IOC Report
C4v61Eu50U.exe

loading gif

Files

File Path
Type
Category
Malicious
C4v61Eu50U.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\clip64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000102011\build.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\154561dcbf\Dctooux.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\810b84e2bfa3a9\clip64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\810b84e2bfa3a9\cred64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_C4v61Eu50U.exe_1f4feb7524dc0e863ce9e7cc0cf187ee8ffc79c_1c5ec9e0_1a7e645c-2e62-4850-97e3-5bf6642b72a8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_C4v61Eu50U.exe_1f4feb7524dc0e863ce9e7cc0cf187ee8ffc79c_1c5ec9e0_310d5a4a-446d-4624-a773-c471cd793c02\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_C4v61Eu50U.exe_1f4feb7524dc0e863ce9e7cc0cf187ee8ffc79c_1c5ec9e0_3e63e36d-1ac1-46e2-9a14-91ad004037de\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_C4v61Eu50U.exe_1f4feb7524dc0e863ce9e7cc0cf187ee8ffc79c_1c5ec9e0_3ea826bd-4484-476f-a84e-1562d0364332\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_C4v61Eu50U.exe_1f4feb7524dc0e863ce9e7cc0cf187ee8ffc79c_1c5ec9e0_6ceae6a3-5b21-4ea1-923e-90d95532e1ca\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_C4v61Eu50U.exe_1f4feb7524dc0e863ce9e7cc0cf187ee8ffc79c_1c5ec9e0_8526832e-3e1a-4f53-a2dc-671296b4bc33\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_C4v61Eu50U.exe_1f4feb7524dc0e863ce9e7cc0cf187ee8ffc79c_1c5ec9e0_9e2e213c-ffef-4368-b9c6-f61ea5cccda9\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_C4v61Eu50U.exe_1f4feb7524dc0e863ce9e7cc0cf187ee8ffc79c_1c5ec9e0_e97b79e8-a892-40a9-9419-8e363dc9886b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_C4v61Eu50U.exe_1f4feb7524dc0e863ce9e7cc0cf187ee8ffc79c_1c5ec9e0_fd947a9b-0655-4f1d-b0cb-9d604e7e4fb3\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_C4v61Eu50U.exe_f87a837321ef8299bbff8dfb8d53b7ce6b6c298_1c5ec9e0_88531bae-6c0c-4388-9d8d-942f5aca24b5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Dctooux.exe_71e84a91d1c52dfb8b6ecc2b267c2ece5194b4_312956d7_21a8c7c6-7a02-4826-8170-2e66318f1343\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Dctooux.exe_7515d8ad160e2e6b1b186d749e987146649c954_312956d7_2b25ac27-85fe-4621-9328-9082ff0a3d72\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Dctooux.exe_7515d8ad160e2e6b1b186d749e987146649c954_312956d7_6c948045-c5b0-4f4c-a7cb-444eebf435ff\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Dctooux.exe_7515d8ad160e2e6b1b186d749e987146649c954_312956d7_8633ddbe-a3d6-404b-8ca4-8c6118b08530\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Dctooux.exe_7515d8ad160e2e6b1b186d749e987146649c954_312956d7_8cfeed11-950d-45fd-a4c5-15aa7b8f3e51\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Dctooux.exe_7515d8ad160e2e6b1b186d749e987146649c954_312956d7_980158cd-eb62-4f11-a0b4-efaa896f6048\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Dctooux.exe_a0a4ac5f0f0cf13585f84c794a5ac9218f9a7c_312956d7_4926d398-32b4-4794-8646-e67f6bb6c014\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER47C2.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 17 04:30:04 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER496C.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 04:28:57 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4A58.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4A88.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4D54.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 04:28:58 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4DCE.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4DEE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4EAD.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4EDD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4F53.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 17 04:30:04 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4FB2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4FC3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER510D.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 04:28:59 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5176.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 17 04:30:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER517C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER51AC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER51C5.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER51E5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5340.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 04:29:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5389.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 17 04:30:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER539F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER53CF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER53F8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5418.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5592.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 04:29:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5600.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER569D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER56A6.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 17 04:30:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5743.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5764.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER58AF.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 04:29:01 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER592D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5936.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 17 04:30:07 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER594D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER59B4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER59D5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5B7D.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 04:29:02 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5C3A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5C5A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5E6B.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 04:29:02 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5F47.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5F77.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6188.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 04:29:03 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6216.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6265.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER666A.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 04:29:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER67A4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER67D4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6E4A.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 17 04:29:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6E99.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6EB9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\cred64[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\build[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\vidar[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\1000101001\vidar.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\154561dcbf\Dctooux.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\246122658369
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
C:\Windows\Tasks\Dctooux.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 72 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\C4v61Eu50U.exe
"C:\Users\user\Desktop\C4v61Eu50U.exe"
malicious
C:\Users\user\AppData\Local\Temp\154561dcbf\Dctooux.exe
"C:\Users\user\AppData\Local\Temp\154561dcbf\Dctooux.exe"
malicious
C:\Users\user\AppData\Local\Temp\154561dcbf\Dctooux.exe
C:\Users\user\AppData\Local\Temp\154561dcbf\Dctooux.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6632 -s 736
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6632 -s 780
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6632 -s 848
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6632 -s 856
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6632 -s 848
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6632 -s 848
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6632 -s 996
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6632 -s 1080
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6632 -s 1116
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6632 -s 1180
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6336 -s 472
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6336 -s 540
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6336 -s 548
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6336 -s 540
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6336 -s 712
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6336 -s 816
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6336 -s 824
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://topgamecheats.dev/j4Fvskd3/Plugins/cred64.dll
93.123.39.96
malicious
http://topgamecheats.dev/vidar.exe
93.123.39.96
malicious
http://topgamecheats.dev/j4Fvskd3/index.php?scr=1
93.123.39.96
malicious
http://topgamecheats.dev/j4Fvskd3/index.php
93.123.39.96
malicious
http://topgamecheats.dev/build.dll
93.123.39.96
malicious
topgamecheats.dev/j4Fvskd3/index.php
malicious
http://topgamecheats.dev/j4Fvskd3/Plugins/clip64.dll
93.123.39.96
malicious
http://topgamecheats.dev/j4Fvskd3/Plugins/cred64.dllR
unknown
http://topgamecheats.dev/j4Fvskd3/index.phpx-
unknown
http://topgamecheats.dev/j4Fvskd3/Plugins/clip64.dllo
unknown
http://topgamecheats.dev/vidar.exe814606e0c54
unknown
http://upx.sf.net
unknown
http://topgamecheats.dev/build.dll#
unknown
http://topgamecheats.dev/j4Fvskd3/index.php?scr=1g
unknown
http://topgamecheats.dev/build.dllp
unknown
http://topgamecheats.dev/j4Fvskd3/index.php?scr=1FEA
unknown
http://topgamecheats.dev/j4Fvskd3/Plugins/cred64.dll0-t
unknown
http://topgamecheats.dev/vidar.exe814606e0c540
unknown
http://topgamecheats.dev/j4Fvskd3/index.phpL-
unknown
http://topgamecheats.dev/vidar.exeM
unknown
http://topgamecheats.dev/j4Fvskd3/Plugins/cred64.dllp
unknown
http://topgamecheats.dev/j4Fvskd3/Plugins/cred64.dlly
unknown
http://topgamecheats.dev/j4Fvskd3/index.php?scr=1N
unknown
http://topgamecheats.dev/j4Fvskd3/Plugins/cred64.dllB
unknown
http://topgamecheats.dev/j4Fvskd3/index.php:
unknown
http://topgamecheats.dev/j4Fvskd3/Plugins/cred64.dll=
unknown
http://topgamecheats.dev/j4Fvskd3/index.php?scr=1x
unknown
http://topgamecheats.dev/vidar.exe814606eodedx
unknown
http://topgamecheats.dev/j4Fvskd3/index.php?scr=1.AppDataBG9
unknown
http://topgamecheats.dev/build.dllN
unknown
http://topgamecheats.dev/j4Fvskd3/index.php?scr=1FDA
unknown
http://topgamecheats.dev/$
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
topgamecheats.dev
93.123.39.96
malicious

IPs

IP
Domain
Country
Malicious
93.123.39.96
topgamecheats.dev
Bulgaria
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
build.dll
malicious
\REGISTRY\A\{1971e165-20e1-2ec2-0d6b-5cbc1d161f7a}\Root\InventoryApplicationFile\c4v61eu50u.exe|6962d6a5a84c4c38
ProgramId
\REGISTRY\A\{1971e165-20e1-2ec2-0d6b-5cbc1d161f7a}\Root\InventoryApplicationFile\c4v61eu50u.exe|6962d6a5a84c4c38
FileId
\REGISTRY\A\{1971e165-20e1-2ec2-0d6b-5cbc1d161f7a}\Root\InventoryApplicationFile\c4v61eu50u.exe|6962d6a5a84c4c38
LowerCaseLongPath
\REGISTRY\A\{1971e165-20e1-2ec2-0d6b-5cbc1d161f7a}\Root\InventoryApplicationFile\c4v61eu50u.exe|6962d6a5a84c4c38
LongPathHash
\REGISTRY\A\{1971e165-20e1-2ec2-0d6b-5cbc1d161f7a}\Root\InventoryApplicationFile\c4v61eu50u.exe|6962d6a5a84c4c38
Name
\REGISTRY\A\{1971e165-20e1-2ec2-0d6b-5cbc1d161f7a}\Root\InventoryApplicationFile\c4v61eu50u.exe|6962d6a5a84c4c38
OriginalFileName
\REGISTRY\A\{1971e165-20e1-2ec2-0d6b-5cbc1d161f7a}\Root\InventoryApplicationFile\c4v61eu50u.exe|6962d6a5a84c4c38
Publisher
\REGISTRY\A\{1971e165-20e1-2ec2-0d6b-5cbc1d161f7a}\Root\InventoryApplicationFile\c4v61eu50u.exe|6962d6a5a84c4c38
Version
\REGISTRY\A\{1971e165-20e1-2ec2-0d6b-5cbc1d161f7a}\Root\InventoryApplicationFile\c4v61eu50u.exe|6962d6a5a84c4c38
BinFileVersion
\REGISTRY\A\{1971e165-20e1-2ec2-0d6b-5cbc1d161f7a}\Root\InventoryApplicationFile\c4v61eu50u.exe|6962d6a5a84c4c38
BinaryType
\REGISTRY\A\{1971e165-20e1-2ec2-0d6b-5cbc1d161f7a}\Root\InventoryApplicationFile\c4v61eu50u.exe|6962d6a5a84c4c38
ProductName
\REGISTRY\A\{1971e165-20e1-2ec2-0d6b-5cbc1d161f7a}\Root\InventoryApplicationFile\c4v61eu50u.exe|6962d6a5a84c4c38
ProductVersion
\REGISTRY\A\{1971e165-20e1-2ec2-0d6b-5cbc1d161f7a}\Root\InventoryApplicationFile\c4v61eu50u.exe|6962d6a5a84c4c38
LinkDate
\REGISTRY\A\{1971e165-20e1-2ec2-0d6b-5cbc1d161f7a}\Root\InventoryApplicationFile\c4v61eu50u.exe|6962d6a5a84c4c38
BinProductVersion
\REGISTRY\A\{1971e165-20e1-2ec2-0d6b-5cbc1d161f7a}\Root\InventoryApplicationFile\c4v61eu50u.exe|6962d6a5a84c4c38
AppxPackageFullName
\REGISTRY\A\{1971e165-20e1-2ec2-0d6b-5cbc1d161f7a}\Root\InventoryApplicationFile\c4v61eu50u.exe|6962d6a5a84c4c38
AppxPackageRelativeId
\REGISTRY\A\{1971e165-20e1-2ec2-0d6b-5cbc1d161f7a}\Root\InventoryApplicationFile\c4v61eu50u.exe|6962d6a5a84c4c38
Size
\REGISTRY\A\{1971e165-20e1-2ec2-0d6b-5cbc1d161f7a}\Root\InventoryApplicationFile\c4v61eu50u.exe|6962d6a5a84c4c38
Language
\REGISTRY\A\{1971e165-20e1-2ec2-0d6b-5cbc1d161f7a}\Root\InventoryApplicationFile\c4v61eu50u.exe|6962d6a5a84c4c38
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{3642d491-7e0b-9246-8b3a-51613db3e0fe}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
ProgramId
\REGISTRY\A\{3642d491-7e0b-9246-8b3a-51613db3e0fe}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
FileId
\REGISTRY\A\{3642d491-7e0b-9246-8b3a-51613db3e0fe}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
LowerCaseLongPath
\REGISTRY\A\{3642d491-7e0b-9246-8b3a-51613db3e0fe}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
LongPathHash
\REGISTRY\A\{3642d491-7e0b-9246-8b3a-51613db3e0fe}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
Name
\REGISTRY\A\{3642d491-7e0b-9246-8b3a-51613db3e0fe}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
OriginalFileName
\REGISTRY\A\{3642d491-7e0b-9246-8b3a-51613db3e0fe}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
Publisher
\REGISTRY\A\{3642d491-7e0b-9246-8b3a-51613db3e0fe}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
Version
\REGISTRY\A\{3642d491-7e0b-9246-8b3a-51613db3e0fe}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
BinFileVersion
\REGISTRY\A\{3642d491-7e0b-9246-8b3a-51613db3e0fe}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
BinaryType
\REGISTRY\A\{3642d491-7e0b-9246-8b3a-51613db3e0fe}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
ProductName
\REGISTRY\A\{3642d491-7e0b-9246-8b3a-51613db3e0fe}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
ProductVersion
\REGISTRY\A\{3642d491-7e0b-9246-8b3a-51613db3e0fe}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
LinkDate
\REGISTRY\A\{3642d491-7e0b-9246-8b3a-51613db3e0fe}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
BinProductVersion
\REGISTRY\A\{3642d491-7e0b-9246-8b3a-51613db3e0fe}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
AppxPackageFullName
\REGISTRY\A\{3642d491-7e0b-9246-8b3a-51613db3e0fe}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
AppxPackageRelativeId
\REGISTRY\A\{3642d491-7e0b-9246-8b3a-51613db3e0fe}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
Size
\REGISTRY\A\{3642d491-7e0b-9246-8b3a-51613db3e0fe}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
Language
\REGISTRY\A\{3642d491-7e0b-9246-8b3a-51613db3e0fe}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
Usn
There are 31 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
4950000
direct allocation
page read and write
malicious
4930000
direct allocation
page execute and read and write
malicious
3170000
direct allocation
page read and write
malicious
49A0000
direct allocation
page read and write
malicious
3100000
direct allocation
page execute and read and write
malicious
48E0000
direct allocation
page execute and read and write
malicious
A961000
heap
page read and write
501E000
stack
page read and write
9C000
stack
page read and write
2F3F000
heap
page read and write
513B000
heap
page read and write
49C0000
heap
page read and write
61AE000
stack
page read and write
6970000
heap
page read and write
45D000
unkown
page read and write
400000
unkown
page readonly
2FE3000
heap
page read and write
2E6F000
stack
page read and write
5F4D000
stack
page read and write
2FEA000
heap
page read and write
401000
unkown
page execute read
50AD000
stack
page read and write
6ADA000
heap
page read and write
1F0000
heap
page read and write
4B3C000
stack
page read and write
612A000
heap
page read and write
50FD000
stack
page read and write
2E3E000
heap
page read and write
2FC3000
heap
page read and write
5FFD000
stack
page read and write
45B000
unkown
page write copy
6A12000
heap
page read and write
5D90000
heap
page read and write
2D70000
heap
page read and write
2D20000
heap
page read and write
5F8D000
stack
page read and write
2D60000
heap
page read and write
537D000
stack
page read and write
333F000
stack
page read and write
56CD000
stack
page read and write
2F42000
heap
page read and write
31E0000
heap
page read and write
6ADD000
heap
page read and write
2FC3000
heap
page read and write
2E30000
heap
page read and write
2EAE000
stack
page read and write
2F4E000
heap
page read and write
2D75000
heap
page read and write
1F0000
heap
page read and write
6ADB000
heap
page read and write
5FA0000
heap
page read and write
69C1000
heap
page read and write
6B10000
heap
page read and write
401000
unkown
page execute read
69C1000
heap
page read and write
45B000
unkown
page write copy
6582000
heap
page read and write
40C000
unkown
page readonly
69C9000
heap
page read and write
2F83000
heap
page read and write
643C000
stack
page read and write
4A8B000
stack
page read and write
2FE7000
heap
page read and write
63EE000
stack
page read and write
2F5B000
heap
page read and write
1C0000
heap
page read and write
50B0000
heap
page read and write
3080000
heap
page read and write
69D8000
heap
page read and write
2EE0000
heap
page read and write
5DCA000
heap
page read and write
2FDB000
heap
page read and write
400000
unkown
page readonly
2F09000
heap
page read and write
401000
unkown
page execute read
5F90000
heap
page read and write
2F04000
heap
page execute and read and write
2FDB000
heap
page read and write
400000
unkown
page readonly
4988000
stack
page read and write
4B0C000
stack
page read and write
2C3E000
unkown
page readonly
2FEF000
heap
page read and write
62AE000
stack
page read and write
2FA9000
heap
page read and write
2D5E000
stack
page read and write
2F8D000
heap
page read and write
9C000
stack
page read and write
62ED000
stack
page read and write
A965000
heap
page read and write
5894000
heap
page read and write
4B50000
heap
page read and write
6170000
heap
page read and write
2F0E000
heap
page read and write
41F000
unkown
page readonly
19B000
stack
page read and write
2D60000
heap
page read and write
2DBE000
stack
page read and write
5390000
heap
page read and write
6AD8000
heap
page read and write
4A9A000
heap
page read and write
323E000
stack
page read and write
2E3A000
heap
page read and write
5391000
heap
page read and write
5EFC000
unkown
page read and write
64C2000
heap
page read and write
61C0000
heap
page read and write
31BB000
heap
page read and write
69E0000
heap
page read and write
2ED0000
heap
page read and write
41F000
unkown
page readonly
2EB0000
heap
page read and write
86D0000
trusted library allocation
page read and write
49F6000
heap
page read and write
2DCE000
stack
page read and write
2FD4000
heap
page read and write
5D2E000
stack
page read and write
4B10000
heap
page read and write
5391000
heap
page read and write
2FC5000
heap
page read and write
2C50000
heap
page read and write
31B6000
heap
page read and write
49F0000
heap
page read and write
2FCA000
heap
page read and write
4BFA000
heap
page read and write
4BD0000
heap
page read and write
30FF000
stack
page read and write
4D1E000
stack
page read and write
7FEE000
stack
page read and write
45B000
unkown
page write copy
5A9E000
stack
page read and write
599D000
stack
page read and write
568E000
stack
page read and write
5FA5000
heap
page read and write
5D9A000
heap
page read and write
49C4000
heap
page read and write
6B1E000
heap
page read and write
2D30000
heap
page read and write
6130000
heap
page read and write
46C000
unkown
page execute and read and write
653C000
stack
page read and write
2C3E000
unkown
page readonly
6120000
heap
page read and write
31B0000
heap
page read and write
2FA6000
heap
page read and write
2F13000
heap
page execute and read and write
6ADE000
heap
page read and write
31BB000
heap
page read and write
2E10000
heap
page read and write
57CE000
stack
page read and write
558E000
stack
page read and write
86CC000
stack
page read and write
2C3E000
unkown
page readonly
5130000
heap
page read and write
2E42000
heap
page execute and read and write
5380000
heap
page read and write
61E0000
heap
page read and write
5140000
heap
page read and write
2E7E000
heap
page read and write
2FEA000
heap
page read and write
617A000
heap
page read and write
40C000
unkown
page readonly
7EED000
stack
page read and write
5F0C000
stack
page read and write
199000
stack
page read and write
302F000
stack
page read and write
45B000
unkown
page read and write
5DC0000
heap
page read and write
2F00000
heap
page read and write
5ADD000
stack
page read and write
2D66000
heap
page read and write
2FE4000
heap
page read and write
2C3E000
unkown
page readonly
2EBF000
stack
page read and write
4A90000
heap
page read and write
581D000
stack
page read and write
61CA000
heap
page read and write
591D000
stack
page read and write
533E000
stack
page read and write
6B20000
heap
page read and write
69C0000
heap
page read and write
338F000
stack
page read and write
5C2D000
stack
page read and write
41F000
unkown
page readonly
61EA000
heap
page read and write
2FDD000
heap
page read and write
2D7E000
stack
page read and write
85CC000
stack
page read and write
4AFB000
stack
page read and write
5BDE000
stack
page read and write
6AD5000
heap
page read and write
613A000
heap
page read and write
68CC000
heap
page read and write
6580000
heap
page read and write
9B000
stack
page read and write
19B000
stack
page read and write
4BBA000
heap
page read and write
2FA1000
heap
page read and write
31AC000
stack
page read and write
40C000
unkown
page readonly
46C000
unkown
page execute and read and write
2C3E000
unkown
page readonly
2C3E000
unkown
page readonly
4BB0000
heap
page read and write
4BF0000
heap
page read and write
60AE000
stack
page read and write
2F00000
heap
page read and write
There are 200 hidden memdumps, click here to show them.