IOC Report
f1r6P3j3g7.exe

loading gif

Files

File Path
Type
Category
Malicious
f1r6P3j3g7.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\KEGIDHJKKJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_KEGIDHJKKJ.exe_5d48e568e7ddaed7c715c34ba7d8a94937a0f9_bcd0fe0f_18242657-267c-46a5-87ff-84750f054ab7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_f1r6P3j3g7.exe_b95f3ae3b15bcd5a4383aa615a5f42f59835b9_234f6c94_fda499e8-cf30-46d3-9443-7513842412cb\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\a43486128347[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\sql[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BGIJDGCAEBFI\AFIDGD
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BGIJDGCAEBFI\BGIJDG
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BGIJDGCAEBFI\BGIJDG-shm
data
dropped
C:\ProgramData\BGIJDGCAEBFI\DAKEBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BGIJDGCAEBFI\EBFBKF
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BGIJDGCAEBFI\ECGIII
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BGIJDGCAEBFI\EHCGIJ
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BGIJDGCAEBFI\GIIEGH
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\BGIJDGCAEBFI\HJEHIJ
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BGIJDGCAEBFI\HJEHIJ-shm
data
dropped
C:\ProgramData\BGIJDGCAEBFI\JKECFC
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MSBuild.exe_43832d93ddcf66f1edc5babbb1e353ebb92236_05bdfb8c_cc67cea2-f6cd-451e-b7c7-aa0c52bc58ac\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER16A2.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Oct 7 16:43:49 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1859.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1889.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5074.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 16:42:58 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER50C3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER50F3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC71.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 16:43:46 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCA1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCD1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 31 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\f1r6P3j3g7.exe
"C:\Users\user\Desktop\f1r6P3j3g7.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\ProgramData\KEGIDHJKKJ.exe
"C:\ProgramData\KEGIDHJKKJ.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6532 -s 288
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 908 -s 268
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BGIJDGCAEBFI" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 840
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
frizzettei.sbs
malicious
http://lade.petperfectcare.com/mozglue.dll
95.164.90.97
malicious
laddyirekyi.sbs
malicious
isoplethui.sbs
malicious
http://lade.petperfectcare.com/nss3.dll
95.164.90.97
malicious
https://steamcommunity.com/profiles/76561199780418869
malicious
https://t.me/ae5ed
unknown
malicious
invinjurhey.sbs
malicious
http://cowod.hopto.org/
45.132.206.251
malicious
exilepolsiy.sbs
malicious
https://wickedneatr.sbs/api
188.114.96.3
malicious
http://lade.petperfectcare.com/sql.dll
95.164.90.97
malicious
http://lade.petperfectcare.com/
95.164.90.97
malicious
http://lade.petperfectcare.com/msvcp140.dll
95.164.90.97
malicious
http://lade.petperfectcare.com/freebl3.dll
95.164.90.97
malicious
http://lade.petperfectcare.com/softokn3.dll
95.164.90.97
malicious
bemuzzeki.sbs
malicious
http://lade.petperfectcare.com:80nfwqnfwovfdkhttps://steamcommunity.com/profiles/76561199780418869u5
unknown
malicious
exemplarou.sbs
malicious
http://lade.petperfectcare.com/vcruntime140.dll
95.164.90.97
malicious
wickedneatr.sbs
malicious
https://t.me/ae5edu55uhttps://steamcommunity.com/profiles/76561199780418869sql.dllsqlp.dllMozilla/5.
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://duckduckgo.com/ac/?q=
unknown
http://lade.petperfectcare.com/nss3.dllZ_
unknown
http://lade.petperfectcare.com/msvcp140.dll2
unknown
https://wickedneatr.sbs/pi
unknown
http://cowod.hopto.org
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://lade.petperfectcare.com:80t-Disposition:
unknown
http://lade.petperfectcare.com/mozglue.dllC
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://lade.petperfectcare.com:80/sql.dll
unknown
https://frizzettei.sbs/apiwDVP
unknown
http://nsdm.cumpar-auto-orice-tip.ro/ldms/a43486128347.exe1kkkk
unknown
http://nsdm.cumpar-auto-orice-tip.ro/ldms/a43486128347.exe
147.45.44.104
http://lade.petperfectcare.com/softokn3.dllb
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://cowod.hopto.
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://cowod.hopto
unknown
https://frizzettei.sbs/api
unknown
http://cowod.EBFIIECAKFHI
unknown
http://cowod.hopto.org/S
unknown
http://nsdm.cumpar-auto-orice-tip.ro/ldms/a43486128347.exe-
unknown
http://lade.petperfectcare.com:80
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://www.sqlite.org/copyright.html.
unknown
http://cowod.hoptoECAKFHI
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://nsdm.cumpar-auto-orice-tip.ro/ldms/a43486128347.exe=
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://upx.sf.net
unknown
http://cowod.hopto.orgCFH
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ost.exe
unknown
http://lade.petperfectcare.com/freebl3.dllg
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://lade.petperfectcare.com/softokn3.dllO
unknown
https://wickedneatr.sbs/cDWE
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://wickedneatr.sbs:443/api
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://cowod.hopto.CAKFHI
unknown
http://cowod.hopto.orga535a6c5ent-Disposition:
unknown
https://support.mozilla.org
unknown
http://cowod.hopto.orgare.com:80
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 69 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
wickedneatr.sbs
188.114.96.3
malicious
cowod.hopto.org
45.132.206.251
malicious
lade.petperfectcare.com
95.164.90.97
malicious
frizzettei.sbs
unknown
malicious
laddyirekyi.sbs
unknown
malicious
bemuzzeki.sbs
unknown
malicious
invinjurhey.sbs
unknown
malicious
isoplethui.sbs
unknown
malicious
exilepolsiy.sbs
unknown
malicious
exemplarou.sbs
unknown
malicious
bg.microsoft.map.fastly.net
199.232.214.172
nsdm.cumpar-auto-orice-tip.ro
147.45.44.104
s-part-0017.t-0009.t-msedge.net
13.107.246.45
fp2e7a.wpc.phicdn.net
192.229.221.95
198.187.3.20.in-addr.arpa
unknown
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
188.114.96.3
wickedneatr.sbs
European Union
malicious
95.164.90.97
lade.petperfectcare.com
Gibraltar
malicious
45.132.206.251
cowod.hopto.org
Russian Federation
malicious
147.45.44.104
nsdm.cumpar-auto-orice-tip.ro
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
\REGISTRY\A\{e57f2d1e-ffd8-9976-d6a9-e81ab57ad40c}\Root\InventoryApplicationFile\f1r6p3j3g7.exe|7456cea247a6cc77
ProgramId
\REGISTRY\A\{e57f2d1e-ffd8-9976-d6a9-e81ab57ad40c}\Root\InventoryApplicationFile\f1r6p3j3g7.exe|7456cea247a6cc77
FileId
\REGISTRY\A\{e57f2d1e-ffd8-9976-d6a9-e81ab57ad40c}\Root\InventoryApplicationFile\f1r6p3j3g7.exe|7456cea247a6cc77
LowerCaseLongPath
\REGISTRY\A\{e57f2d1e-ffd8-9976-d6a9-e81ab57ad40c}\Root\InventoryApplicationFile\f1r6p3j3g7.exe|7456cea247a6cc77
LongPathHash
\REGISTRY\A\{e57f2d1e-ffd8-9976-d6a9-e81ab57ad40c}\Root\InventoryApplicationFile\f1r6p3j3g7.exe|7456cea247a6cc77
Name
\REGISTRY\A\{e57f2d1e-ffd8-9976-d6a9-e81ab57ad40c}\Root\InventoryApplicationFile\f1r6p3j3g7.exe|7456cea247a6cc77
OriginalFileName
\REGISTRY\A\{e57f2d1e-ffd8-9976-d6a9-e81ab57ad40c}\Root\InventoryApplicationFile\f1r6p3j3g7.exe|7456cea247a6cc77
Publisher
\REGISTRY\A\{e57f2d1e-ffd8-9976-d6a9-e81ab57ad40c}\Root\InventoryApplicationFile\f1r6p3j3g7.exe|7456cea247a6cc77
Version
\REGISTRY\A\{e57f2d1e-ffd8-9976-d6a9-e81ab57ad40c}\Root\InventoryApplicationFile\f1r6p3j3g7.exe|7456cea247a6cc77
BinFileVersion
\REGISTRY\A\{e57f2d1e-ffd8-9976-d6a9-e81ab57ad40c}\Root\InventoryApplicationFile\f1r6p3j3g7.exe|7456cea247a6cc77
BinaryType
\REGISTRY\A\{e57f2d1e-ffd8-9976-d6a9-e81ab57ad40c}\Root\InventoryApplicationFile\f1r6p3j3g7.exe|7456cea247a6cc77
ProductName
\REGISTRY\A\{e57f2d1e-ffd8-9976-d6a9-e81ab57ad40c}\Root\InventoryApplicationFile\f1r6p3j3g7.exe|7456cea247a6cc77
ProductVersion
\REGISTRY\A\{e57f2d1e-ffd8-9976-d6a9-e81ab57ad40c}\Root\InventoryApplicationFile\f1r6p3j3g7.exe|7456cea247a6cc77
LinkDate
\REGISTRY\A\{e57f2d1e-ffd8-9976-d6a9-e81ab57ad40c}\Root\InventoryApplicationFile\f1r6p3j3g7.exe|7456cea247a6cc77
BinProductVersion
\REGISTRY\A\{e57f2d1e-ffd8-9976-d6a9-e81ab57ad40c}\Root\InventoryApplicationFile\f1r6p3j3g7.exe|7456cea247a6cc77
AppxPackageFullName
\REGISTRY\A\{e57f2d1e-ffd8-9976-d6a9-e81ab57ad40c}\Root\InventoryApplicationFile\f1r6p3j3g7.exe|7456cea247a6cc77
AppxPackageRelativeId
\REGISTRY\A\{e57f2d1e-ffd8-9976-d6a9-e81ab57ad40c}\Root\InventoryApplicationFile\f1r6p3j3g7.exe|7456cea247a6cc77
Size
\REGISTRY\A\{e57f2d1e-ffd8-9976-d6a9-e81ab57ad40c}\Root\InventoryApplicationFile\f1r6p3j3g7.exe|7456cea247a6cc77
Language
\REGISTRY\A\{e57f2d1e-ffd8-9976-d6a9-e81ab57ad40c}\Root\InventoryApplicationFile\f1r6p3j3g7.exe|7456cea247a6cc77
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\kegidhjkkj.exe|49dc5f0369991e24
ProgramId
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\kegidhjkkj.exe|49dc5f0369991e24
FileId
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\kegidhjkkj.exe|49dc5f0369991e24
LowerCaseLongPath
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\kegidhjkkj.exe|49dc5f0369991e24
LongPathHash
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\kegidhjkkj.exe|49dc5f0369991e24
Name
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\kegidhjkkj.exe|49dc5f0369991e24
OriginalFileName
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\kegidhjkkj.exe|49dc5f0369991e24
Publisher
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\kegidhjkkj.exe|49dc5f0369991e24
Version
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\kegidhjkkj.exe|49dc5f0369991e24
BinFileVersion
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\kegidhjkkj.exe|49dc5f0369991e24
BinaryType
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\kegidhjkkj.exe|49dc5f0369991e24
ProductName
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\kegidhjkkj.exe|49dc5f0369991e24
ProductVersion
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\kegidhjkkj.exe|49dc5f0369991e24
LinkDate
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\kegidhjkkj.exe|49dc5f0369991e24
BinProductVersion
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\kegidhjkkj.exe|49dc5f0369991e24
AppxPackageFullName
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\kegidhjkkj.exe|49dc5f0369991e24
AppxPackageRelativeId
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\kegidhjkkj.exe|49dc5f0369991e24
Size
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\kegidhjkkj.exe|49dc5f0369991e24
Language
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\kegidhjkkj.exe|49dc5f0369991e24
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00180011DFCF3602
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProgramId
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
FileId
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LowerCaseLongPath
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LongPathHash
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Name
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
OriginalFileName
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Publisher
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Version
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinFileVersion
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinaryType
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductName
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductVersion
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LinkDate
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinProductVersion
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageFullName
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageRelativeId
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Size
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Language
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
IsOsComponent
\REGISTRY\A\{2cb6c6bd-873c-ea83-406b-fa9ceb6a6f31}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Usn
There are 54 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
D2D000
unkown
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
91D000
unkown
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
91D000
unkown
page write copy
4792B000
stack
page read and write
2EBD000
stack
page read and write
CDE000
heap
page read and write
1740B000
heap
page read and write
1D5B6000
direct allocation
page execute read
1130000
heap
page read and write
34FF000
stack
page read and write
1CC000
stack
page read and write
2B2D000
stack
page read and write
14C1F000
stack
page read and write
111E000
stack
page read and write
8F1000
unkown
page execute read
700000
heap
page read and write
2F90000
heap
page read and write
43C000
stack
page read and write
8F0000
unkown
page readonly
1725B000
stack
page read and write
2C2D000
stack
page read and write
FA8000
heap
page read and write
6CE25000
unkown
page readonly
FE0000
heap
page read and write
4D2000
remote allocation
page execute and read and write
1D69A000
direct allocation
page readonly
2C6D000
stack
page read and write
4A7000
heap
page read and write
FECE000
stack
page read and write
14C7B000
stack
page read and write
F88000
heap
page read and write
45E000
remote allocation
page execute and read and write
4B3000
remote allocation
page execute and read and write
1D65D000
direct allocation
page execute read
132F000
stack
page read and write
480000
heap
page read and write
D00000
unkown
page readonly
2FB0000
heap
page read and write
33FE000
stack
page read and write
B40000
heap
page read and write
173CB000
heap
page read and write
359F7000
heap
page read and write
14B1E000
stack
page read and write
11F7000
heap
page read and write
1D668000
direct allocation
page readonly
7F0000
heap
page read and write
2F2D000
stack
page read and write
95F000
stack
page read and write
7DBF000
stack
page read and write
D86000
unkown
page read and write
6CE1E000
unkown
page read and write
D88000
unkown
page readonly
1153000
heap
page read and write
6CC1D000
unkown
page readonly
587E000
stack
page read and write
980000
unkown
page readonly
1193000
heap
page read and write
6FD000
stack
page read and write
11D0000
heap
page read and write
D23000
unkown
page readonly
173BA000
heap
page read and write
A2A000
heap
page read and write
8F1000
unkown
page execute read
850000
heap
page read and write
6CE20000
unkown
page read and write
47A2C000
stack
page read and write
E77000
heap
page read and write
3B966000
heap
page read and write
1764E000
heap
page read and write
17360000
heap
page read and write
1270000
heap
page read and write
C00000
heap
page read and write
174E9000
heap
page read and write
6CC2E000
unkown
page read and write
1186000
heap
page read and write
CA0000
heap
page read and write
1D458000
direct allocation
page execute read
EC5000
heap
page read and write
1D451000
direct allocation
page execute read
D01000
unkown
page execute read
E7B000
stack
page read and write
12EA000
heap
page read and write
9A90000
unclassified section
page read and write
1D69D000
direct allocation
page readonly
D2D000
unkown
page write copy
F68000
heap
page read and write
364F000
stack
page read and write
97D000
unkown
page execute and read and write
6AE000
stack
page read and write
78C000
stack
page read and write
6CBA1000
unkown
page execute read
93E000
stack
page read and write
F96000
heap
page read and write
1DA3B000
stack
page read and write
494000
remote allocation
page execute and read and write
1000E000
stack
page read and write
ECF000
heap
page read and write
47C6D000
stack
page read and write
E65000
heap
page read and write
F7B000
stack
page read and write
6CC41000
unkown
page execute read
171BD000
stack
page read and write
7E0000
heap
page read and write
1D69F000
direct allocation
page readonly
17413000
heap
page read and write
6CC32000
unkown
page readonly
125E000
stack
page read and write
D01000
unkown
page execute read
AFD000
stack
page read and write
1000000
heap
page read and write
176F5000
heap
page read and write
56B000
remote allocation
page execute and read and write
48F000
remote allocation
page execute and read and write
2F8E000
stack
page read and write
6CDDF000
unkown
page readonly
1D65F000
direct allocation
page readonly
115F000
heap
page read and write
D88000
unkown
page readonly
D00000
unkown
page readonly
C8D000
stack
page read and write
FA1000
heap
page read and write
29B1F000
heap
page read and write
913000
unkown
page readonly
17480000
heap
page read and write
16AF000
stack
page read and write
1D692000
direct allocation
page read and write
1173000
heap
page read and write
1735A000
stack
page read and write
12F7000
heap
page read and write
6CE1F000
unkown
page write copy
1D450000
direct allocation
page execute and read and write
1258D000
stack
page read and write
F9F000
heap
page read and write
1005000
heap
page read and write
11C0000
heap
page read and write
15AF000
stack
page read and write
463000
remote allocation
page execute and read and write
470000
heap
page read and write
1254D000
stack
page read and write
8F0000
unkown
page readonly
99E000
stack
page read and write
FFCF000
stack
page read and write
CD0000
heap
page read and write
CD7000
heap
page read and write
23BAE000
heap
page read and write
4A0000
heap
page read and write
E49000
heap
page read and write
FF0000
heap
page read and write
6EF000
stack
page read and write
AF9000
stack
page read and write
E98000
heap
page read and write
913000
unkown
page readonly
174D0000
heap
page read and write
670000
remote allocation
page execute and read and write
467000
remote allocation
page execute and read and write
174F0000
heap
page read and write
1196000
heap
page read and write
1045000
heap
page read and write
6CBA0000
unkown
page readonly
D23000
unkown
page readonly
17493000
heap
page read and write
AF2000
stack
page read and write
11FD000
heap
page read and write
121E000
stack
page read and write
A2E000
heap
page read and write
CF3000
heap
page read and write
82E000
stack
page read and write
17630000
heap
page read and write
14ACD000
stack
page read and write
6CC40000
unkown
page readonly
1741A000
heap
page read and write
116D000
stack
page read and write
2FA8B000
heap
page read and write
12E0000
heap
page read and write
12EE000
heap
page read and write
C1F000
stack
page read and write
106C000
stack
page read and write
176F7000
heap
page read and write
2AD0000
heap
page read and write
490000
heap
page read and write
114C000
heap
page read and write
1137000
heap
page read and write
BD0000
heap
page read and write
F9A000
heap
page read and write
173A0000
heap
page read and write
97F000
unkown
page read and write
2DBF000
stack
page read and write
2CBE000
stack
page read and write
656000
remote allocation
page execute and read and write
354E000
stack
page read and write
AED000
stack
page read and write
46B000
remote allocation
page execute and read and write
E08000
heap
page read and write
1DC31000
heap
page read and write
CE0000
heap
page read and write
C4E000
stack
page read and write
11FF000
heap
page read and write
173A9000
heap
page read and write
3AD000
stack
page read and write
980000
unkown
page readonly
A20000
heap
page read and write
97F000
stack
page read and write
1D6B8000
heap
page read and write
D85000
unkown
page execute and read and write
E00000
heap
page read and write
There are 197 hidden memdumps, click here to show them.