack
page read and write
235000
unkown
page execute and read and write
13FE000
heap
page read and write
151A000
heap
page read and write
146A000
heap
page read and write
2BA0000
heap
page read and write
13B3000
heap
page read and write
236000
unkown
page read and write
5A5000
remote allocation
page execute and read and write
1144000
heap
page read and write
61ED3000
direct allocation
page read and write
1DD000
unkown
page write copy
238000
unkown
page readonly
960000
heap
page read and write
1AF3E000
stack
page read and write
147E000
stack
page read and write
1B03F000
stack
page read and write
10AD000
heap
page read and write
FF0000
heap
page read and write
1B2BE000
stack
page read and write
EFB000
stack
page read and write
B76000
heap
page read and write
10C6000
heap
page read and write
6CAD0000
unkown
page readonly
217A7000
heap
page read and write
6CD0F000
unkown
page readonly
1810000
heap
page read and write
EEC000
stack
page read and write
AFE000
stack
page read and write
323E000
stack
page read and write
347F000
stack
page read and write
164E000
stack
page read and write
180F000
stack
page read and write
8A1000
unkown
page execute read
8C3000
unkown
page readonly
21790000
heap
page read and write
492000
remote allocation
page execute and read and write
6CD4F000
unkown
page write copy
238000
unkown
page readonly
1B0000
unkown
page readonly
1D3000
unkown
page readonly
45E000
remote allocation
page execute and read and write
1B817000
heap
page read and write
277F0000
heap
page read and write
F90000
heap
page read and write
13E2000
heap
page read and write
F8D000
stack
page read and write
6CD55000
unkown
page readonly
48F000
remote allocation
page execute and read and write
2D3D000
stack
page read and write
6CB71000
unkown
page execute read
1B07D000
stack
page read and write
1380000
heap
page read and write
151E000
heap
page read and write
1B17E000
stack
page read and write
91B000
unkown
page read and write
2CFD000
stack
page read and write
346F0000
heap
page read and write
4E2000
remote allocation
page execute and read and write
5CB000
remote allocation
page execute and read and write
1080000
heap
page read and write
13F2000
heap
page read and write
51E000
remote allocation
page execute and read and write
61EB4000
direct allocation
page read and write
2188C000
heap
page read and write
91A000
unkown
page execute and read and write
6CD4E000
unkown
page read and write
488000
remote allocation
page execute and read and write
2A9E000
stack
page read and write
B60000
heap
page read and write
12FD000
stack
page read and write
4EF000
remote allocation
page execute and read and write
FE2000
stack
page read and write
FE4000
stack
page read and write
1088000
heap
page read and write
12B5000
heap
page read and write
12A0000
heap
page read and write
144A000
heap
page read and write
4BD000
remote allocation
page execute and read and write
45A000
remote allocation
page execute and read and write
10CE000
heap
page read and write
21780000
heap
page read and write
2BFD000
stack
page read and write
91C000
unkown
page readonly
1813000
heap
page read and write
1B59D000
stack
page read and write
278BB000
heap
page read and write
64A000
remote allocation
page execute and read and write
61ED4000
direct allocation
page readonly
12B0000
heap
page read and write
34FC000
stack
page read and write
1B1000
unkown
page execute read
217C2000
heap
page read and write
4B1000
remote allocation
page execute and read and write
61EB7000
direct allocation
page readonly
217A0000
heap
page read and write
130E000
stack
page read and write
1360000
heap
page read and write
27831000
heap
page read and write
5C5000
remote allocation
page execute and read and write
1B2FE000
stack
page read and write
11BE000
stack
page read and write
2D8BE000
stack
page read and write
217D1000
heap
page read and write
109C000
heap
page read and write
278C2000
heap
page read and write
B6E000
heap
page read and write
93D000
stack
page read and write
8CD000
unkown
page write copy
1B69D000
stack
page read and write
27810000
heap
page read and write
91C000
unkown
page readonly
F60000
heap
page read and write
6CB4D000
unkown
page readonly
337E000
stack
page read and write
F70000
heap
page read and write
2F2F000
stack
page read and write
1B710000
heap
page read and write
51B000
remote allocation
page execute and read and write
35FE000
stack
page read and write
6CAD1000
unkown
page execute read
34B0000
heap
page read and write
345A0000
heap
page read and write
10C2000
heap
page read and write
143E000
stack
page read and write
50F000
remote allocation
page execute and read and write
B6A000
heap
page read and write
BFB000
stack
page read and write
333F000
stack
page read and write
2B9F000
stack
page read and write
8A0000
unkown
page readonly
83C000
stack
page read and write
1D3000
unkown
page readonly
1510000
heap
page read and write
990000
heap
page read and write
1B55D000
stack
page read and write
E5F000
stack
page read and write
129D000
stack
page read and write
6CB62000
unkown
page readonly
61E00000
direct allocation
page execute and read and write
2D9CE000
stack
page read and write
61E01000
direct allocation
page execute read
2EBC000
stack
page read and write
13C7000
heap
page read and write
8C3000
unkown
page readonly
113D000
heap
page read and write
12BF000
stack
page read and write
6CD50000
unkown
page read and write
There are 175 hidden memdumps, click here to show them.