Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
q86onx3LvU.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_q86onx3LvU.exe_735e19e9cc503aa4d8b24e5bfe4db6f9da4f38_290d446c_3a49521a-32b8-4d8e-92a6-47e870a182c5\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5D67.tmp.dmp
|
Mini DuMP crash report, 15 streams, Wed Jul 3 14:17:04 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5F3D.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5F8C.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\q86onx3LvU.exe
|
"C:\Users\user\Desktop\q86onx3LvU.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6740 -s 2400
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
||
http://nexoproducciones.cld
|
unknown
|
||
https://nexoproducciones.cl/Fgaxcapme.mp3
|
104.21.10.178
|
||
https://nexoproducciones.cl/Fgaxcapme.mp3#EnableInitializer1jd5Ef2ZS9fTVqPfeqDQhpg==
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://nexoproducciones.cl
|
unknown
|
||
https://nexoproducciones.cl
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
nexoproducciones.cl
|
104.21.10.178
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.10.178
|
nexoproducciones.cl
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\q86onx3LvU_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\q86onx3LvU_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\q86onx3LvU_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\q86onx3LvU_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\q86onx3LvU_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\q86onx3LvU_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\q86onx3LvU_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\q86onx3LvU_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\q86onx3LvU_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\q86onx3LvU_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\q86onx3LvU_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\q86onx3LvU_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\q86onx3LvU_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\q86onx3LvU_RASMANCS
|
FileDirectory
|
||
\REGISTRY\A\{02a1bdf0-6701-e9b7-b560-acd82ecde2c8}\Root\InventoryApplicationFile\q86onx3lvu.exe|657b697ee80f2ac8
|
ProgramId
|
||
\REGISTRY\A\{02a1bdf0-6701-e9b7-b560-acd82ecde2c8}\Root\InventoryApplicationFile\q86onx3lvu.exe|657b697ee80f2ac8
|
FileId
|
||
\REGISTRY\A\{02a1bdf0-6701-e9b7-b560-acd82ecde2c8}\Root\InventoryApplicationFile\q86onx3lvu.exe|657b697ee80f2ac8
|
LowerCaseLongPath
|
||
\REGISTRY\A\{02a1bdf0-6701-e9b7-b560-acd82ecde2c8}\Root\InventoryApplicationFile\q86onx3lvu.exe|657b697ee80f2ac8
|
LongPathHash
|
||
\REGISTRY\A\{02a1bdf0-6701-e9b7-b560-acd82ecde2c8}\Root\InventoryApplicationFile\q86onx3lvu.exe|657b697ee80f2ac8
|
Name
|
||
\REGISTRY\A\{02a1bdf0-6701-e9b7-b560-acd82ecde2c8}\Root\InventoryApplicationFile\q86onx3lvu.exe|657b697ee80f2ac8
|
OriginalFileName
|
||
\REGISTRY\A\{02a1bdf0-6701-e9b7-b560-acd82ecde2c8}\Root\InventoryApplicationFile\q86onx3lvu.exe|657b697ee80f2ac8
|
Publisher
|
||
\REGISTRY\A\{02a1bdf0-6701-e9b7-b560-acd82ecde2c8}\Root\InventoryApplicationFile\q86onx3lvu.exe|657b697ee80f2ac8
|
Version
|
||
\REGISTRY\A\{02a1bdf0-6701-e9b7-b560-acd82ecde2c8}\Root\InventoryApplicationFile\q86onx3lvu.exe|657b697ee80f2ac8
|
BinFileVersion
|
||
\REGISTRY\A\{02a1bdf0-6701-e9b7-b560-acd82ecde2c8}\Root\InventoryApplicationFile\q86onx3lvu.exe|657b697ee80f2ac8
|
BinaryType
|
||
\REGISTRY\A\{02a1bdf0-6701-e9b7-b560-acd82ecde2c8}\Root\InventoryApplicationFile\q86onx3lvu.exe|657b697ee80f2ac8
|
ProductName
|
||
\REGISTRY\A\{02a1bdf0-6701-e9b7-b560-acd82ecde2c8}\Root\InventoryApplicationFile\q86onx3lvu.exe|657b697ee80f2ac8
|
ProductVersion
|
||
\REGISTRY\A\{02a1bdf0-6701-e9b7-b560-acd82ecde2c8}\Root\InventoryApplicationFile\q86onx3lvu.exe|657b697ee80f2ac8
|
LinkDate
|
||
\REGISTRY\A\{02a1bdf0-6701-e9b7-b560-acd82ecde2c8}\Root\InventoryApplicationFile\q86onx3lvu.exe|657b697ee80f2ac8
|
BinProductVersion
|
||
\REGISTRY\A\{02a1bdf0-6701-e9b7-b560-acd82ecde2c8}\Root\InventoryApplicationFile\q86onx3lvu.exe|657b697ee80f2ac8
|
AppxPackageFullName
|
||
\REGISTRY\A\{02a1bdf0-6701-e9b7-b560-acd82ecde2c8}\Root\InventoryApplicationFile\q86onx3lvu.exe|657b697ee80f2ac8
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{02a1bdf0-6701-e9b7-b560-acd82ecde2c8}\Root\InventoryApplicationFile\q86onx3lvu.exe|657b697ee80f2ac8
|
Size
|
||
\REGISTRY\A\{02a1bdf0-6701-e9b7-b560-acd82ecde2c8}\Root\InventoryApplicationFile\q86onx3lvu.exe|657b697ee80f2ac8
|
Language
|
||
\REGISTRY\A\{02a1bdf0-6701-e9b7-b560-acd82ecde2c8}\Root\InventoryApplicationFile\q86onx3lvu.exe|657b697ee80f2ac8
|
Usn
|
There are 24 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4F80000
|
trusted library allocation
|
page read and write
|
||
4D54000
|
trusted library allocation
|
page read and write
|
||
12AE000
|
stack
|
page read and write
|
||
135A000
|
heap
|
page read and write
|
||
12D7000
|
heap
|
page read and write
|
||
1333000
|
heap
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
5C8D000
|
stack
|
page read and write
|
||
DA2000
|
unkown
|
page readonly
|
||
5F1E000
|
stack
|
page read and write
|
||
2F83000
|
trusted library allocation
|
page execute and read and write
|
||
1225000
|
heap
|
page read and write
|
||
6A10000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
3260000
|
heap
|
page execute and read and write
|
||
32D1000
|
trusted library allocation
|
page read and write
|
||
32A1000
|
trusted library allocation
|
page read and write
|
||
157F000
|
stack
|
page read and write
|
||
2FB7000
|
trusted library allocation
|
page execute and read and write
|
||
44A5000
|
trusted library allocation
|
page read and write
|
||
679D000
|
stack
|
page read and write
|
||
32DA000
|
trusted library allocation
|
page read and write
|
||
3271000
|
trusted library allocation
|
page read and write
|
||
2FBB000
|
trusted library allocation
|
page execute and read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
2FB2000
|
trusted library allocation
|
page read and write
|
||
32BF000
|
trusted library allocation
|
page read and write
|
||
601E000
|
stack
|
page read and write
|
||
137B000
|
heap
|
page read and write
|
||
2FA0000
|
trusted library allocation
|
page read and write
|
||
69DE000
|
stack
|
page read and write
|
||
DA4000
|
unkown
|
page readonly
|
||
126E000
|
stack
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
6C4F000
|
stack
|
page read and write
|
||
3307000
|
trusted library allocation
|
page read and write
|
||
16D9000
|
heap
|
page read and write
|
||
6B4E000
|
stack
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
2FA7000
|
trusted library allocation
|
page execute and read and write
|
||
6370000
|
trusted library allocation
|
page read and write
|
||
2F84000
|
trusted library allocation
|
page read and write
|
||
3060000
|
trusted library allocation
|
page execute and read and write
|
||
318E000
|
stack
|
page read and write
|
||
4271000
|
trusted library allocation
|
page read and write
|
||
3198000
|
trusted library allocation
|
page read and write
|
||
16D7000
|
heap
|
page read and write
|
||
2F8D000
|
trusted library allocation
|
page execute and read and write
|
||
63BE000
|
stack
|
page read and write
|
||
32F2000
|
trusted library allocation
|
page read and write
|
||
12F2000
|
heap
|
page read and write
|
||
626E000
|
stack
|
page read and write
|
||
4B28000
|
trusted library allocation
|
page read and write
|
||
5DCE000
|
stack
|
page read and write
|
||
5870000
|
trusted library allocation
|
page read and write
|
||
32EA000
|
trusted library allocation
|
page read and write
|
||
2FAA000
|
trusted library allocation
|
page execute and read and write
|
||
1138000
|
stack
|
page read and write
|
||
32E6000
|
trusted library allocation
|
page read and write
|
||
4279000
|
trusted library allocation
|
page read and write
|
||
17DF000
|
stack
|
page read and write
|
||
5ECE000
|
stack
|
page read and write
|
||
132E000
|
heap
|
page read and write
|
||
60AE000
|
stack
|
page read and write
|
||
5D8E000
|
stack
|
page read and write
|
||
12EF000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
32D7000
|
trusted library allocation
|
page read and write
|
||
48FC000
|
trusted library allocation
|
page read and write
|
||
11FE000
|
stack
|
page read and write
|
||
3070000
|
trusted library allocation
|
page read and write
|
||
689D000
|
stack
|
page read and write
|
||
32EE000
|
trusted library allocation
|
page read and write
|
||
5B4E000
|
stack
|
page read and write
|
||
68DE000
|
stack
|
page read and write
|
||
5C4E000
|
stack
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
46D1000
|
trusted library allocation
|
page read and write
|
||
61AC000
|
stack
|
page read and write
|
||
636E000
|
stack
|
page read and write
|
||
32AD000
|
trusted library allocation
|
page read and write
|
||
57EF000
|
stack
|
page read and write
|
||
69E0000
|
heap
|
page read and write
|
||
167E000
|
stack
|
page read and write
|
||
DA0000
|
unkown
|
page readonly
|
||
1366000
|
heap
|
page read and write
|
||
1207000
|
heap
|
page read and write
|
||
136A000
|
heap
|
page read and write
|
||
64BE000
|
stack
|
page read and write
|
||
331A000
|
trusted library allocation
|
page read and write
|
||
3368000
|
trusted library allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
301E000
|
stack
|
page read and write
|
||
586D000
|
stack
|
page read and write
|
||
56EE000
|
stack
|
page read and write
|
||
16C0000
|
trusted library allocation
|
page read and write
|
||
5880000
|
heap
|
page execute and read and write
|
||
12BE000
|
heap
|
page read and write
|
||
69F0000
|
heap
|
page read and write
|
||
12B8000
|
heap
|
page read and write
|
||
2F90000
|
trusted library allocation
|
page read and write
|
||
598E000
|
stack
|
page read and write
|
||
2FA2000
|
trusted library allocation
|
page read and write
|
||
536E000
|
stack
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
305C000
|
stack
|
page read and write
|
||
59CF000
|
stack
|
page read and write
|
||
32C7000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
32CF000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
103C000
|
stack
|
page read and write
|
There are 104 hidden memdumps, click here to show them.