Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_23ac2d3598194099bfea53d8620e685cbd9df63_2fa1aaae_46522aeb-fbd2-4ad7-8707-f1f3c121c621\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5F85.tmp.dmp
|
Mini DuMP crash report, 15 streams, Wed Jul 3 14:50:15 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6283.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER62B3.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5316 -s 2068
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://t.me/
|
unknown
|
||
https://steamcommunity.com/profiles/76561199730044335
|
|||
https://t.me/bu77un
|
149.154.167.99
|
||
https://116.202.180.70:5432/sqlt.dll4
|
unknown
|
||
https://nydus.battle.net/App/%s/setup/app
|
unknown
|
||
https://telemetry-in.battlenet.com.cn/datahttps://telemetry-in.battle.net/data
|
unknown
|
||
https://116.202.180.70:5432/
|
unknown
|
||
http://nydus.battle.net/App/%s/setup/error/%s
|
unknown
|
||
https://www.openssl.org/docs/faq.html
|
unknown
|
||
http://www.google.com/get/noto/
|
unknown
|
||
https://web.telegram.org
|
unknown
|
||
http://nydus.battle.net/geoip
|
unknown
|
||
https://116.202.180.70:5432/2
|
unknown
|
||
https://116.202.180.70:5432/dows
|
unknown
|
||
https://116.202.180.70:5432/1
|
unknown
|
||
https://116.202.180.70:5432/talV
|
unknown
|
||
https://bitwarden.com
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://116.202.180.70:5432
|
unknown
|
||
https://116.202.180.70:5432rss.exe
|
unknown
|
||
https://116.202.180.70:5432/sqlt.dllnamK.exe
|
unknown
|
||
https://curl.haxx.se/docs/http-cookies.html
|
unknown
|
||
https://t.me/bu77unguf_hMozilla/5.0
|
unknown
|
||
http://iir.blizzard.com:3724/submit/BNET_APP
|
unknown
|
||
https://telemetry-in.battlenet.com.cn/data
|
unknown
|
||
https://telemetry-in.battle.net/data
|
unknown
|
||
https://116.202.180.70:5432/T
|
unknown
|
||
https://steamcommunity.com/profiles/76561199730044335hellosqlt.dllsqlite3.dll
|
unknown
|
||
http:///1.18.10.3141/Apps/Battle.net.agent.db
|
unknown
|
||
https://116.202.180.70:5432/ps;PATHEXT=.CO
|
unknown
|
||
http://iir.blizzard.com:3724/submit/BNET_APPUnknown
|
unknown
|
||
https://116.202.180.70:5432Content-Disposition:
|
unknown
|
||
http://scripts.sil.org/OFL
|
unknown
|
||
https://116.202.180.70:5432/sqlt.dll
|
unknown
|
||
http://nydus.battle.net/geoipX-Geoip-RegionX-Geoip-CountryUSCNSEASGGETd:
|
unknown
|
||
https://nydus.battle.net/App/%s/setup/appSelected
|
unknown
|
||
https://116.202.180.70/
|
unknown
|
||
https://116.202.180.70:5432/Y/h
|
unknown
|
There are 28 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
t.me
|
149.154.167.99
|
||
198.187.3.20.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.99
|
t.me
|
United Kingdom
|
||
116.202.180.70
|
unknown
|
Germany
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{13d32804-6ec7-9827-09cf-4ff8cf9a5129}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
ProgramId
|
||
\REGISTRY\A\{13d32804-6ec7-9827-09cf-4ff8cf9a5129}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
FileId
|
||
\REGISTRY\A\{13d32804-6ec7-9827-09cf-4ff8cf9a5129}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
LowerCaseLongPath
|
||
\REGISTRY\A\{13d32804-6ec7-9827-09cf-4ff8cf9a5129}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
LongPathHash
|
||
\REGISTRY\A\{13d32804-6ec7-9827-09cf-4ff8cf9a5129}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
Name
|
||
\REGISTRY\A\{13d32804-6ec7-9827-09cf-4ff8cf9a5129}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
OriginalFileName
|
||
\REGISTRY\A\{13d32804-6ec7-9827-09cf-4ff8cf9a5129}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
Publisher
|
||
\REGISTRY\A\{13d32804-6ec7-9827-09cf-4ff8cf9a5129}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
Version
|
||
\REGISTRY\A\{13d32804-6ec7-9827-09cf-4ff8cf9a5129}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
BinFileVersion
|
||
\REGISTRY\A\{13d32804-6ec7-9827-09cf-4ff8cf9a5129}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
BinaryType
|
||
\REGISTRY\A\{13d32804-6ec7-9827-09cf-4ff8cf9a5129}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
ProductName
|
||
\REGISTRY\A\{13d32804-6ec7-9827-09cf-4ff8cf9a5129}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
ProductVersion
|
||
\REGISTRY\A\{13d32804-6ec7-9827-09cf-4ff8cf9a5129}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
LinkDate
|
||
\REGISTRY\A\{13d32804-6ec7-9827-09cf-4ff8cf9a5129}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
BinProductVersion
|
||
\REGISTRY\A\{13d32804-6ec7-9827-09cf-4ff8cf9a5129}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
AppxPackageFullName
|
||
\REGISTRY\A\{13d32804-6ec7-9827-09cf-4ff8cf9a5129}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{13d32804-6ec7-9827-09cf-4ff8cf9a5129}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
Size
|
||
\REGISTRY\A\{13d32804-6ec7-9827-09cf-4ff8cf9a5129}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
Language
|
||
\REGISTRY\A\{13d32804-6ec7-9827-09cf-4ff8cf9a5129}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018000DDABBE6B3
|
There are 13 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2DF0000
|
direct allocation
|
page read and write
|
||
2FA5000
|
unclassified section
|
page readonly
|
||
940000
|
direct allocation
|
page execute and read and write
|
||
5D0000
|
heap
|
page read and write
|
||
E00000
|
unkown
|
page readonly
|
||
564000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A080000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A24000
|
heap
|
page read and write
|
||
A097000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
2DE2000
|
stack
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
9C0E000
|
stack
|
page read and write
|
||
2CEF000
|
stack
|
page read and write
|
||
A074000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
3026000
|
unclassified section
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A43E000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
A1A4000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
9D8D000
|
stack
|
page read and write
|
||
A3FE000
|
heap
|
page read and write
|
||
A64000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
A0AB000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A3D0000
|
heap
|
page read and write
|
||
A130000
|
heap
|
page read and write
|
||
2DEB000
|
stack
|
page read and write
|
||
10CD000
|
unkown
|
page readonly
|
||
580000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A3CD000
|
stack
|
page read and write
|
||
8FC000
|
stack
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
1263000
|
unkown
|
page readonly
|
||
E00000
|
unkown
|
page readonly
|
||
11EC000
|
unkown
|
page write copy
|
||
564000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
3051000
|
unclassified section
|
page read and write
|
||
2F81000
|
unclassified section
|
page execute read
|
||
A057000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
9B0C000
|
stack
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
11F5000
|
unkown
|
page write copy
|
||
A2CD000
|
stack
|
page read and write
|
||
9EE0000
|
remote allocation
|
page read and write
|
||
30AD000
|
unclassified section
|
page read and write
|
||
A19C000
|
heap
|
page read and write
|
||
2BDC000
|
stack
|
page read and write
|
||
976000
|
direct allocation
|
page execute and read and write
|
||
564000
|
heap
|
page read and write
|
||
A14C000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
1263000
|
unkown
|
page readonly
|
||
564000
|
heap
|
page read and write
|
||
305D000
|
unclassified section
|
page read and write
|
||
9A8000
|
heap
|
page read and write
|
||
2FAE000
|
unclassified section
|
page write copy
|
||
11F5000
|
unkown
|
page write copy
|
||
564000
|
heap
|
page read and write
|
||
1262000
|
unkown
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
1344000
|
unkown
|
page readonly
|
||
2A61000
|
heap
|
page read and write
|
||
9A0E000
|
stack
|
page read and write
|
||
A15D000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A70D000
|
stack
|
page read and write
|
||
11EC000
|
unkown
|
page read and write
|
||
2A5F000
|
stack
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
A94E000
|
stack
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A0EB000
|
heap
|
page read and write
|
||
9EE0000
|
remote allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
2DED000
|
stack
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
2A66000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
A1AD000
|
heap
|
page read and write
|
||
A060000
|
heap
|
page read and write
|
||
A031000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A06D000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
2BE7000
|
heap
|
page read and write
|
||
A076000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A710000
|
trusted library allocation
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
A080000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
3148000
|
unclassified section
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
2FB0000
|
unclassified section
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
E01000
|
unkown
|
page execute read
|
||
A085000
|
heap
|
page read and write
|
||
A0AB000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
A3D1000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A080000
|
heap
|
page read and write
|
||
A031000
|
heap
|
page read and write
|
||
A084000
|
heap
|
page read and write
|
||
A080000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A065000
|
heap
|
page read and write
|
||
A030000
|
heap
|
page read and write
|
||
A9E000
|
heap
|
page read and write
|
||
A60C000
|
stack
|
page read and write
|
||
30B9000
|
unclassified section
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
3029000
|
unclassified section
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A07D000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A3FD000
|
heap
|
page read and write
|
||
A09A000
|
heap
|
page read and write
|
||
A06D000
|
heap
|
page read and write
|
||
9E8E000
|
stack
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
2F2D000
|
stack
|
page read and write
|
||
A452000
|
heap
|
page read and write
|
||
11ED000
|
unkown
|
page write copy
|
||
2A61000
|
heap
|
page read and write
|
||
C6F000
|
stack
|
page read and write
|
||
50C000
|
stack
|
page read and write
|
||
2FB9000
|
unclassified section
|
page read and write
|
||
A195000
|
heap
|
page read and write
|
||
A0F000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
3082000
|
unclassified section
|
page read and write
|
||
1344000
|
unkown
|
page readonly
|
||
2A61000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A8D000
|
heap
|
page read and write
|
||
A0D8000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A08F000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A16D000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
A140000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A65000
|
heap
|
page read and write
|
||
31D0000
|
unclassified section
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
9C4E000
|
stack
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
3031000
|
unclassified section
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
A410000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
A085000
|
heap
|
page read and write
|
||
10CD000
|
unkown
|
page readonly
|
||
564000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
9EE0000
|
remote allocation
|
page read and write
|
||
2FBF000
|
unclassified section
|
page read and write
|
||
31C3000
|
unclassified section
|
page readonly
|
||
A08F000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
1206000
|
unkown
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
E01000
|
unkown
|
page execute read
|
||
9D4F000
|
stack
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
31C1000
|
unclassified section
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
A199000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
9F1E000
|
stack
|
page read and write
|
||
A27000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
A197000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A840000
|
heap
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A74E000
|
stack
|
page read and write
|
||
A088000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
2FC5000
|
unclassified section
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A18F000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
308E000
|
unclassified section
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
A080000
|
heap
|
page read and write
|
||
A01F000
|
stack
|
page read and write
|
||
A065000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
2B60000
|
trusted library allocation
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
There are 227 hidden memdumps, click here to show them.