IOC Report
T2bmenoX1o.exe

loading gif

Files

File Path
Type
Category
Malicious
T2bmenoX1o.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\AAFIIJDAAA.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_AAFIIJDAAA.exe_df0fc59aeb11a2d1a621d6ed74a333b6643f_1a6f07aa_35386c88-4b07-4fea-b8d4-947107ccb7cb\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_T2bmenoX1o.exe_3b99501f55e643d06cea436478a9b13db631_f91b178e_3d2f18a9-e078-4fae-afe5-3b8435592b9a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\a43486128347[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\sql[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\KJKFBAFIDAEB\AKJDGD
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KJKFBAFIDAEB\CAAKKF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KJKFBAFIDAEB\CGIDGC
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\KJKFBAFIDAEB\EGIDAA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KJKFBAFIDAEB\GHJEGC
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KJKFBAFIDAEB\GHJEGC-shm
data
dropped
C:\ProgramData\KJKFBAFIDAEB\HDAKJD
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KJKFBAFIDAEB\HDAKJD-shm
data
dropped
C:\ProgramData\KJKFBAFIDAEB\HJEHIJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KJKFBAFIDAEB\IJKJDA
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\KJKFBAFIDAEB\JJJJDA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KJKFBAFIDAEB\KJDGDB
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDE3.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 00:44:55 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDE91.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 00:45:48 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDEC1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDEF1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE51.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE81.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
Non-ISO extended-ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 28 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\T2bmenoX1o.exe
"C:\Users\user\Desktop\T2bmenoX1o.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\ProgramData\AAFIIJDAAA.exe
"C:\ProgramData\AAFIIJDAAA.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7284 -s 272
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7968 -s 248
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\KJKFBAFIDAEB" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10

URLs

Name
IP
Malicious
frizzettei.sbs
malicious
http://cowod.hopto.org
unknown
malicious
http://cowod.hopto.org_DEBUG.zip/c
unknown
malicious
http://kasm.zubairgul.com/vcruntime140.dll
95.164.90.97
malicious
http://kasm.zubairgul.com/softokn3.dll
95.164.90.97
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
invinjurhey.sbs
malicious
exilepolsiy.sbs
malicious
bemuzzeki.sbs
malicious
http://kasm.zubairgul.com/msvcp140.dll
95.164.90.97
malicious
exemplarou.sbs
malicious
http://kasm.zubairgul.com/mozglue.dll
95.164.90.97
malicious
wickedneatr.sbs
malicious
http://cowod.hopto.orgAEB
unknown
malicious
https://t.me/
unknown
malicious
http://kasm.zubairgul.com/freebl3.dll
95.164.90.97
malicious
laddyirekyi.sbs
malicious
http://kasm.zubairgul.com/nss3.dll
95.164.90.97
malicious
isoplethui.sbs
malicious
http://kasm.zubairgul.com/
95.164.90.97
malicious
http://kasm.zubairgul.com/sql.dll
95.164.90.97
malicious
http://cowod.hopto.org/
45.132.206.251
malicious
https://t.me/maslengdsa
149.154.167.99
malicious
https://steamcommunity.com
unknown
malicious
https://steamcommunity.com/profiles/76561199786602107
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://player.vimeo.com
unknown
https://duckduckgo.com/ac/?q=
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://www.youtube.com
unknown
http://nsdm.cumpar-auto-orice-tip.ro/ldms/a43486128347.exe
147.45.44.104
https://www.google.com
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
http://kasm.zubairgul.com:80/sql.dll
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://cowod.hopto.
unknown
https://t.me/lpnjokeg0b4cMozilla/5.0
unknown
http://cowod.hopto
unknown
https://s.ytimg.com;
unknown
https://steam.tv/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://kasm.zubairgul.com:80
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://t.me/lpnjoke
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://kasm.zubairgul.com:80ontent-Disposition:
unknown
https://sketchfab.com
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
http://kasm.zubairgul.com/J
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
http://cowod.multipart/form-data;
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://store.steampowered.com/;
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=cdfm
unknown
http://cowod.hopto.HIDAEB
unknown
https://web.telegram.org
unknown
http://nsdm.cumpar-auto-orice-tip.ro/ldms/a43486128347.exeq
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.akamai.steamstatic.com/
unknown
https://steamcommunity.com/profiles/76561199786602107g0b4cMozilla/5.0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://recaptcha.net/recaptcha/;
unknown
http://kasm.zubairgul.com/msvcp140.dll~$M
unknown
http://nsdm.cumpar-auto-orice-tip.ro/ldms/a43486128347.exe1kkkk
unknown
https://steamcommunity.com/C(l2
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
http://www.sqlite.org/copyright.html.
unknown
http://kasm.zubairgul.com/mozglue.dllP$W
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://recaptcha.net
unknown
http://kasm.zubairgul.com/vcruntime140.dllK
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ost.exe
unknown
http://127.0.0.1:27060
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2R
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
cowod.hopto.org
45.132.206.251
malicious
t.me
149.154.167.99
malicious
kasm.zubairgul.com
95.164.90.97
malicious
frizzettei.sbs
unknown
malicious
bemuzzeki.sbs
unknown
malicious
invinjurhey.sbs
unknown
malicious
exilepolsiy.sbs
unknown
malicious
exemplarou.sbs
unknown
malicious
laddyirekyi.sbs
unknown
malicious
wickedneatr.sbs
unknown
malicious
isoplethui.sbs
unknown
malicious
bg.microsoft.map.fastly.net
199.232.210.172
nsdm.cumpar-auto-orice-tip.ro
147.45.44.104
s-part-0017.t-0009.t-msedge.net
13.107.246.45
fp2e7a.wpc.phicdn.net
192.229.221.95
There are 6 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
95.164.90.97
kasm.zubairgul.com
Gibraltar
malicious
149.154.167.99
t.me
United Kingdom
malicious
45.132.206.251
cowod.hopto.org
Russian Federation
malicious
147.45.44.104
nsdm.cumpar-auto-orice-tip.ro
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
\REGISTRY\A\{5e782659-ded3-a0a6-aa47-0d98b6caf990}\Root\InventoryApplicationFile\t2bmenox1o.exe|5bd9f7df7b25c481
ProgramId
\REGISTRY\A\{5e782659-ded3-a0a6-aa47-0d98b6caf990}\Root\InventoryApplicationFile\t2bmenox1o.exe|5bd9f7df7b25c481
FileId
\REGISTRY\A\{5e782659-ded3-a0a6-aa47-0d98b6caf990}\Root\InventoryApplicationFile\t2bmenox1o.exe|5bd9f7df7b25c481
LowerCaseLongPath
\REGISTRY\A\{5e782659-ded3-a0a6-aa47-0d98b6caf990}\Root\InventoryApplicationFile\t2bmenox1o.exe|5bd9f7df7b25c481
LongPathHash
\REGISTRY\A\{5e782659-ded3-a0a6-aa47-0d98b6caf990}\Root\InventoryApplicationFile\t2bmenox1o.exe|5bd9f7df7b25c481
Name
\REGISTRY\A\{5e782659-ded3-a0a6-aa47-0d98b6caf990}\Root\InventoryApplicationFile\t2bmenox1o.exe|5bd9f7df7b25c481
OriginalFileName
\REGISTRY\A\{5e782659-ded3-a0a6-aa47-0d98b6caf990}\Root\InventoryApplicationFile\t2bmenox1o.exe|5bd9f7df7b25c481
Publisher
\REGISTRY\A\{5e782659-ded3-a0a6-aa47-0d98b6caf990}\Root\InventoryApplicationFile\t2bmenox1o.exe|5bd9f7df7b25c481
Version
\REGISTRY\A\{5e782659-ded3-a0a6-aa47-0d98b6caf990}\Root\InventoryApplicationFile\t2bmenox1o.exe|5bd9f7df7b25c481
BinFileVersion
\REGISTRY\A\{5e782659-ded3-a0a6-aa47-0d98b6caf990}\Root\InventoryApplicationFile\t2bmenox1o.exe|5bd9f7df7b25c481
BinaryType
\REGISTRY\A\{5e782659-ded3-a0a6-aa47-0d98b6caf990}\Root\InventoryApplicationFile\t2bmenox1o.exe|5bd9f7df7b25c481
ProductName
\REGISTRY\A\{5e782659-ded3-a0a6-aa47-0d98b6caf990}\Root\InventoryApplicationFile\t2bmenox1o.exe|5bd9f7df7b25c481
ProductVersion
\REGISTRY\A\{5e782659-ded3-a0a6-aa47-0d98b6caf990}\Root\InventoryApplicationFile\t2bmenox1o.exe|5bd9f7df7b25c481
LinkDate
\REGISTRY\A\{5e782659-ded3-a0a6-aa47-0d98b6caf990}\Root\InventoryApplicationFile\t2bmenox1o.exe|5bd9f7df7b25c481
BinProductVersion
\REGISTRY\A\{5e782659-ded3-a0a6-aa47-0d98b6caf990}\Root\InventoryApplicationFile\t2bmenox1o.exe|5bd9f7df7b25c481
AppxPackageFullName
\REGISTRY\A\{5e782659-ded3-a0a6-aa47-0d98b6caf990}\Root\InventoryApplicationFile\t2bmenox1o.exe|5bd9f7df7b25c481
AppxPackageRelativeId
\REGISTRY\A\{5e782659-ded3-a0a6-aa47-0d98b6caf990}\Root\InventoryApplicationFile\t2bmenox1o.exe|5bd9f7df7b25c481
Size
\REGISTRY\A\{5e782659-ded3-a0a6-aa47-0d98b6caf990}\Root\InventoryApplicationFile\t2bmenox1o.exe|5bd9f7df7b25c481
Language
\REGISTRY\A\{5e782659-ded3-a0a6-aa47-0d98b6caf990}\Root\InventoryApplicationFile\t2bmenox1o.exe|5bd9f7df7b25c481
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{82ed75cd-8c6b-5d5f-c289-e387efc85ca6}\Root\InventoryApplicationFile\aafiijdaaa.exe|4cdaa92733cac14f
ProgramId
\REGISTRY\A\{82ed75cd-8c6b-5d5f-c289-e387efc85ca6}\Root\InventoryApplicationFile\aafiijdaaa.exe|4cdaa92733cac14f
FileId
\REGISTRY\A\{82ed75cd-8c6b-5d5f-c289-e387efc85ca6}\Root\InventoryApplicationFile\aafiijdaaa.exe|4cdaa92733cac14f
LowerCaseLongPath
\REGISTRY\A\{82ed75cd-8c6b-5d5f-c289-e387efc85ca6}\Root\InventoryApplicationFile\aafiijdaaa.exe|4cdaa92733cac14f
LongPathHash
\REGISTRY\A\{82ed75cd-8c6b-5d5f-c289-e387efc85ca6}\Root\InventoryApplicationFile\aafiijdaaa.exe|4cdaa92733cac14f
Name
\REGISTRY\A\{82ed75cd-8c6b-5d5f-c289-e387efc85ca6}\Root\InventoryApplicationFile\aafiijdaaa.exe|4cdaa92733cac14f
OriginalFileName
\REGISTRY\A\{82ed75cd-8c6b-5d5f-c289-e387efc85ca6}\Root\InventoryApplicationFile\aafiijdaaa.exe|4cdaa92733cac14f
Publisher
\REGISTRY\A\{82ed75cd-8c6b-5d5f-c289-e387efc85ca6}\Root\InventoryApplicationFile\aafiijdaaa.exe|4cdaa92733cac14f
Version
\REGISTRY\A\{82ed75cd-8c6b-5d5f-c289-e387efc85ca6}\Root\InventoryApplicationFile\aafiijdaaa.exe|4cdaa92733cac14f
BinFileVersion
\REGISTRY\A\{82ed75cd-8c6b-5d5f-c289-e387efc85ca6}\Root\InventoryApplicationFile\aafiijdaaa.exe|4cdaa92733cac14f
BinaryType
\REGISTRY\A\{82ed75cd-8c6b-5d5f-c289-e387efc85ca6}\Root\InventoryApplicationFile\aafiijdaaa.exe|4cdaa92733cac14f
ProductName
\REGISTRY\A\{82ed75cd-8c6b-5d5f-c289-e387efc85ca6}\Root\InventoryApplicationFile\aafiijdaaa.exe|4cdaa92733cac14f
ProductVersion
\REGISTRY\A\{82ed75cd-8c6b-5d5f-c289-e387efc85ca6}\Root\InventoryApplicationFile\aafiijdaaa.exe|4cdaa92733cac14f
LinkDate
\REGISTRY\A\{82ed75cd-8c6b-5d5f-c289-e387efc85ca6}\Root\InventoryApplicationFile\aafiijdaaa.exe|4cdaa92733cac14f
BinProductVersion
\REGISTRY\A\{82ed75cd-8c6b-5d5f-c289-e387efc85ca6}\Root\InventoryApplicationFile\aafiijdaaa.exe|4cdaa92733cac14f
AppxPackageFullName
\REGISTRY\A\{82ed75cd-8c6b-5d5f-c289-e387efc85ca6}\Root\InventoryApplicationFile\aafiijdaaa.exe|4cdaa92733cac14f
AppxPackageRelativeId
\REGISTRY\A\{82ed75cd-8c6b-5d5f-c289-e387efc85ca6}\Root\InventoryApplicationFile\aafiijdaaa.exe|4cdaa92733cac14f
Size
\REGISTRY\A\{82ed75cd-8c6b-5d5f-c289-e387efc85ca6}\Root\InventoryApplicationFile\aafiijdaaa.exe|4cdaa92733cac14f
Language
\REGISTRY\A\{82ed75cd-8c6b-5d5f-c289-e387efc85ca6}\Root\InventoryApplicationFile\aafiijdaaa.exe|4cdaa92733cac14f
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00180011E0C8F06B
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 34 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1DD000
unkown
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
DDD000
unkown
page read and write
malicious
2800000
heap
page read and write
20578000
heap
page read and write
2026C000
heap
page read and write
20218000
direct allocation
page readonly
117E000
stack
page read and write
20001000
direct allocation
page execute read
CAA000
heap
page read and write
5C6D000
stack
page read and write
1B1000
unkown
page execute read
8247000
heap
page read and write
CAE000
heap
page read and write
6CBE2000
unkown
page readonly
1020000
heap
page read and write
4C5000
remote allocation
page execute and read and write
19E5C000
heap
page read and write
ABE000
stack
page read and write
19E7D000
heap
page read and write
E20000
heap
page read and write
13F6000
heap
page read and write
CA0000
heap
page read and write
20242000
direct allocation
page read and write
1DD000
unkown
page write copy
DDD000
unkown
page write copy
12A9D000
stack
page read and write
F4F000
stack
page read and write
1D3000
unkown
page readonly
5C2E000
stack
page read and write
284D000
stack
page read and write
5E0000
heap
page read and write
6CB50000
unkown
page readonly
19E50000
heap
page read and write
2DEE000
stack
page read and write
11FA000
heap
page read and write
6CDCE000
unkown
page read and write
94E000
stack
page read and write
2020F000
direct allocation
page readonly
AE8000
heap
page read and write
1060000
heap
page read and write
9A0000
heap
page read and write
5DE000
stack
page read and write
125F000
stack
page read and write
19ECC000
heap
page read and write
238000
unkown
page readonly
65D000
remote allocation
page execute and read and write
152F000
stack
page read and write
4674E000
stack
page read and write
1501C000
stack
page read and write
133A000
heap
page read and write
98E000
stack
page read and write
27ED000
stack
page read and write
6CDD5000
unkown
page readonly
B48000
heap
page read and write
4C7AB000
stack
page read and write
4E4000
remote allocation
page execute and read and write
2024F000
direct allocation
page readonly
1A090000
heap
page read and write
151DB000
stack
page read and write
90E000
stack
page read and write
1D3000
unkown
page readonly
6CDD0000
unkown
page read and write
6CBF1000
unkown
page execute read
FD0000
heap
page read and write
2020D000
direct allocation
page execute read
A50000
heap
page read and write
F7D000
stack
page read and write
1180000
heap
page read and write
7DD000
stack
page read and write
1B0000
unkown
page readonly
B0D000
heap
page read and write
264E2000
heap
page read and write
19CEF000
stack
page read and write
20166000
direct allocation
page execute read
19E6D000
heap
page read and write
CB7000
heap
page read and write
B46000
heap
page read and write
ACE000
stack
page read and write
E40000
unkown
page readonly
DD3000
unkown
page readonly
9F20000
heap
page read and write
DEE000
stack
page read and write
19E52000
heap
page read and write
19EBD000
heap
page read and write
1A0A0000
heap
page read and write
DAF000
stack
page read and write
238000
unkown
page readonly
236000
unkown
page read and write
1517F000
stack
page read and write
1B0000
unkown
page readonly
6CB51000
unkown
page execute read
DB0000
unkown
page readonly
11E5000
heap
page read and write
81C0000
heap
page read and write
1055D000
stack
page read and write
E3D000
unkown
page execute and read and write
2CED000
stack
page read and write
20008000
direct allocation
page execute read
B4C000
heap
page read and write
45E000
remote allocation
page execute and read and write
B51000
heap
page read and write
AFC000
heap
page read and write
A55000
heap
page read and write
19D4B000
stack
page read and write
EEE000
stack
page read and write
19FFE000
stack
page read and write
A8E000
stack
page read and write
133E000
heap
page read and write
B25000
heap
page read and write
4CA9C000
stack
page read and write
B1A000
heap
page read and write
DD3000
unkown
page readonly
1051F000
stack
page read and write
AD0000
heap
page read and write
81AE000
stack
page read and write
1373000
heap
page read and write
12ADD000
stack
page read and write
E40000
unkown
page readonly
A40000
heap
page read and write
1771D000
stack
page read and write
1216000
heap
page read and write
2690000
heap
page read and write
11B0000
heap
page read and write
294D000
stack
page read and write
DDE000
stack
page read and write
6CD8F000
unkown
page readonly
B4A000
heap
page read and write
1507E000
stack
page read and write
DB1000
unkown
page execute read
38339000
heap
page read and write
503000
remote allocation
page execute and read and write
AE0000
heap
page read and write
52C000
stack
page read and write
4EC000
stack
page read and write
104F000
stack
page read and write
1330000
heap
page read and write
2E5E000
stack
page read and write
1A2AE000
heap
page read and write
670000
remote allocation
page execute and read and write
B70000
heap
page read and write
3E2AE000
heap
page read and write
E3F000
unkown
page read and write
113E000
stack
page read and write
4CCDD000
stack
page read and write
7FC000
stack
page read and write
1A205000
heap
page read and write
821E000
stack
page read and write
1B1000
unkown
page execute read
137A000
heap
page read and write
19F50000
heap
page read and write
20000000
direct allocation
page execute and read and write
1A0A7000
heap
page read and write
10B0000
heap
page read and write
6DD000
stack
page read and write
1423000
heap
page read and write
19E4A000
stack
page read and write
A020000
unclassified section
page read and write
9F30000
heap
page read and write
6CBCD000
unkown
page readonly
11B8000
heap
page read and write
6CBF0000
unkown
page readonly
A30000
heap
page read and write
6FC000
stack
page read and write
19EC3000
heap
page read and write
235000
unkown
page execute and read and write
59C000
remote allocation
page execute and read and write
26ED000
stack
page read and write
DB1000
unkown
page execute read
CEC000
stack
page read and write
E7D000
stack
page read and write
AC0000
heap
page read and write
6CDCF000
unkown
page write copy
1150000
heap
page read and write
481000
remote allocation
page execute and read and write
DDC000
stack
page read and write
2C45F000
heap
page read and write
2024A000
direct allocation
page readonly
323C1000
heap
page read and write
1A2AC000
heap
page read and write
19EC8000
heap
page read and write
B35000
heap
page read and write
19EC5000
heap
page read and write
A70000
heap
page read and write
B22000
heap
page read and write
19F31000
heap
page read and write
2024D000
direct allocation
page readonly
10FE000
stack
page read and write
B78000
heap
page read and write
1A1E7000
heap
page read and write
19F44000
heap
page read and write
DEC000
stack
page read and write
8240000
heap
page read and write
4C0000
remote allocation
page execute and read and write
4C99B000
stack
page read and write
590000
heap
page read and write
177AE000
stack
page read and write
DB0000
unkown
page readonly
6CBDE000
unkown
page read and write
2F5F000
stack
page read and write
There are 191 hidden memdumps, click here to show them.