Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
6TAV5gMNBX.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_6TAV5gMNBX.exe_5bcee375703a666167dbb9e7f3124c216df9de2f_a9778c24_2a40b31a-c82e-41ba-8673-aa5c75ee1375\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER11BB.tmp.dmp
|
Mini DuMP crash report, 16 streams, Wed Jul 3 14:34:41 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER12E5.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1315.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\6TAV5gMNBX.exe
|
"C:\Users\user\Desktop\6TAV5gMNBX.exe"
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7116 -s 808
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
|
ProgramId
|
||
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
|
FileId
|
||
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
|
LowerCaseLongPath
|
||
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
|
LongPathHash
|
||
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
|
Name
|
||
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
|
OriginalFileName
|
||
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
|
Publisher
|
||
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
|
Version
|
||
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
|
BinFileVersion
|
||
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
|
BinaryType
|
||
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
|
ProductName
|
||
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
|
ProductVersion
|
||
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
|
LinkDate
|
||
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
|
BinProductVersion
|
||
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
|
AppxPackageFullName
|
||
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
|
Size
|
||
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
|
Language
|
||
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
226881E0000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
71D27FE000
|
stack
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
71D26FF000
|
stack
|
page read and write
|
||
71D28FF000
|
stack
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
22688223000
|
heap
|
page read and write
|
||
226882A0000
|
heap
|
page read and write
|
||
22688450000
|
heap
|
page read and write
|
||
22688130000
|
heap
|
page read and write
|
||
71D2BFE000
|
stack
|
page read and write
|
||
22688160000
|
heap
|
page read and write
|
||
22688263000
|
heap
|
page read and write
|
||
71D2AFD000
|
stack
|
page read and write
|
||
22688250000
|
heap
|
page read and write
|
||
22688140000
|
heap
|
page read and write
|
||
226883D0000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
2268820A000
|
heap
|
page read and write
|
||
226881E6000
|
heap
|
page read and write
|
||
71D2DFE000
|
stack
|
page read and write
|
||
22688216000
|
heap
|
page read and write
|
||
7FF4F3530000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
22688220000
|
heap
|
page read and write
|
||
71D2CFF000
|
stack
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
226882AE000
|
heap
|
page read and write
|
||
226881EC000
|
heap
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
22688535000
|
heap
|
page read and write
|
||
226883C0000
|
trusted library allocation
|
page read and write
|
||
226880A0000
|
unkown
|
page readonly
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
22689DB0000
|
heap
|
page execute and read and write
|
||
22699DC9000
|
trusted library allocation
|
page read and write
|
||
22688180000
|
heap
|
page read and write
|
||
226881D0000
|
trusted library allocation
|
page read and write
|
||
22688284000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
22699DC1000
|
trusted library allocation
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
22699DC3000
|
trusted library allocation
|
page read and write
|
||
22688455000
|
heap
|
page read and write
|
||
226880A2000
|
unkown
|
page readonly
|
||
22688214000
|
heap
|
page read and write
|
||
22688520000
|
heap
|
page read and write
|
||
226883D3000
|
trusted library allocation
|
page read and write
|
||
22689DC1000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
22689DA0000
|
heap
|
page execute and read and write
|
||
71D23F7000
|
stack
|
page read and write
|
||
22688530000
|
heap
|
page read and write
|
||
22688254000
|
heap
|
page read and write
|
||
71D29FE000
|
stack
|
page read and write
|
There are 50 hidden memdumps, click here to show them.