IOC Report
VmRHSCaiyc.exe

loading gif

Files

File Path
Type
Category
Malicious
VmRHSCaiyc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\HCFIIIJJKJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_HCFIIIJJKJ.exe_f8dfa5a719fed910ad33ae7cc23e922599ff1f20_ada4b898_413a2da4-0e1b-4907-bd30-06134651640e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_VmRHSCaiyc.exe_8fc1908717c28f1c650eb89c468b956b22f36f_31dae590_67c9ef2a-baa0-437a-846d-22cc109bc30d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\a43486128347[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\sql[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\KKEHIEBKJKFI\BKEBFH
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\KKEHIEBKJKFI\BKJEGD
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KKEHIEBKJKFI\BKJEGD-shm
data
dropped
C:\ProgramData\KKEHIEBKJKFI\CFHIIE
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\ProgramData\KKEHIEBKJKFI\CGIDGC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\KKEHIEBKJKFI\DGIJEG
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\ProgramData\KKEHIEBKJKFI\ECGIII
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KKEHIEBKJKFI\GIIEGH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KKEHIEBKJKFI\HCBAKJ
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KKEHIEBKJKFI\HCBAKJ-shm
data
dropped
C:\ProgramData\KKEHIEBKJKFI\IEHCBA
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4127.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 02:24:08 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER41C4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4204.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF8EE.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 04:19:56 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF9C9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF9F9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\VmRHSCaiyc.exe
"C:\Users\user\Desktop\VmRHSCaiyc.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\ProgramData\HCFIIIJJKJ.exe
"C:\ProgramData\HCFIIIJJKJ.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 260
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7732 -s 272
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\KKEHIEBKJKFI" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10

URLs

Name
IP
Malicious
frizzettei.sbs
malicious
https://t.me/
unknown
malicious
http://kasm.zubairgul.com/freebl3.dll
95.164.90.97
malicious
http://cowod.hopto.org
unknown
malicious
laddyirekyi.sbs
malicious
http://kasm.zubairgul.com/nss3.dll
95.164.90.97
malicious
isoplethui.sbs
malicious
http://cowod.hopto.org_DEBUG.zip/c
unknown
malicious
http://kasm.zubairgul.com/
95.164.90.97
malicious
http://kasm.zubairgul.com/sql.dll
95.164.90.97
malicious
http://kasm.zubairgul.com/vcruntime140.dll
95.164.90.97
malicious
http://kasm.zubairgul.com/softokn3.dll
95.164.90.97
malicious
https://steamcommunity.com/profiles/76561199724331900
23.197.127.21
malicious
invinjurhey.sbs
malicious
http://cowod.hopto.org/
45.132.206.251
malicious
exilepolsiy.sbs
malicious
https://t.me/maslengdsa
149.154.167.99
malicious
http://cowod.hopto.orgEBA
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
https://steamcommunity.com/profiles/76561199786602107
malicious
bemuzzeki.sbs
malicious
http://kasm.zubairgul.com/msvcp140.dll
95.164.90.97
malicious
exemplarou.sbs
malicious
http://kasm.zubairgul.com/mozglue.dll
95.164.90.97
malicious
wickedneatr.sbs
malicious
https://sergei-esenin.com/api
104.21.53.8
malicious
https://steamcommunity.com/
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900/badges
unknown
malicious
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=cdfm
unknown
https://duckduckgo.com/ac/?q=
unknown
http://cowod.hoptoECAKFBG
unknown
https://web.telegram.org
unknown
https://sergei-esenin.com/
unknown
https://steamcommunity.com/profiles/76561199786602107g0b4cMozilla/5.0
unknown
https://help.steampowe
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://t.me/maslengdsax
unknown
http://nsdm.cumpar-auto-orice-tip.ro/ldms/a43486128347.exe1kkkk
unknown
http://nsdm.cumpar-auto-orice-tip.ro/ldms/a43486128347.exe
147.45.44.104
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
http://kasm.zubairgul.com:80/sql.dll
unknown
http://cowod.hopto.
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://t.me/lpnjokeg0b4cMozilla/5.0
unknown
http://cowod.hopto
unknown
http://kasm.zubairgul.com/msvcp140.dll2
unknown
http://kasm.zubairgul.com/vcruntime140.dlle
unknown
https://store.steampowered.com/legal/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
http://www.sqlite.org/copyright.html.
unknown
http://kasm.zubairgul.com:80
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://store.steampowered.com/privacy_agreement/
unknown
http://kasm.zubairgul.com/msvcp140.dll9
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://t.me/lpnjoke
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://kasm.zubairgul.com/Z
unknown
http://upx.sf.net
unknown
http://kasm.zubairgul.com:80ontent-Disposition:
unknown
https://www.ecosia.org/newtab/
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
http://kasm.zubairgul.com/freebl3.dll7
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://sergei-esenin.com:443/api
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2R
unknown
https://t.me/maslengdsafdmskfj3efskoahttps://steamcommunity.com/profiles/76561199786602107g0b4cMozil
unknown
http://cowod.hopto.ECAEBA
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
http://cowod.multipart/form-data;
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://support.mozilla.org
unknown
http://kasm.zubairgul.com/nss3.dllVO
unknown
https://sergei-esenin.com/P
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 79 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
23.197.127.21
malicious
cowod.hopto.org
45.132.206.251
malicious
t.me
149.154.167.99
malicious
sergei-esenin.com
104.21.53.8
malicious
kasm.zubairgul.com
95.164.90.97
malicious
frizzettei.sbs
unknown
malicious
bemuzzeki.sbs
unknown
malicious
invinjurhey.sbs
unknown
malicious
exilepolsiy.sbs
unknown
malicious
exemplarou.sbs
unknown
malicious
laddyirekyi.sbs
unknown
malicious
wickedneatr.sbs
unknown
malicious
isoplethui.sbs
unknown
malicious
nsdm.cumpar-auto-orice-tip.ro
147.45.44.104
s-part-0032.t-0009.t-msedge.net
13.107.246.60
time.windows.com
unknown
There are 6 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.53.8
sergei-esenin.com
United States
malicious
23.197.127.21
steamcommunity.com
United States
malicious
95.164.90.97
kasm.zubairgul.com
Gibraltar
malicious
149.154.167.99
t.me
United Kingdom
malicious
45.132.206.251
cowod.hopto.org
Russian Federation
malicious
147.45.44.104
nsdm.cumpar-auto-orice-tip.ro
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
\REGISTRY\A\{075fef3d-0c9b-a8a7-6457-5dd4e1e8db07}\Root\InventoryApplicationFile\vmrhscaiyc.exe|d31d4f07aab1563e
ProgramId
\REGISTRY\A\{075fef3d-0c9b-a8a7-6457-5dd4e1e8db07}\Root\InventoryApplicationFile\vmrhscaiyc.exe|d31d4f07aab1563e
FileId
\REGISTRY\A\{075fef3d-0c9b-a8a7-6457-5dd4e1e8db07}\Root\InventoryApplicationFile\vmrhscaiyc.exe|d31d4f07aab1563e
LowerCaseLongPath
\REGISTRY\A\{075fef3d-0c9b-a8a7-6457-5dd4e1e8db07}\Root\InventoryApplicationFile\vmrhscaiyc.exe|d31d4f07aab1563e
LongPathHash
\REGISTRY\A\{075fef3d-0c9b-a8a7-6457-5dd4e1e8db07}\Root\InventoryApplicationFile\vmrhscaiyc.exe|d31d4f07aab1563e
Name
\REGISTRY\A\{075fef3d-0c9b-a8a7-6457-5dd4e1e8db07}\Root\InventoryApplicationFile\vmrhscaiyc.exe|d31d4f07aab1563e
OriginalFileName
\REGISTRY\A\{075fef3d-0c9b-a8a7-6457-5dd4e1e8db07}\Root\InventoryApplicationFile\vmrhscaiyc.exe|d31d4f07aab1563e
Publisher
\REGISTRY\A\{075fef3d-0c9b-a8a7-6457-5dd4e1e8db07}\Root\InventoryApplicationFile\vmrhscaiyc.exe|d31d4f07aab1563e
Version
\REGISTRY\A\{075fef3d-0c9b-a8a7-6457-5dd4e1e8db07}\Root\InventoryApplicationFile\vmrhscaiyc.exe|d31d4f07aab1563e
BinFileVersion
\REGISTRY\A\{075fef3d-0c9b-a8a7-6457-5dd4e1e8db07}\Root\InventoryApplicationFile\vmrhscaiyc.exe|d31d4f07aab1563e
BinaryType
\REGISTRY\A\{075fef3d-0c9b-a8a7-6457-5dd4e1e8db07}\Root\InventoryApplicationFile\vmrhscaiyc.exe|d31d4f07aab1563e
ProductName
\REGISTRY\A\{075fef3d-0c9b-a8a7-6457-5dd4e1e8db07}\Root\InventoryApplicationFile\vmrhscaiyc.exe|d31d4f07aab1563e
ProductVersion
\REGISTRY\A\{075fef3d-0c9b-a8a7-6457-5dd4e1e8db07}\Root\InventoryApplicationFile\vmrhscaiyc.exe|d31d4f07aab1563e
LinkDate
\REGISTRY\A\{075fef3d-0c9b-a8a7-6457-5dd4e1e8db07}\Root\InventoryApplicationFile\vmrhscaiyc.exe|d31d4f07aab1563e
BinProductVersion
\REGISTRY\A\{075fef3d-0c9b-a8a7-6457-5dd4e1e8db07}\Root\InventoryApplicationFile\vmrhscaiyc.exe|d31d4f07aab1563e
AppxPackageFullName
\REGISTRY\A\{075fef3d-0c9b-a8a7-6457-5dd4e1e8db07}\Root\InventoryApplicationFile\vmrhscaiyc.exe|d31d4f07aab1563e
AppxPackageRelativeId
\REGISTRY\A\{075fef3d-0c9b-a8a7-6457-5dd4e1e8db07}\Root\InventoryApplicationFile\vmrhscaiyc.exe|d31d4f07aab1563e
Size
\REGISTRY\A\{075fef3d-0c9b-a8a7-6457-5dd4e1e8db07}\Root\InventoryApplicationFile\vmrhscaiyc.exe|d31d4f07aab1563e
Language
\REGISTRY\A\{075fef3d-0c9b-a8a7-6457-5dd4e1e8db07}\Root\InventoryApplicationFile\vmrhscaiyc.exe|d31d4f07aab1563e
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{647023ef-be81-ba35-762b-078e431a5984}\Root\InventoryApplicationFile\hcfiiijjkj.exe|b901b0a2bb3d7426
ProgramId
\REGISTRY\A\{647023ef-be81-ba35-762b-078e431a5984}\Root\InventoryApplicationFile\hcfiiijjkj.exe|b901b0a2bb3d7426
FileId
\REGISTRY\A\{647023ef-be81-ba35-762b-078e431a5984}\Root\InventoryApplicationFile\hcfiiijjkj.exe|b901b0a2bb3d7426
LowerCaseLongPath
\REGISTRY\A\{647023ef-be81-ba35-762b-078e431a5984}\Root\InventoryApplicationFile\hcfiiijjkj.exe|b901b0a2bb3d7426
LongPathHash
\REGISTRY\A\{647023ef-be81-ba35-762b-078e431a5984}\Root\InventoryApplicationFile\hcfiiijjkj.exe|b901b0a2bb3d7426
Name
\REGISTRY\A\{647023ef-be81-ba35-762b-078e431a5984}\Root\InventoryApplicationFile\hcfiiijjkj.exe|b901b0a2bb3d7426
OriginalFileName
\REGISTRY\A\{647023ef-be81-ba35-762b-078e431a5984}\Root\InventoryApplicationFile\hcfiiijjkj.exe|b901b0a2bb3d7426
Publisher
\REGISTRY\A\{647023ef-be81-ba35-762b-078e431a5984}\Root\InventoryApplicationFile\hcfiiijjkj.exe|b901b0a2bb3d7426
Version
\REGISTRY\A\{647023ef-be81-ba35-762b-078e431a5984}\Root\InventoryApplicationFile\hcfiiijjkj.exe|b901b0a2bb3d7426
BinFileVersion
\REGISTRY\A\{647023ef-be81-ba35-762b-078e431a5984}\Root\InventoryApplicationFile\hcfiiijjkj.exe|b901b0a2bb3d7426
BinaryType
\REGISTRY\A\{647023ef-be81-ba35-762b-078e431a5984}\Root\InventoryApplicationFile\hcfiiijjkj.exe|b901b0a2bb3d7426
ProductName
\REGISTRY\A\{647023ef-be81-ba35-762b-078e431a5984}\Root\InventoryApplicationFile\hcfiiijjkj.exe|b901b0a2bb3d7426
ProductVersion
\REGISTRY\A\{647023ef-be81-ba35-762b-078e431a5984}\Root\InventoryApplicationFile\hcfiiijjkj.exe|b901b0a2bb3d7426
LinkDate
\REGISTRY\A\{647023ef-be81-ba35-762b-078e431a5984}\Root\InventoryApplicationFile\hcfiiijjkj.exe|b901b0a2bb3d7426
BinProductVersion
\REGISTRY\A\{647023ef-be81-ba35-762b-078e431a5984}\Root\InventoryApplicationFile\hcfiiijjkj.exe|b901b0a2bb3d7426
AppxPackageFullName
\REGISTRY\A\{647023ef-be81-ba35-762b-078e431a5984}\Root\InventoryApplicationFile\hcfiiijjkj.exe|b901b0a2bb3d7426
AppxPackageRelativeId
\REGISTRY\A\{647023ef-be81-ba35-762b-078e431a5984}\Root\InventoryApplicationFile\hcfiiijjkj.exe|b901b0a2bb3d7426
Size
\REGISTRY\A\{647023ef-be81-ba35-762b-078e431a5984}\Root\InventoryApplicationFile\hcfiiijjkj.exe|b901b0a2bb3d7426
Language
\REGISTRY\A\{647023ef-be81-ba35-762b-078e431a5984}\Root\InventoryApplicationFile\hcfiiijjkj.exe|b901b0a2bb3d7426
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00F9AB25C5D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 34 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
37D000
unkown
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2FD000
unkown
page read and write
malicious
7FF0000
heap
page read and write
128EB000
stack
page read and write
3DD000
unkown
page execute and read and write
DA0000
heap
page read and write
EFE000
heap
page read and write
5A6E000
stack
page read and write
30C0000
heap
page read and write
4C9DD000
stack
page read and write
19B8D000
heap
page read and write
4C6EB000
stack
page read and write
7FAE000
stack
page read and write
2F3000
unkown
page readonly
9E70000
unclassified section
page read and write
106F000
heap
page read and write
19B7D000
heap
page read and write
175BE000
stack
page read and write
804E000
stack
page read and write
6D5C0000
unkown
page readonly
2D8C000
stack
page read and write
15AF000
stack
page read and write
E1E000
stack
page read and write
70441000
unkown
page execute read
6D3DF000
unkown
page write copy
14E2D000
stack
page read and write
103B000
heap
page read and write
1058000
heap
page read and write
14AE000
stack
page read and write
11B3000
heap
page read and write
1250000
heap
page read and write
2E8F000
stack
page read and write
2FB0000
heap
page read and write
11BF000
stack
page read and write
481000
remote allocation
page execute and read and write
1FD98000
direct allocation
page execute read
19F6B000
heap
page read and write
1FD91000
direct allocation
page execute read
3E0000
unkown
page readonly
1FFD2000
direct allocation
page read and write
59C000
remote allocation
page execute and read and write
C3D000
stack
page read and write
2D1000
unkown
page execute read
1FF9F000
direct allocation
page readonly
14FED000
stack
page read and write
6D64E000
unkown
page read and write
1104000
heap
page read and write
7045D000
unkown
page read and write
11EC000
heap
page read and write
11E4000
heap
page read and write
1752C000
stack
page read and write
670000
remote allocation
page execute and read and write
19E0E000
stack
page read and write
1260000
heap
page read and write
6D39F000
unkown
page readonly
3090000
heap
page read and write
FF8000
heap
page read and write
1A030000
heap
page read and write
1193000
heap
page read and write
7045F000
unkown
page readonly
19B81000
heap
page read and write
2F5D000
stack
page read and write
D90000
heap
page read and write
19B2C000
heap
page read and write
6D200000
unkown
page readonly
BF2000
stack
page read and write
503000
remote allocation
page execute and read and write
8090000
heap
page read and write
2FD000
unkown
page write copy
19C6B000
stack
page read and write
4C8DC000
stack
page read and write
3000000
heap
page read and write
304E000
stack
page read and write
BED000
stack
page read and write
105E000
heap
page read and write
E6E000
stack
page read and write
8097000
heap
page read and write
E0A000
heap
page read and write
70456000
unkown
page readonly
113E000
heap
page read and write
30BD000
stack
page read and write
19D6A000
stack
page read and write
19B3D000
heap
page read and write
6D201000
unkown
page execute read
D6D000
stack
page read and write
FED000
stack
page read and write
EB0000
heap
page read and write
6D652000
unkown
page readonly
358000
unkown
page readonly
DC0000
heap
page read and write
1FFDF000
direct allocation
page readonly
BF9000
stack
page read and write
351000
unkown
page execute read
139D000
heap
page read and write
1FD90000
direct allocation
page execute and read and write
11E8000
heap
page read and write
6D63D000
unkown
page readonly
1FFF4000
heap
page read and write
E0E000
heap
page read and write
373F000
stack
page read and write
12BF000
stack
page read and write
14F9F000
stack
page read and write
C6C000
stack
page read and write
4E4000
remote allocation
page execute and read and write
351000
unkown
page execute read
19BF1000
heap
page read and write
19C04000
heap
page read and write
2C30A000
heap
page read and write
2D0000
unkown
page readonly
E60000
heap
page read and write
19E2B000
heap
page read and write
6D3E5000
unkown
page readonly
308E000
stack
page read and write
D70000
heap
page read and write
10F7000
heap
page read and write
1FEF6000
direct allocation
page execute read
1036F000
stack
page read and write
1FFDD000
direct allocation
page readonly
2ECE000
stack
page read and write
2F0D000
stack
page read and write
FDC000
stack
page read and write
45E000
remote allocation
page execute and read and write
19AFF000
stack
page read and write
19B1C000
heap
page read and write
DEE000
stack
page read and write
4C5000
remote allocation
page execute and read and write
3E0000
unkown
page readonly
19C10000
heap
page read and write
9D80000
heap
page read and write
2D4C000
stack
page read and write
2D1000
unkown
page execute read
356000
unkown
page read and write
ED0000
heap
page read and write
2F3000
unkown
page readonly
350000
unkown
page readonly
19B12000
heap
page read and write
358000
unkown
page readonly
381EE000
heap
page read and write
37D000
unkown
page write copy
31BE000
stack
page read and write
808D000
stack
page read and write
FF0000
heap
page read and write
1378000
heap
page read and write
2DD0000
heap
page read and write
E20000
heap
page read and write
6D3DE000
unkown
page read and write
1370000
heap
page read and write
19E10000
heap
page read and write
19B85000
heap
page read and write
70440000
unkown
page readonly
128AD000
stack
page read and write
1420000
heap
page read and write
138C000
heap
page read and write
14E9E000
stack
page read and write
32271000
heap
page read and write
110E000
stack
page read and write
19E24000
heap
page read and write
11D3000
heap
page read and write
EFA000
heap
page read and write
32CD000
stack
page read and write
13B2000
heap
page read and write
D3D000
stack
page read and write
4B20000
heap
page read and write
1173000
heap
page read and write
330E000
stack
page read and write
363E000
stack
page read and write
350000
unkown
page readonly
1240000
heap
page read and write
10CE000
heap
page read and write
120F000
stack
page read and write
11F3000
heap
page read and write
4CC1D000
stack
page read and write
355000
unkown
page execute and read and write
DD0000
heap
page read and write
6D5C1000
unkown
page execute read
1FFDA000
direct allocation
page readonly
465FE000
stack
page read and write
373000
unkown
page readonly
1062000
heap
page read and write
EF0000
heap
page read and write
3E153000
heap
page read and write
19F89000
heap
page read and write
3DF000
unkown
page read and write
EAE000
stack
page read and write
E00000
heap
page read and write
1FF9D000
direct allocation
page execute read
65D000
remote allocation
page execute and read and write
13B8000
heap
page read and write
EDC000
stack
page read and write
6D3E0000
unkown
page read and write
26397000
heap
page read and write
30C8000
heap
page read and write
373000
unkown
page readonly
9D70000
heap
page read and write
10CF000
stack
page read and write
2042F000
heap
page read and write
1A032000
heap
page read and write
4C0000
remote allocation
page execute and read and write
BFD000
stack
page read and write
2D8E000
stack
page read and write
AFC000
stack
page read and write
1FFA8000
direct allocation
page readonly
1028000
heap
page read and write
35FD000
stack
page read and write
2D0000
unkown
page readonly
There are 197 hidden memdumps, click here to show them.