IOC Report
fE7X8Fp2WG.exe

loading gif

Files

File Path
Type
Category
Malicious
fE7X8Fp2WG.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\clip64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\154561dcbf\Dctooux.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\810b84e2bfa3a9\clip64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\810b84e2bfa3a9\cred64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Dctooux.exe_3637f540c84b9ba6ce7a55f9b9914db2c135b878_312956d7_6dc61d73-c12d-4936-a061-09b5ebbf2564\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Dctooux.exe_3637f540c84b9ba6ce7a55f9b9914db2c135b878_312956d7_8ce1f9dc-be8e-4c9b-9171-e69c30a5aaea\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Dctooux.exe_3637f540c84b9ba6ce7a55f9b9914db2c135b878_312956d7_9b9bb473-266e-4e0b-a3bd-58378a951fe9\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Dctooux.exe_3637f540c84b9ba6ce7a55f9b9914db2c135b878_312956d7_e1c38b43-ff5e-4aa2-b092-235006f31b64\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Dctooux.exe_797badcf6563115bb57cdaf452d66c733e0e4_312956d7_e0bdaaf8-20b7-4ad5-a3f8-3137a7face24\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fE7X8Fp2WG.exe_777bac5a67f8742582a3f98a2f166c5f7aec29a_5b55d45e_3e4375e7-26f8-4e5e-89dc-2ae36a285385\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fE7X8Fp2WG.exe_777bac5a67f8742582a3f98a2f166c5f7aec29a_5b55d45e_747be366-4718-4166-90a6-87417ad79c44\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fE7X8Fp2WG.exe_777bac5a67f8742582a3f98a2f166c5f7aec29a_5b55d45e_7ada24d9-0d16-409d-b84b-7624f04b8e27\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fE7X8Fp2WG.exe_777bac5a67f8742582a3f98a2f166c5f7aec29a_5b55d45e_966ed35c-2d84-4e80-b442-52c716e1d0db\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fE7X8Fp2WG.exe_777bac5a67f8742582a3f98a2f166c5f7aec29a_5b55d45e_9e072690-20fc-4eba-9436-7d2a53ceec1c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fE7X8Fp2WG.exe_777bac5a67f8742582a3f98a2f166c5f7aec29a_5b55d45e_aaaf93d3-03c5-40f8-b6a7-5c6059a87345\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fE7X8Fp2WG.exe_777bac5a67f8742582a3f98a2f166c5f7aec29a_5b55d45e_ae2f5b15-306e-4e1f-9631-a7eb9c3fafcf\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fE7X8Fp2WG.exe_777bac5a67f8742582a3f98a2f166c5f7aec29a_5b55d45e_b897988d-f81f-4303-9ec6-02a881c71eee\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fE7X8Fp2WG.exe_777bac5a67f8742582a3f98a2f166c5f7aec29a_5b55d45e_de0cc45c-ac2b-4b6b-97ed-1f5879746f5f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fE7X8Fp2WG.exe_777bac5a67f8742582a3f98a2f166c5f7aec29a_5b55d45e_e8e7ba7a-23c2-4772-a7c4-e0984f12c289\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fE7X8Fp2WG.exe_b6ef235feda5a86f2dcc976858b7a2a7e34f4cec_5b55d45e_2ae1828b-4469-4573-8163-36a43dd59f50\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1039.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1069.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1195.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 05:16:03 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1222.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1243.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER128A.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 17 05:17:09 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER12D9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER12F9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER14C1.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 05:16:04 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1568.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 17 05:17:10 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER159D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER15CD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER15F6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1616.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER18A9.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 05:16:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER19D3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER19F3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1C72.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 05:16:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D3E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D8D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER27BD.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 05:16:09 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2925.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2945.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2E06.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 05:16:11 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F20.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F60.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER39B.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 05:16:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER447.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER477.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4D56.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 17 05:16:18 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4DC4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4DE4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6C7.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 05:16:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER745.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER785.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9A5.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 05:16:01 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA62.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA82.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC36.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 05:16:02 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCF3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD79.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 17 05:17:08 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDC8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDE8.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF04.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Apr 17 05:16:03 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF82.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFB2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFCB.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 17 05:17:08 2024, 0x1205a4 type
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\cred64[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\154561dcbf\Dctooux.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\246122658369
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
C:\Windows\Tasks\Dctooux.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 64 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\fE7X8Fp2WG.exe
"C:\Users\user\Desktop\fE7X8Fp2WG.exe"
malicious
C:\Users\user\AppData\Local\Temp\154561dcbf\Dctooux.exe
"C:\Users\user\AppData\Local\Temp\154561dcbf\Dctooux.exe"
malicious
C:\Users\user\AppData\Local\Temp\154561dcbf\Dctooux.exe
C:\Users\user\AppData\Local\Temp\154561dcbf\Dctooux.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7448 -s 744
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7448 -s 756
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7448 -s 860
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7448 -s 868
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7448 -s 864
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7448 -s 864
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7448 -s 1040
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7448 -s 1108
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7448 -s 1184
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7448 -s 1132
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7448 -s 744
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7228 -s 420
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7960 -s 548
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7960 -s 556
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7960 -s 596
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7960 -s 728
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
topgamecheats.dev/j4Fvskd3/index.php
malicious
http://topgamecheats.dev/j4Fvskd3/index.php(%
unknown
http://topgamecheats.dev/j4Fvskd3/Plugins/cred64.dll
93.123.39.96
http://topgamecheats.dev/j4Fvskd3/in
unknown
http://topgamecheats.dev/j4Fvskd3/Plugins/cred64.dll123456789
unknown
http://topgamecheats.dev/j4Fvskd3/index.php?scr=1k
unknown
http://topgamecheats.dev/j4Fvskd3/index.php002Recentm
unknown
http://topgamecheats.dev/j4Fvskd3/index.php?scr=1
93.123.39.96
http://topgamecheats.dev/j4Fvskd3/index.php?scr=1on6
unknown
http://topgamecheats.dev/j4Fvskd3/index.phpA
unknown
http://topgamecheats.dev/j4Fvskd3/Plugins/clip64.dll123456789
unknown
http://upx.sf.net
unknown
http://topgamecheats.dev/j4F
unknown
http://topgamecheats.dev/j4Fvskd3/index.php?scr=1e
unknown
http://topgamecheats.dev/j4Fvskd3/index.php
93.123.39.96
http://topgamecheats.dev/j4Fvskd3/index.php?scr=
unknown
http://topgamecheats.dev/j4Fvskd3/index.php?scr=1Y
unknown
http://topgamecheats.dev/j4Fvskd3/Plugins/clip64.dllA
unknown
http://topgamecheats.dev/j4Fvskd3/Plugins/cred64.dllc0S
unknown
http://topgamecheats.dev/j4Fvskd3/index.phprograms
unknown
http://topgamecheats.dev/j4Fvskd3/Plugins/clip64.dllY
unknown
http://topgamecheats.dev/j4Fvskd3/index.php%
unknown
http://topgamecheats.dev/j4Fvskd3/index.phpd
unknown
http://topgamecheats.dev/j4Fvskd3/index.phph8
unknown
http://topgamecheats.dev/j4Fvskd3/index.php?scr=1(2SY
unknown
http://topgamecheats.dev/j4Fvskd3/index.php?scr=1A
unknown
http://topgamecheats.dev/j4Fvskd3/Plugins/clip64.dll
93.123.39.96
http://topgamecheats.dev/j4Fvskd3/index.php?scr=19m
unknown
http://topgamecheats.dev/j4Fvskd3/Plugins/cred64.dllm0;
unknown
http://topgamecheats.dev/j4Fvskd3/index.php?scr=1lle03
unknown
http://topgamecheats.dev/j4Fvskd3/index.php?scr=13OF
unknown
http://topgamecheats.dev/j4Fvskd3/index.phps
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
topgamecheats.dev
93.123.39.96
malicious

IPs

IP
Domain
Country
Malicious
93.123.39.96
topgamecheats.dev
Bulgaria
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{6bdfda3b-d2a7-32d9-f6d9-4c66386ec5f5}\Root\InventoryApplicationFile\fe7x8fp2wg.exe|db2f7721b43915bb
ProgramId
\REGISTRY\A\{6bdfda3b-d2a7-32d9-f6d9-4c66386ec5f5}\Root\InventoryApplicationFile\fe7x8fp2wg.exe|db2f7721b43915bb
FileId
\REGISTRY\A\{6bdfda3b-d2a7-32d9-f6d9-4c66386ec5f5}\Root\InventoryApplicationFile\fe7x8fp2wg.exe|db2f7721b43915bb
LowerCaseLongPath
\REGISTRY\A\{6bdfda3b-d2a7-32d9-f6d9-4c66386ec5f5}\Root\InventoryApplicationFile\fe7x8fp2wg.exe|db2f7721b43915bb
LongPathHash
\REGISTRY\A\{6bdfda3b-d2a7-32d9-f6d9-4c66386ec5f5}\Root\InventoryApplicationFile\fe7x8fp2wg.exe|db2f7721b43915bb
Name
\REGISTRY\A\{6bdfda3b-d2a7-32d9-f6d9-4c66386ec5f5}\Root\InventoryApplicationFile\fe7x8fp2wg.exe|db2f7721b43915bb
OriginalFileName
\REGISTRY\A\{6bdfda3b-d2a7-32d9-f6d9-4c66386ec5f5}\Root\InventoryApplicationFile\fe7x8fp2wg.exe|db2f7721b43915bb
Publisher
\REGISTRY\A\{6bdfda3b-d2a7-32d9-f6d9-4c66386ec5f5}\Root\InventoryApplicationFile\fe7x8fp2wg.exe|db2f7721b43915bb
Version
\REGISTRY\A\{6bdfda3b-d2a7-32d9-f6d9-4c66386ec5f5}\Root\InventoryApplicationFile\fe7x8fp2wg.exe|db2f7721b43915bb
BinFileVersion
\REGISTRY\A\{6bdfda3b-d2a7-32d9-f6d9-4c66386ec5f5}\Root\InventoryApplicationFile\fe7x8fp2wg.exe|db2f7721b43915bb
BinaryType
\REGISTRY\A\{6bdfda3b-d2a7-32d9-f6d9-4c66386ec5f5}\Root\InventoryApplicationFile\fe7x8fp2wg.exe|db2f7721b43915bb
ProductName
\REGISTRY\A\{6bdfda3b-d2a7-32d9-f6d9-4c66386ec5f5}\Root\InventoryApplicationFile\fe7x8fp2wg.exe|db2f7721b43915bb
ProductVersion
\REGISTRY\A\{6bdfda3b-d2a7-32d9-f6d9-4c66386ec5f5}\Root\InventoryApplicationFile\fe7x8fp2wg.exe|db2f7721b43915bb
LinkDate
\REGISTRY\A\{6bdfda3b-d2a7-32d9-f6d9-4c66386ec5f5}\Root\InventoryApplicationFile\fe7x8fp2wg.exe|db2f7721b43915bb
BinProductVersion
\REGISTRY\A\{6bdfda3b-d2a7-32d9-f6d9-4c66386ec5f5}\Root\InventoryApplicationFile\fe7x8fp2wg.exe|db2f7721b43915bb
AppxPackageFullName
\REGISTRY\A\{6bdfda3b-d2a7-32d9-f6d9-4c66386ec5f5}\Root\InventoryApplicationFile\fe7x8fp2wg.exe|db2f7721b43915bb
AppxPackageRelativeId
\REGISTRY\A\{6bdfda3b-d2a7-32d9-f6d9-4c66386ec5f5}\Root\InventoryApplicationFile\fe7x8fp2wg.exe|db2f7721b43915bb
Size
\REGISTRY\A\{6bdfda3b-d2a7-32d9-f6d9-4c66386ec5f5}\Root\InventoryApplicationFile\fe7x8fp2wg.exe|db2f7721b43915bb
Language
\REGISTRY\A\{6bdfda3b-d2a7-32d9-f6d9-4c66386ec5f5}\Root\InventoryApplicationFile\fe7x8fp2wg.exe|db2f7721b43915bb
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{b50046d1-1354-5ce1-8df1-12c0cf9e42a9}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
ProgramId
\REGISTRY\A\{b50046d1-1354-5ce1-8df1-12c0cf9e42a9}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
FileId
\REGISTRY\A\{b50046d1-1354-5ce1-8df1-12c0cf9e42a9}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
LowerCaseLongPath
\REGISTRY\A\{b50046d1-1354-5ce1-8df1-12c0cf9e42a9}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
LongPathHash
\REGISTRY\A\{b50046d1-1354-5ce1-8df1-12c0cf9e42a9}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
Name
\REGISTRY\A\{b50046d1-1354-5ce1-8df1-12c0cf9e42a9}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
OriginalFileName
\REGISTRY\A\{b50046d1-1354-5ce1-8df1-12c0cf9e42a9}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
Publisher
\REGISTRY\A\{b50046d1-1354-5ce1-8df1-12c0cf9e42a9}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
Version
\REGISTRY\A\{b50046d1-1354-5ce1-8df1-12c0cf9e42a9}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
BinFileVersion
\REGISTRY\A\{b50046d1-1354-5ce1-8df1-12c0cf9e42a9}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
BinaryType
\REGISTRY\A\{b50046d1-1354-5ce1-8df1-12c0cf9e42a9}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
ProductName
\REGISTRY\A\{b50046d1-1354-5ce1-8df1-12c0cf9e42a9}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
ProductVersion
\REGISTRY\A\{b50046d1-1354-5ce1-8df1-12c0cf9e42a9}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
LinkDate
\REGISTRY\A\{b50046d1-1354-5ce1-8df1-12c0cf9e42a9}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
BinProductVersion
\REGISTRY\A\{b50046d1-1354-5ce1-8df1-12c0cf9e42a9}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
AppxPackageFullName
\REGISTRY\A\{b50046d1-1354-5ce1-8df1-12c0cf9e42a9}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
AppxPackageRelativeId
\REGISTRY\A\{b50046d1-1354-5ce1-8df1-12c0cf9e42a9}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
Size
\REGISTRY\A\{b50046d1-1354-5ce1-8df1-12c0cf9e42a9}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
Language
\REGISTRY\A\{b50046d1-1354-5ce1-8df1-12c0cf9e42a9}\Root\InventoryApplicationFile\dctooux.exe|6147b0ee2baa0f6f
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018400E0270CDD2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2FE0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
2EE0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
4A20000
direct allocation
page read and write
malicious
4A20000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
4A00000
direct allocation
page read and write
malicious
4990000
direct allocation
page execute and read and write
malicious
199000
stack
page read and write
4A50000
heap
page read and write
307D000
heap
page read and write
4CD0000
heap
page read and write
7FDC000
stack
page read and write
4B70000
heap
page read and write
4C1C000
stack
page read and write
81DE000
stack
page read and write
30B4000
heap
page read and write
3088000
heap
page read and write
4CC0000
heap
page read and write
64AE000
heap
page read and write
5421000
heap
page read and write
667C000
stack
page read and write
4AD0000
heap
page read and write
541E000
stack
page read and write
317F000
stack
page read and write
5D51000
heap
page read and write
2E20000
heap
page read and write
51C0000
heap
page read and write
2E20000
heap
page read and write
60CE000
stack
page read and write
3002000
heap
page read and write
80DC000
stack
page read and write
511E000
stack
page read and write
2D40000
unkown
page read and write
30DF000
heap
page read and write
464000
unkown
page read and write
4D5A000
heap
page read and write
423000
unkown
page write copy
63AE000
stack
page read and write
3073000
heap
page read and write
30B4000
heap
page read and write
6712000
heap
page read and write
4A98000
stack
page read and write
423000
unkown
page write copy
2D41000
unkown
page readonly
671E000
heap
page read and write
60FA000
heap
page read and write
2D40000
unkown
page read and write
498F000
stack
page read and write
5421000
heap
page read and write
612D000
stack
page read and write
30DB000
heap
page read and write
2E5E000
stack
page read and write
3080000
heap
page read and write
401000
unkown
page execute read
2FDB000
heap
page read and write
4B1B000
heap
page read and write
61E0000
heap
page read and write
5A8D000
stack
page read and write
4CEA000
heap
page read and write
2E85000
heap
page read and write
306B000
heap
page read and write
6716000
heap
page read and write
30DF000
heap
page read and write
2FDF000
stack
page read and write
5421000
heap
page read and write
67DD000
stack
page read and write
6C00000
heap
page read and write
19C000
stack
page read and write
2D40000
unkown
page read and write
400000
unkown
page readonly
2FCE000
stack
page read and write
5421000
heap
page read and write
4CE0000
heap
page read and write
46C000
unkown
page execute and read and write
5421000
heap
page read and write
4B4D000
stack
page read and write
5FC0000
heap
page read and write
6AC6000
heap
page read and write
2F80000
heap
page read and write
64EE000
stack
page read and write
4A1F000
stack
page read and write
68DE000
stack
page read and write
1F0000
heap
page read and write
4AD0000
heap
page read and write
5FE0000
heap
page read and write
46C000
unkown
page execute and read and write
2F8F000
stack
page read and write
4BDB000
stack
page read and write
696D000
stack
page read and write
5CDD000
stack
page read and write
6750000
heap
page read and write
2FA0000
heap
page execute and read and write
6710000
heap
page read and write
2F89000
heap
page read and write
4A1F000
stack
page read and write
4A56000
heap
page read and write
6AB0000
heap
page read and write
4D50000
heap
page read and write
2D41000
unkown
page readonly
4A3C000
stack
page read and write
5310000
heap
page read and write
4CD4000
heap
page read and write
51D0000
heap
page read and write
64DD000
heap
page read and write
2FD0000
heap
page read and write
30DF000
heap
page read and write
9C000
stack
page read and write
5D22000
heap
page read and write
58BE000
stack
page read and write
400000
unkown
page readonly
308E000
heap
page read and write
600A000
heap
page read and write
2FF7000
heap
page read and write
2ED0000
heap
page read and write
41A000
unkown
page readonly
4AF0000
heap
page read and write
590D000
stack
page read and write
671F000
heap
page read and write
2EBE000
stack
page read and write
6190000
heap
page read and write
429000
unkown
page write copy
4ABC000
stack
page read and write
2FF0000
heap
page read and write
4CCA000
heap
page read and write
6C0E000
heap
page read and write
61A5000
heap
page read and write
9B000
stack
page read and write
2E6E000
stack
page read and write
6512000
heap
page read and write
6AB1000
heap
page read and write
305F000
heap
page read and write
61EA000
heap
page read and write
30DB000
heap
page read and write
565D000
stack
page read and write
4B76000
heap
page read and write
1F0000
heap
page read and write
2ED0000
heap
page read and write
30AB000
heap
page read and write
52FD000
stack
page read and write
4D2A000
heap
page read and write
4A20000
heap
page read and write
4D20000
heap
page read and write
309D000
heap
page read and write
41A000
unkown
page readonly
3090000
heap
page read and write
305E000
heap
page read and write
429000
unkown
page write copy
2FF5000
heap
page read and write
429000
unkown
page write copy
2E80000
heap
page read and write
4CCC000
stack
page read and write
5420000
heap
page read and write
30A0000
heap
page execute and read and write
400000
unkown
page readonly
5F90000
heap
page read and write
3005000
heap
page execute and read and write
60AD000
stack
page read and write
624A000
heap
page read and write
62AE000
stack
page read and write
575E000
stack
page read and write
3070000
heap
page read and write
5FAC000
stack
page read and write
308A000
heap
page read and write
4B10000
heap
page read and write
5D42000
heap
page read and write
61A0000
heap
page read and write
6240000
heap
page read and write
30DB000
heap
page read and write
5FEA000
heap
page read and write
4CF0000
heap
page read and write
9C000
stack
page read and write
2D41000
unkown
page readonly
19C000
stack
page read and write
561E000
stack
page read and write
677C000
stack
page read and write
2E60000
heap
page read and write
671F000
heap
page read and write
30A5000
heap
page read and write
4CFA000
heap
page read and write
1F0000
heap
page read and write
5CE0000
heap
page read and write
401000
unkown
page execute read
5BDD000
stack
page read and write
3064000
heap
page read and write
2ED5000
heap
page read and write
4E7E000
stack
page read and write
4D1A000
heap
page read and write
6C10000
heap
page read and write
2EBE000
stack
page read and write
3048000
heap
page read and write
2D41000
unkown
page readonly
60F0000
heap
page read and write
2E6E000
stack
page read and write
4A40000
heap
page read and write
4B60000
heap
page read and write
4A4A000
heap
page read and write
63ED000
stack
page read and write
6180000
heap
page read and write
4B7B000
heap
page read and write
6AB1000
heap
page read and write
57BD000
stack
page read and write
5A0E000
stack
page read and write
41A000
unkown
page readonly
6AC6000
heap
page read and write
5FCA000
heap
page read and write
64F3000
heap
page read and write
67F1000
heap
page read and write
423000
unkown
page write copy
4C7B000
stack
page read and write
4B40000
heap
page read and write
4D10000
heap
page read and write
616D000
stack
page read and write
671A000
heap
page read and write
6000000
heap
page read and write
2F8E000
heap
page read and write
2D41000
unkown
page readonly
671B000
heap
page read and write
401000
unkown
page execute read
3040000
heap
page read and write
5F9A000
heap
page read and write
306F000
heap
page read and write
5B8D000
stack
page read and write
2D41000
unkown
page readonly
5927000
heap
page read and write
There are 216 hidden memdumps, click here to show them.