IOC Report
GhLMDfzXqQ.exe

loading gif

Files

File Path
Type
Category
Malicious
GhLMDfzXqQ.exe
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\clip64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\fud_new[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\cred64[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\cbb1d94791\Dctooux.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\810b84e2bfa3a9\clip64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\810b84e2bfa3a9\cred64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Google Chrome\fud_new.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Dctooux.exe_6e74f07959bc23e75a6b77fd2553fb68ad4fabc_8822d4be_17748468-aec6-4998-b810-796a4d1a1ad0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Dctooux.exe_6e74f07959bc23e75a6b77fd2553fb68ad4fabc_8822d4be_5df67cef-8384-461e-924e-e842f0895cd8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Dctooux.exe_c54a861aa4c43cc515c4d65c89eab2e3bda7e7c7_8822d4be_d2b7794f-7375-472a-8406-f114c8994e3a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fud_new.exe_294bc640cda06a6db577f7de4819bfd2ac69471_d3113786_139280ec-e68e-424a-b54c-46a2f0f20b39\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fud_new.exe_294bc640cda06a6db577f7de4819bfd2ac69471_d3113786_37a11bfd-3556-47e9-a374-aac10dae2f2e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fud_new.exe_294bc640cda06a6db577f7de4819bfd2ac69471_d3113786_7bd76d32-a562-432d-9fa1-d3abb3d004dc\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fud_new.exe_294bc640cda06a6db577f7de4819bfd2ac69471_d3113786_7dd11a48-8f43-4d2f-a7cd-400dd7cf5c6d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fud_new.exe_294bc640cda06a6db577f7de4819bfd2ac69471_d3113786_80e64bc9-3989-42c1-a0eb-d0256ca40afe\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fud_new.exe_294bc640cda06a6db577f7de4819bfd2ac69471_d3113786_9e074fbc-1152-44bc-84fe-4e231505a08d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fud_new.exe_294bc640cda06a6db577f7de4819bfd2ac69471_d3113786_b0d5bac9-4502-48ec-969a-cf14e76be64d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fud_new.exe_294bc640cda06a6db577f7de4819bfd2ac69471_d3113786_e9e42f81-540a-471f-be8b-e87ca4b7817d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fud_new.exe_294bc640cda06a6db577f7de4819bfd2ac69471_d3113786_f9fd2021-57b6-4e31-84fa-23a28505d816\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fud_new.exe_911f4ab160968f4722d8589613dfe4d92e80_d3113786_24706c4b-f7c0-4843-9246-7307329d1b0c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER101E.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 00:17:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER10BB.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER10DB.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER129E.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 00:17:01 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER132C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER137B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER15AB.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 00:17:01 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER16C6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER16E6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1955.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 00:17:02 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A02.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A51.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1C04.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 00:17:03 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1CA2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1CE1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F21.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 00:17:04 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1FCE.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1FFE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2403.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 00:17:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER250E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER252E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3597.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Apr 18 00:17:09 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3615.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3645.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7F0.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 00:16:58 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER89D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERADE.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 00:16:59 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB6B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB8C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC6F.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Apr 18 00:18:04 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCBE.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCCF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD5E.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 00:16:59 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE1B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE44.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Apr 18 00:18:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE4B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREA3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF11.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\246122658369
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
C:\Windows\Tasks\Dctooux.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 53 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\GhLMDfzXqQ.exe
"C:\Users\user\Desktop\GhLMDfzXqQ.exe"
malicious
C:\Users\user\AppData\Roaming\Google Chrome\fud_new.exe
"C:\Users\user\AppData\Roaming\Google Chrome\fud_new.exe"
malicious
C:\Users\user\AppData\Local\Temp\cbb1d94791\Dctooux.exe
"C:\Users\user\AppData\Local\Temp\cbb1d94791\Dctooux.exe"
malicious
C:\Users\user\AppData\Local\Temp\cbb1d94791\Dctooux.exe
C:\Users\user\AppData\Local\Temp\cbb1d94791\Dctooux.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 732
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 752
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 848
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 912
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 932
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 932
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 1028
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 1100
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 1128
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 1180
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 472
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 536
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 544
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
topgamecheats.dev/8bjndDcoA3/index.php
malicious
http://topgamecheats.dev/8bjndDcoA3/index.php?scr=11-
unknown
http://topgamecheats.dev/8bjndDcoA3/index.php?wal=1
93.123.39.96
http://topgamecheats.dev/fud_new.exeCC:
unknown
http://topgamecheats.dev/8bjndDcoA3/index.php?scr=1lB
unknown
http://topgamecheats.dev/8bjndDcoA3/index.phpd5
unknown
http://topgamecheats.dev/8bjndDcoA3/index.php?scr=1
93.123.39.96
http://topgamecheats.dev/8bjndDcoA3/index.phpG
unknown
http://topgamecheats.dev/
unknown
http://topgamecheats.dev/8bjndDcoA3/index.php?scr=1_
unknown
http://topgamecheats.dev/fud_new.exe)F
unknown
http://topgamecheats.dev/8bjndDcoA3/index.php?scr=1I
unknown
http://topgamecheats.dev/8bjndDcoA3/Plugins/clip64.dlls.storage.dll
unknown
http://upx.sf.net
unknown
http://topgamecheats.dev/fud_new.exe
93.123.39.96
http://topgamecheats.dev/8bjndDcoA3/index.phpp
unknown
http://topgamecheats.dev/fud_new.exed:
unknown
http://topgamecheats.dev/8bjndDcoA3/Plugins/cred64.dllJi
unknown
http://topgamecheats.dev/8bjndDcoA3/index.php
93.123.39.96
http://topgamecheats.dev/8bjndDcoA3/index.phpdc
unknown
http://topgamecheats.dev/8bjndDcoA3/Plugins/cred64.dllf
unknown
http://topgamecheats.dev/8bjndDcoA3/index.php?scr=1w
unknown
http://topgamecheats.dev/8bjndDcoA3/Plugins/clip64.dll
93.123.39.96
http://topgamecheats.dev/fud_new.exeLMEMP
unknown
http://topgamecheats.dev/8bjndDcoA3/index.phpd
unknown
http://topgamecheats.dev/8bjndDcoA3/index.phpdQ
unknown
http://topgamecheats.dev/fud_new.exe.mui
unknown
http://topgamecheats.dev/8bjndDcoA3/index.php?scr=1i
unknown
http://topgamecheats.dev/8bjndDcoA3/index.phpfb-62d94b9afd9b
unknown
http://topgamecheats.dev/r
unknown
http://topgamecheats.dev/8bjndDcoA3/Plugins/cred64.dll
93.123.39.96
http://topgamecheats.dev/8bjndDcoA3/index.php?scr=1e
unknown
http://topgamecheats.dev/8bjndDcoA3/index.php?scr=1#
unknown
http://%s/%sfud_new.exe%s%sIndex:
unknown
http://topgamecheats.dev/fud_new.exeWWC:
unknown
http://topgamecheats.dev/8bjndDcoA3/index.php?scr=11
unknown
http://topgamecheats.dev/(
unknown
http://topgamecheats.dev/fud_new.exey
unknown
http://topgamecheats.dev/8bjndDcoA3/index.php?scr=1-
unknown
http://topgamecheats.dev/e
unknown
http://topgamecheats.dev/8bjndDcoA3/index.php?scr=1n
unknown
http://topgamecheats.dev/8bjndDcoA3/index.php32
unknown
http://topgamecheats.dev/8bjndDcoA3/index.php?scr=1dB
unknown
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
topgamecheats.dev
93.123.39.96
malicious

IPs

IP
Domain
Country
Malicious
93.123.39.96
topgamecheats.dev
Bulgaria
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{5874c0fe-2846-5d5b-c723-68a726e4430e}\Root\InventoryApplicationFile\fud_new.exe|b190de538086b11e
ProgramId
\REGISTRY\A\{5874c0fe-2846-5d5b-c723-68a726e4430e}\Root\InventoryApplicationFile\fud_new.exe|b190de538086b11e
FileId
\REGISTRY\A\{5874c0fe-2846-5d5b-c723-68a726e4430e}\Root\InventoryApplicationFile\fud_new.exe|b190de538086b11e
LowerCaseLongPath
\REGISTRY\A\{5874c0fe-2846-5d5b-c723-68a726e4430e}\Root\InventoryApplicationFile\fud_new.exe|b190de538086b11e
LongPathHash
\REGISTRY\A\{5874c0fe-2846-5d5b-c723-68a726e4430e}\Root\InventoryApplicationFile\fud_new.exe|b190de538086b11e
Name
\REGISTRY\A\{5874c0fe-2846-5d5b-c723-68a726e4430e}\Root\InventoryApplicationFile\fud_new.exe|b190de538086b11e
OriginalFileName
\REGISTRY\A\{5874c0fe-2846-5d5b-c723-68a726e4430e}\Root\InventoryApplicationFile\fud_new.exe|b190de538086b11e
Publisher
\REGISTRY\A\{5874c0fe-2846-5d5b-c723-68a726e4430e}\Root\InventoryApplicationFile\fud_new.exe|b190de538086b11e
Version
\REGISTRY\A\{5874c0fe-2846-5d5b-c723-68a726e4430e}\Root\InventoryApplicationFile\fud_new.exe|b190de538086b11e
BinFileVersion
\REGISTRY\A\{5874c0fe-2846-5d5b-c723-68a726e4430e}\Root\InventoryApplicationFile\fud_new.exe|b190de538086b11e
BinaryType
\REGISTRY\A\{5874c0fe-2846-5d5b-c723-68a726e4430e}\Root\InventoryApplicationFile\fud_new.exe|b190de538086b11e
ProductName
\REGISTRY\A\{5874c0fe-2846-5d5b-c723-68a726e4430e}\Root\InventoryApplicationFile\fud_new.exe|b190de538086b11e
ProductVersion
\REGISTRY\A\{5874c0fe-2846-5d5b-c723-68a726e4430e}\Root\InventoryApplicationFile\fud_new.exe|b190de538086b11e
LinkDate
\REGISTRY\A\{5874c0fe-2846-5d5b-c723-68a726e4430e}\Root\InventoryApplicationFile\fud_new.exe|b190de538086b11e
BinProductVersion
\REGISTRY\A\{5874c0fe-2846-5d5b-c723-68a726e4430e}\Root\InventoryApplicationFile\fud_new.exe|b190de538086b11e
AppxPackageFullName
\REGISTRY\A\{5874c0fe-2846-5d5b-c723-68a726e4430e}\Root\InventoryApplicationFile\fud_new.exe|b190de538086b11e
AppxPackageRelativeId
\REGISTRY\A\{5874c0fe-2846-5d5b-c723-68a726e4430e}\Root\InventoryApplicationFile\fud_new.exe|b190de538086b11e
Size
\REGISTRY\A\{5874c0fe-2846-5d5b-c723-68a726e4430e}\Root\InventoryApplicationFile\fud_new.exe|b190de538086b11e
Language
\REGISTRY\A\{5874c0fe-2846-5d5b-c723-68a726e4430e}\Root\InventoryApplicationFile\fud_new.exe|b190de538086b11e
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
\REGISTRY\A\{350403d6-2245-a38b-17ce-74c38b1b1b0a}\Root\InventoryApplicationFile\dctooux.exe|2a4d0db9705b0cba
ProgramId
\REGISTRY\A\{350403d6-2245-a38b-17ce-74c38b1b1b0a}\Root\InventoryApplicationFile\dctooux.exe|2a4d0db9705b0cba
FileId
\REGISTRY\A\{350403d6-2245-a38b-17ce-74c38b1b1b0a}\Root\InventoryApplicationFile\dctooux.exe|2a4d0db9705b0cba
LowerCaseLongPath
\REGISTRY\A\{350403d6-2245-a38b-17ce-74c38b1b1b0a}\Root\InventoryApplicationFile\dctooux.exe|2a4d0db9705b0cba
LongPathHash
\REGISTRY\A\{350403d6-2245-a38b-17ce-74c38b1b1b0a}\Root\InventoryApplicationFile\dctooux.exe|2a4d0db9705b0cba
Name
\REGISTRY\A\{350403d6-2245-a38b-17ce-74c38b1b1b0a}\Root\InventoryApplicationFile\dctooux.exe|2a4d0db9705b0cba
OriginalFileName
\REGISTRY\A\{350403d6-2245-a38b-17ce-74c38b1b1b0a}\Root\InventoryApplicationFile\dctooux.exe|2a4d0db9705b0cba
Publisher
\REGISTRY\A\{350403d6-2245-a38b-17ce-74c38b1b1b0a}\Root\InventoryApplicationFile\dctooux.exe|2a4d0db9705b0cba
Version
\REGISTRY\A\{350403d6-2245-a38b-17ce-74c38b1b1b0a}\Root\InventoryApplicationFile\dctooux.exe|2a4d0db9705b0cba
BinFileVersion
\REGISTRY\A\{350403d6-2245-a38b-17ce-74c38b1b1b0a}\Root\InventoryApplicationFile\dctooux.exe|2a4d0db9705b0cba
BinaryType
\REGISTRY\A\{350403d6-2245-a38b-17ce-74c38b1b1b0a}\Root\InventoryApplicationFile\dctooux.exe|2a4d0db9705b0cba
ProductName
\REGISTRY\A\{350403d6-2245-a38b-17ce-74c38b1b1b0a}\Root\InventoryApplicationFile\dctooux.exe|2a4d0db9705b0cba
ProductVersion
\REGISTRY\A\{350403d6-2245-a38b-17ce-74c38b1b1b0a}\Root\InventoryApplicationFile\dctooux.exe|2a4d0db9705b0cba
LinkDate
\REGISTRY\A\{350403d6-2245-a38b-17ce-74c38b1b1b0a}\Root\InventoryApplicationFile\dctooux.exe|2a4d0db9705b0cba
BinProductVersion
\REGISTRY\A\{350403d6-2245-a38b-17ce-74c38b1b1b0a}\Root\InventoryApplicationFile\dctooux.exe|2a4d0db9705b0cba
AppxPackageFullName
\REGISTRY\A\{350403d6-2245-a38b-17ce-74c38b1b1b0a}\Root\InventoryApplicationFile\dctooux.exe|2a4d0db9705b0cba
AppxPackageRelativeId
\REGISTRY\A\{350403d6-2245-a38b-17ce-74c38b1b1b0a}\Root\InventoryApplicationFile\dctooux.exe|2a4d0db9705b0cba
Size
\REGISTRY\A\{350403d6-2245-a38b-17ce-74c38b1b1b0a}\Root\InventoryApplicationFile\dctooux.exe|2a4d0db9705b0cba
Language
\REGISTRY\A\{350403d6-2245-a38b-17ce-74c38b1b1b0a}\Root\InventoryApplicationFile\dctooux.exe|2a4d0db9705b0cba
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 34 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
48C0000
direct allocation
page execute and read and write
malicious
4980000
direct allocation
page read and write
malicious
4940000
direct allocation
page read and write
malicious
4910000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
48D0000
direct allocation
page execute and read and write
malicious
4930000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
2ED6000
heap
page read and write
6160000
heap
page read and write
498A000
heap
page read and write
4CB0000
heap
page read and write
2DC0000
heap
page read and write
2F03000
heap
page read and write
4BD0000
heap
page read and write
2E69000
heap
page read and write
2F2E000
heap
page read and write
641E000
stack
page read and write
4A50000
heap
page read and write
7EED000
stack
page read and write
6100000
heap
page read and write
656C000
stack
page read and write
506E000
stack
page read and write
2D20000
heap
page read and write
2ED2000
heap
page read and write
2EE506F8000
heap
page read and write
401000
unkown
page execute read
19B000
stack
page read and write
4C3A000
heap
page read and write
2EE524A0000
heap
page read and write
7FF6A4F20000
unkown
page write copy
7FEE000
stack
page read and write
5F9D000
stack
page read and write
69D1000
heap
page read and write
2E6F000
heap
page read and write
2C41000
unkown
page readonly
2EE5078F000
heap
page read and write
6110000
heap
page read and write
69D0000
heap
page read and write
1F0000
heap
page read and write
610A000
heap
page read and write
7FF6A4F18000
unkown
page write copy
66C7000
heap
page read and write
2EE50764000
heap
page read and write
7FF6A4F19000
unkown
page readonly
4CBA000
heap
page read and write
4DDE000
stack
page read and write
400000
unkown
page readonly
667C000
heap
page read and write
2EE506C0000
heap
page read and write
69D3000
heap
page read and write
48BF000
stack
page read and write
661F000
heap
page read and write
4B20000
heap
page read and write
2DD0000
heap
page read and write
2ECC000
heap
page read and write
5400000
heap
page read and write
2DA2000
heap
page execute and read and write
9C000
stack
page read and write
4A2C000
stack
page read and write
65F8000
heap
page read and write
19B000
stack
page read and write
631D000
stack
page read and write
2C41000
unkown
page readonly
7FF6A4F21000
unkown
page readonly
4C40000
heap
page read and write
53FD000
stack
page read and write
3060000
heap
page read and write
19A000
stack
page read and write
65F9000
heap
page read and write
401000
unkown
page execute read
4B24000
heap
page read and write
662E000
heap
page read and write
2DB0000
heap
page read and write
8CF2000
heap
page read and write
7FF6A4F18000
unkown
page write copy
FB08BFB000
stack
page read and write
2EF2000
heap
page execute and read and write
49B0000
heap
page read and write
7FF6A4F10000
unkown
page readonly
5BFE000
stack
page read and write
FB08DFE000
stack
page read and write
61B0000
heap
page read and write
4B1C000
stack
page read and write
61BA000
heap
page read and write
64F0000
heap
page read and write
7FF6A4F10000
unkown
page readonly
2FEF000
stack
page read and write
FB08FFE000
stack
page read and write
2E67000
heap
page read and write
2EE0000
heap
page read and write
2EEA000
heap
page read and write
2EF3000
heap
page read and write
FB095FB000
stack
page read and write
2D6E000
stack
page read and write
2F12000
heap
page read and write
4980000
heap
page read and write
65F1000
heap
page read and write
9C000
stack
page read and write
2DCE000
stack
page read and write
2E72000
heap
page read and write
7FF6A4F21000
unkown
page readonly
2EE507F0000
heap
page read and write
2EE0000
heap
page read and write
65FB000
heap
page read and write
51F0000
heap
page read and write
2E12000
heap
page read and write
5F29000
heap
page read and write
305B000
heap
page read and write
1C0000
heap
page read and write
40F000
unkown
page readonly
422000
unkown
page readonly
4980000
heap
page read and write
2C41000
unkown
page readonly
4A1B000
heap
page read and write
5401000
heap
page read and write
2C41000
unkown
page readonly
460000
unkown
page read and write
2EE50783000
heap
page read and write
2EE506E0000
heap
page read and write
6338000
heap
page read and write
62DE000
stack
page read and write
2EBC000
heap
page read and write
2EE5075A000
heap
page read and write
4CB0000
heap
page read and write
53BD000
stack
page read and write
6B20000
heap
page read and write
422000
unkown
page readonly
7FF6A4F20000
unkown
page write copy
6B10000
heap
page read and write
FB093F8000
stack
page read and write
2E7C000
heap
page read and write
5200000
heap
page read and write
8CF0000
heap
page read and write
66D8000
heap
page read and write
2D6E000
stack
page read and write
46C000
unkown
page execute and read and write
5FD0000
heap
page read and write
61C0000
heap
page read and write
4A66000
heap
page read and write
84F0000
trusted library allocation
page read and write
FB085FE000
stack
page read and write
7FF6A4F1C000
unkown
page read and write
2D55000
heap
page read and write
40F000
unkown
page readonly
4998000
stack
page read and write
51AD000
stack
page read and write
2E73000
heap
page read and write
4A60000
heap
page read and write
5FEA000
heap
page read and write
61B0000
heap
page read and write
65F2000
heap
page read and write
61CA000
heap
page read and write
4A16000
heap
page read and write
45E000
unkown
page write copy
2E6F000
heap
page read and write
2D70000
heap
page read and write
2E53000
heap
page read and write
FB091FD000
stack
page read and write
40F000
unkown
page readonly
646C000
stack
page read and write
2D50000
heap
page read and write
49E0000
heap
page read and write
2EE506F0000
heap
page read and write
45E000
unkown
page write copy
2EF3000
heap
page read and write
611A000
heap
page read and write
4940000
heap
page read and write
400000
unkown
page readonly
6359000
heap
page read and write
400000
unkown
page readonly
4C60000
heap
page read and write
2D90000
heap
page read and write
2D9E000
heap
page read and write
2C41000
unkown
page readonly
2EE506E5000
heap
page read and write
5D2A000
heap
page read and write
47BE000
stack
page read and write
4C30000
heap
page read and write
2EE5077C000
heap
page read and write
5AFE000
stack
page read and write
2EE5073B000
heap
page read and write
2DDD000
heap
page read and write
2ECF000
stack
page read and write
533D000
stack
page read and write
401000
unkown
page execute read
45E000
unkown
page write copy
49BA000
heap
page read and write
2EE50763000
heap
page read and write
66EC000
stack
page read and write
56FE000
stack
page read and write
5F5D000
stack
page read and write
4AC0000
heap
page read and write
49FC000
stack
page read and write
FB089FE000
stack
page read and write
1C6000
heap
page read and write
FB083F6000
stack
page read and write
5F00000
heap
page read and write
58FD000
stack
page read and write
302E000
stack
page read and write
5160000
heap
page read and write
FB087FF000
stack
page read and write
5FD5000
heap
page read and write
7FF6A4F11000
unkown
page execute read
2E30000
heap
page read and write
2EE5073B000
heap
page read and write
69DD000
heap
page read and write
7FF6A4F11000
unkown
page execute read
4C4A000
heap
page read and write
2EE5077C000
heap
page read and write
2EE50707000
heap
page read and write
5FA0000
heap
page read and write
616A000
heap
page read and write
2EE505E0000
heap
page read and write
4A10000
heap
page read and write
422000
unkown
page readonly
4A1B000
heap
page read and write
2EE5078C000
heap
page read and write
2EEE000
heap
page read and write
5401000
heap
page read and write
2EE50717000
heap
page read and write
60DE000
stack
page read and write
2E2C000
stack
page read and write
4B1B000
stack
page read and write
2EE5075A000
heap
page read and write
6B1E000
heap
page read and write
69ED000
heap
page read and write
2C41000
unkown
page readonly
498A000
heap
page read and write
2D20000
heap
page read and write
515D000
stack
page read and write
312F000
stack
page read and write
66C5000
heap
page read and write
66E1000
heap
page read and write
46C000
unkown
page execute and read and write
537D000
stack
page read and write
2EE50791000
heap
page read and write
2E34000
heap
page execute and read and write
5D20000
heap
page read and write
5D40000
heap
page read and write
2C50000
heap
page read and write
4F6B000
stack
page read and write
2D9A000
heap
page read and write
2EE507D8000
heap
page read and write
57FE000
stack
page read and write
4BCD000
stack
page read and write
5D4A000
heap
page read and write
2F18000
heap
page read and write
7FF6A4F1D000
unkown
page write copy
9B000
stack
page read and write
61BA000
heap
page read and write
1F0000
heap
page read and write
59FE000
stack
page read and write
61D0000
heap
page read and write
67EC000
stack
page read and write
2E66000
heap
page read and write
2ECE000
stack
page read and write
61DA000
heap
page read and write
55FE000
stack
page read and write
3050000
heap
page read and write
5B01000
heap
page read and write
65F7000
heap
page read and write
2EE50716000
heap
page read and write
302F000
stack
page read and write
61DE000
stack
page read and write
4CBA000
heap
page read and write
490F000
stack
page read and write
7FF6A4F19000
unkown
page readonly
There are 259 hidden memdumps, click here to show them.