IOC Report
SecuriteInfo.com.Trojan.DownLoader47.43477.29852.19410.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.DownLoader47.43477.29852.19410.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\AKEGIIJDGH.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_AKEGIIJDGH.exe_9e9db5a3ba65c0c81446a8288348bdcf886da82_0eee479a_26c218da-459e-4669-98bb-4c75383cb1ab\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\sql[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\a43486128347[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BKFIJJEGHDAE\AECAKE
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\BKFIJJEGHDAE\BGIIDA
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BKFIJJEGHDAE\BGIIDA-shm
data
dropped
C:\ProgramData\BKFIJJEGHDAE\BKFIJJ
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BKFIJJEGHDAE\BKFIJJ-shm
data
dropped
C:\ProgramData\BKFIJJEGHDAE\CFHCGH
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BKFIJJEGHDAE\FHCAEG
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\BKFIJJEGHDAE\GDAAKF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BKFIJJEGHDAE\JDGIID
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BKFIJJEGHDAE\JJDGCG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BKFIJJEGHDAE\KKECBF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\BKFIJJEGHDAE\KKFBAA
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_17777e9afe48e7bc3bc1c728b32fd3ffa03c4_b6772086_59ada311-90aa-4915-8843-6b16766ad845\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9DB1.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 18:47:40 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9E5E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9F39.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE899.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 18:46:54 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE8F8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE938.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 28 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader47.43477.29852.19410.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader47.43477.29852.19410.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\ProgramData\AKEGIIJDGH.exe
"C:\ProgramData\AKEGIIJDGH.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 304
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6008 -s 300
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BKFIJJEGHDAE" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
enlargkiw.sbs
malicious
allocatinow.sbs
malicious
drawwyobstacw.sbs
malicious
mathcucom.sbs
malicious
http://kasm.zubairgul.com/vcruntime140.dll
95.164.90.97
malicious
http://kasm.zubairgul.com/softokn3.dll
95.164.90.97
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://vennurviot.sbs/api
172.67.140.193
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
ehticsprocw.sbs
malicious
http://kasm.zubairgul.com/msvcp140.dll
95.164.90.97
malicious
http://kasm.zubairgul.com/mozglue.dll
95.164.90.97
malicious
condifendteu.sbs
malicious
https://drawwyobstacw.sbs/api
188.114.96.3
malicious
https://t.me/
unknown
malicious
http://kasm.zubairgul.com/freebl3.dll
95.164.90.97
malicious
https://allocatinow.sbs/api
188.114.97.3
malicious
http://kasm.zubairgul.com/nss3.dll
95.164.90.97
malicious
http://kasm.zubairgul.com/
95.164.90.97
malicious
http://kasm.zubairgul.com/sql.dll
95.164.90.97
malicious
https://resinedyw.sbs/api
172.67.205.156
malicious
https://mathcucom.sbs/api
188.114.96.3
malicious
resinedyw.sbs
malicious
https://t.me/maslengdsa
149.154.167.99
malicious
vennurviot.sbs
malicious
https://steamcommunity.com/profiles/76561199786602107
malicious
https://condifendteu.sbs/api
104.21.79.35
malicious
https://enlargkiw.sbs/api
104.21.33.249
malicious
https://sergei-esenin.com/api
172.67.206.204
malicious
https://steamcommunity.com/
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://cowod.hopto.org
unknown
https://drawwyobstacw.sbs/#
unknown
https://sergei-esenin.com/
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
http://nsdm.cumpar-auto-orice-tip.ro/ldms/a43486128347.exe
147.45.44.104
http://cowod.hopto.org_DEBUG.zip/c
unknown
https://sergei-esenin.com/::
unknown
https://sergei-esenin.com/b_
unknown
http://kasm.zubairgul.com:80/sql.dll
unknown
https://drawwyobstacw.sbs/apif
unknown
http://cowod.hopto.
unknown
https://t.me/lpnjokeg0b4cMozilla/5.0
unknown
http://cowod.hopto
unknown
http://kasm.zubairgul.com:80
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
http://www.entrust.net/rpa03
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://t.me/lpnjoke
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://kasm.zubairgul.com:80ontent-Disposition:
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://kasm.zubairgul.com/H
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
http://cowod.multipart/form-data;
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://kasm.zubairgul.com/sql.dllK%
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://www.entrust.net/rpa0
unknown
https://sergei-esenin.com/apia
unknown
https://web.telegram.org
unknown
http://ocsp.entrust.net03
unknown
http://ocsp.entrust.net02
unknown
http://kasm.zubairgul.com/sql.dll1$
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://steamcommunity.com/profiles/76561199786602107g0b4cMozilla/5.0
unknown
http://cowod.hopto.IEBFCG
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
http://nsdm.cumpar-auto-orice-tip.ro/ldms/a43486128347.exe1kkkk
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://cowod.hoptoIECFBFI
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
https://sergei-esenin.com/api9
unknown
https://store.steampowered.com/legal/
unknown
http://www.sqlite.org/copyright.html.
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://cowod.hopto.org/
unknown
http://aia.entrust.net/ts1-chain256.cer01
unknown
https://drawwyobstacw.sbs/api0
unknown
http://upx.sf.net
unknown
http://kasm.zubairgul.com/vcruntime140.dll4k
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://enlargkiw.sbs/apiG
unknown
https://t.me/maslengdsafdmskfj3efskoahttps://steamcommunity.com/profiles/76561199786602107g0b4cMozil
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://kasm.zubairgul.com/mozglue.dllJ
unknown
http://kasm.zubairgul.com/msvcp140.dllW
unknown
http://cowod.hopto.orgFCG
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
t.me
149.154.167.99
malicious
mathcucom.sbs
188.114.96.3
malicious
sergei-esenin.com
172.67.206.204
malicious
resinedyw.sbs
172.67.205.156
malicious
enlargkiw.sbs
104.21.33.249
malicious
condifendteu.sbs
104.21.79.35
malicious
steamcommunity.com
104.102.49.254
malicious
allocatinow.sbs
188.114.97.3
malicious
drawwyobstacw.sbs
188.114.96.3
malicious
vennurviot.sbs
172.67.140.193
malicious
ehticsprocw.sbs
104.21.30.221
malicious
kasm.zubairgul.com
95.164.90.97
malicious
nsdm.cumpar-auto-orice-tip.ro
147.45.44.104
fp2e7a.wpc.phicdn.net
192.229.221.95
bg.microsoft.map.fastly.net
199.232.214.172
s-part-0032.t-0009.t-msedge.net
13.107.246.60
cowod.hopto.org
unknown
There are 7 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
95.164.90.97
kasm.zubairgul.com
Gibraltar
malicious
172.67.140.193
vennurviot.sbs
United States
malicious
149.154.167.99
t.me
United Kingdom
malicious
172.67.206.204
sergei-esenin.com
United States
malicious
188.114.97.3
allocatinow.sbs
European Union
malicious
104.21.33.249
enlargkiw.sbs
United States
malicious
188.114.96.3
mathcucom.sbs
European Union
malicious
104.21.30.221
ehticsprocw.sbs
United States
malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.205.156
resinedyw.sbs
United States
malicious
104.21.79.35
condifendteu.sbs
United States
malicious
147.45.44.104
nsdm.cumpar-auto-orice-tip.ro
Russian Federation
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
\REGISTRY\A\{d743acd5-c579-b277-53e6-d588cff30169}\Root\InventoryApplicationFile\securiteinfo.com|31f30688991d7db9
ProgramId
\REGISTRY\A\{d743acd5-c579-b277-53e6-d588cff30169}\Root\InventoryApplicationFile\securiteinfo.com|31f30688991d7db9
FileId
\REGISTRY\A\{d743acd5-c579-b277-53e6-d588cff30169}\Root\InventoryApplicationFile\securiteinfo.com|31f30688991d7db9
LowerCaseLongPath
\REGISTRY\A\{d743acd5-c579-b277-53e6-d588cff30169}\Root\InventoryApplicationFile\securiteinfo.com|31f30688991d7db9
LongPathHash
\REGISTRY\A\{d743acd5-c579-b277-53e6-d588cff30169}\Root\InventoryApplicationFile\securiteinfo.com|31f30688991d7db9
Name
\REGISTRY\A\{d743acd5-c579-b277-53e6-d588cff30169}\Root\InventoryApplicationFile\securiteinfo.com|31f30688991d7db9
OriginalFileName
\REGISTRY\A\{d743acd5-c579-b277-53e6-d588cff30169}\Root\InventoryApplicationFile\securiteinfo.com|31f30688991d7db9
Publisher
\REGISTRY\A\{d743acd5-c579-b277-53e6-d588cff30169}\Root\InventoryApplicationFile\securiteinfo.com|31f30688991d7db9
Version
\REGISTRY\A\{d743acd5-c579-b277-53e6-d588cff30169}\Root\InventoryApplicationFile\securiteinfo.com|31f30688991d7db9
BinFileVersion
\REGISTRY\A\{d743acd5-c579-b277-53e6-d588cff30169}\Root\InventoryApplicationFile\securiteinfo.com|31f30688991d7db9
BinaryType
\REGISTRY\A\{d743acd5-c579-b277-53e6-d588cff30169}\Root\InventoryApplicationFile\securiteinfo.com|31f30688991d7db9
ProductName
\REGISTRY\A\{d743acd5-c579-b277-53e6-d588cff30169}\Root\InventoryApplicationFile\securiteinfo.com|31f30688991d7db9
ProductVersion
\REGISTRY\A\{d743acd5-c579-b277-53e6-d588cff30169}\Root\InventoryApplicationFile\securiteinfo.com|31f30688991d7db9
LinkDate
\REGISTRY\A\{d743acd5-c579-b277-53e6-d588cff30169}\Root\InventoryApplicationFile\securiteinfo.com|31f30688991d7db9
BinProductVersion
\REGISTRY\A\{d743acd5-c579-b277-53e6-d588cff30169}\Root\InventoryApplicationFile\securiteinfo.com|31f30688991d7db9
AppxPackageFullName
\REGISTRY\A\{d743acd5-c579-b277-53e6-d588cff30169}\Root\InventoryApplicationFile\securiteinfo.com|31f30688991d7db9
AppxPackageRelativeId
\REGISTRY\A\{d743acd5-c579-b277-53e6-d588cff30169}\Root\InventoryApplicationFile\securiteinfo.com|31f30688991d7db9
Size
\REGISTRY\A\{d743acd5-c579-b277-53e6-d588cff30169}\Root\InventoryApplicationFile\securiteinfo.com|31f30688991d7db9
Language
\REGISTRY\A\{d743acd5-c579-b277-53e6-d588cff30169}\Root\InventoryApplicationFile\securiteinfo.com|31f30688991d7db9
Usn
\REGISTRY\A\{b2ec7396-83d1-300a-070a-90754d50fd41}\Root\InventoryApplicationFile\akegiijdgh.exe|3bc7c321c7b787f8
ProgramId
\REGISTRY\A\{b2ec7396-83d1-300a-070a-90754d50fd41}\Root\InventoryApplicationFile\akegiijdgh.exe|3bc7c321c7b787f8
FileId
\REGISTRY\A\{b2ec7396-83d1-300a-070a-90754d50fd41}\Root\InventoryApplicationFile\akegiijdgh.exe|3bc7c321c7b787f8
LowerCaseLongPath
\REGISTRY\A\{b2ec7396-83d1-300a-070a-90754d50fd41}\Root\InventoryApplicationFile\akegiijdgh.exe|3bc7c321c7b787f8
LongPathHash
\REGISTRY\A\{b2ec7396-83d1-300a-070a-90754d50fd41}\Root\InventoryApplicationFile\akegiijdgh.exe|3bc7c321c7b787f8
Name
\REGISTRY\A\{b2ec7396-83d1-300a-070a-90754d50fd41}\Root\InventoryApplicationFile\akegiijdgh.exe|3bc7c321c7b787f8
OriginalFileName
\REGISTRY\A\{b2ec7396-83d1-300a-070a-90754d50fd41}\Root\InventoryApplicationFile\akegiijdgh.exe|3bc7c321c7b787f8
Publisher
\REGISTRY\A\{b2ec7396-83d1-300a-070a-90754d50fd41}\Root\InventoryApplicationFile\akegiijdgh.exe|3bc7c321c7b787f8
Version
\REGISTRY\A\{b2ec7396-83d1-300a-070a-90754d50fd41}\Root\InventoryApplicationFile\akegiijdgh.exe|3bc7c321c7b787f8
BinFileVersion
\REGISTRY\A\{b2ec7396-83d1-300a-070a-90754d50fd41}\Root\InventoryApplicationFile\akegiijdgh.exe|3bc7c321c7b787f8
BinaryType
\REGISTRY\A\{b2ec7396-83d1-300a-070a-90754d50fd41}\Root\InventoryApplicationFile\akegiijdgh.exe|3bc7c321c7b787f8
ProductName
\REGISTRY\A\{b2ec7396-83d1-300a-070a-90754d50fd41}\Root\InventoryApplicationFile\akegiijdgh.exe|3bc7c321c7b787f8
ProductVersion
\REGISTRY\A\{b2ec7396-83d1-300a-070a-90754d50fd41}\Root\InventoryApplicationFile\akegiijdgh.exe|3bc7c321c7b787f8
LinkDate
\REGISTRY\A\{b2ec7396-83d1-300a-070a-90754d50fd41}\Root\InventoryApplicationFile\akegiijdgh.exe|3bc7c321c7b787f8
BinProductVersion
\REGISTRY\A\{b2ec7396-83d1-300a-070a-90754d50fd41}\Root\InventoryApplicationFile\akegiijdgh.exe|3bc7c321c7b787f8
AppxPackageFullName
\REGISTRY\A\{b2ec7396-83d1-300a-070a-90754d50fd41}\Root\InventoryApplicationFile\akegiijdgh.exe|3bc7c321c7b787f8
AppxPackageRelativeId
\REGISTRY\A\{b2ec7396-83d1-300a-070a-90754d50fd41}\Root\InventoryApplicationFile\akegiijdgh.exe|3bc7c321c7b787f8
Size
\REGISTRY\A\{b2ec7396-83d1-300a-070a-90754d50fd41}\Root\InventoryApplicationFile\akegiijdgh.exe|3bc7c321c7b787f8
Language
\REGISTRY\A\{b2ec7396-83d1-300a-070a-90754d50fd41}\Root\InventoryApplicationFile\akegiijdgh.exe|3bc7c321c7b787f8
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00184010FDA29B79
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
FF000
unkown
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
C6F000
unkown
page read and write
malicious
D0000
unkown
page readonly
BE5000
heap
page read and write
D60000
heap
page read and write
1A14C000
heap
page read and write
179FD000
stack
page read and write
12F9000
stack
page read and write
4CFDC000
stack
page read and write
1A1AD000
heap
page read and write
1708000
heap
page read and write
31BD000
stack
page read and write
283E000
stack
page read and write
171E000
heap
page read and write
343E000
stack
page read and write
1060000
heap
page read and write
F82000
heap
page read and write
104A000
heap
page read and write
FE8000
heap
page read and write
16A3000
heap
page read and write
1330000
heap
page read and write
25AF000
stack
page read and write
1A58C000
heap
page read and write
6CAE0000
unkown
page readonly
2B8E000
stack
page read and write
1545F000
stack
page read and write
2BCD000
stack
page read and write
6CCBF000
unkown
page write copy
F30000
heap
page read and write
205FA000
direct allocation
page readonly
BE0000
heap
page read and write
156000
unkown
page read and write
1A12B000
stack
page read and write
59C000
remote allocation
page execute and read and write
159A000
heap
page read and write
C64000
unkown
page readonly
157000
unkown
page readonly
D1000
unkown
page execute read
15F5000
heap
page read and write
2450000
heap
page read and write
205FF000
direct allocation
page readonly
1A132000
heap
page read and write
1A33D000
heap
page read and write
1490000
heap
page read and write
6C9D0000
unkown
page readonly
85A0000
heap
page read and write
1A15D000
heap
page read and write
1A230000
heap
page read and write
849E000
stack
page read and write
D10000
heap
page read and write
256E000
stack
page read and write
107EF000
stack
page read and write
CD2000
unkown
page readonly
2937000
heap
page read and write
F6D000
heap
page read and write
39C000
stack
page read and write
D0000
unkown
page readonly
503000
remote allocation
page execute and read and write
12DAB000
stack
page read and write
1723000
heap
page read and write
20A2A000
heap
page read and write
26993000
heap
page read and write
6CA62000
unkown
page readonly
5F5E000
stack
page read and write
1A430000
heap
page read and write
6C9D1000
unkown
page execute read
2A8D000
stack
page read and write
F4000
unkown
page readonly
100E000
stack
page read and write
203B1000
direct allocation
page execute read
12F1000
stack
page read and write
19FCF000
stack
page read and write
2930000
heap
page read and write
144D000
stack
page read and write
205BF000
direct allocation
page readonly
16AF000
heap
page read and write
CD2000
unkown
page readonly
4E4000
remote allocation
page execute and read and write
F4000
unkown
page readonly
85D7000
heap
page read and write
106EE000
stack
page read and write
D4A000
heap
page read and write
D3E000
stack
page read and write
104E000
stack
page read and write
1A42D000
stack
page read and write
6CA5E000
unkown
page read and write
1730000
heap
page read and write
12ED000
stack
page read and write
6CC7F000
unkown
page readonly
C40000
unkown
page readonly
1547000
heap
page read and write
287F000
stack
page read and write
D5F000
heap
page read and write
1A19D000
heap
page read and write
1A653000
heap
page read and write
FCC000
stack
page read and write
14E8000
heap
page read and write
2A30000
heap
page read and write
1082D000
stack
page read and write
D40000
heap
page read and write
2410000
heap
page read and write
117E000
stack
page read and write
46BFE000
stack
page read and write
205C8000
direct allocation
page readonly
1A1A4000
heap
page read and write
C6F000
unkown
page write copy
333E000
stack
page read and write
F40000
heap
page read and write
FFA000
heap
page read and write
2C902000
heap
page read and write
84B0000
heap
page read and write
130F000
stack
page read and write
6CA4D000
unkown
page readonly
D5E000
stack
page read and write
1A13C000
heap
page read and write
F2E000
stack
page read and write
12FD000
stack
page read and write
1A224000
heap
page read and write
157000
unkown
page readonly
CFC000
stack
page read and write
C41000
unkown
page execute read
2D3D000
stack
page read and write
14C0000
heap
page read and write
1727000
heap
page read and write
CD1000
unkown
page read and write
160F000
heap
page read and write
F5D000
heap
page read and write
114F000
stack
page read and write
65D000
remote allocation
page execute and read and write
E10000
heap
page read and write
1535E000
stack
page read and write
140F000
stack
page read and write
203B0000
direct allocation
page execute and read and write
FF000
unkown
page write copy
4CC6B000
stack
page read and write
1A445000
heap
page read and write
45C000
remote allocation
page execute and read and write
93C000
stack
page read and write
1601000
heap
page read and write
2420000
heap
page read and write
F85000
heap
page read and write
1A290000
heap
page read and write
154BE000
stack
page read and write
154000
unkown
page execute and read and write
A2B0000
unclassified section
page read and write
205BD000
direct allocation
page execute read
170B000
heap
page read and write
1A02C000
stack
page read and write
148E000
stack
page read and write
1040000
heap
page read and write
1A1AA000
heap
page read and write
4C0000
remote allocation
page execute and read and write
170F000
heap
page read and write
3287B000
heap
page read and write
FFC000
heap
page read and write
152B000
heap
page read and write
3E75F000
heap
page read and write
CCF000
unkown
page execute and read and write
9A0000
heap
page read and write
400000
remote allocation
page execute and read and write
F48000
heap
page read and write
1A651000
heap
page read and write
6CCC0000
unkown
page read and write
6CCBE000
unkown
page read and write
35C000
stack
page read and write
B0C000
stack
page read and write
15BA000
heap
page read and write
387EE000
heap
page read and write
1A44C000
heap
page read and write
9C0000
heap
page read and write
1A5AA000
heap
page read and write
D1000
unkown
page execute read
481000
remote allocation
page execute and read and write
670000
remote allocation
page execute and read and write
A9C000
stack
page read and write
127E000
stack
page read and write
4CEDC000
stack
page read and write
C41000
unkown
page execute read
25C0000
heap
page read and write
113F000
stack
page read and write
C64000
unkown
page readonly
2C30000
heap
page read and write
30BD000
stack
page read and write
990000
heap
page read and write
31FE000
stack
page read and write
B9D000
stack
page read and write
32FF000
stack
page read and write
6CCC5000
unkown
page readonly
104E000
heap
page read and write
12D6D000
stack
page read and write
C0C000
stack
page read and write
17A8E000
stack
page read and write
152EC000
stack
page read and write
175B000
heap
page read and write
FDC000
heap
page read and write
4C5000
remote allocation
page execute and read and write
1A211000
heap
page read and write
203B8000
direct allocation
page execute read
4D21D000
stack
page read and write
85D0000
heap
page read and write
14E0000
heap
page read and write
20616000
heap
page read and write
20516000
direct allocation
page execute read
205FD000
direct allocation
page readonly
6CAE1000
unkown
page execute read
D4E000
heap
page read and write
DAE000
stack
page read and write
205F2000
direct allocation
page read and write
F69000
heap
page read and write
D00000
heap
page read and write
84A0000
heap
page read and write
C40000
unkown
page readonly
There are 203 hidden memdumps, click here to show them.