Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
BDQfYL99b2.exe
|
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_BDQfYL99b2.exe_7bbe5769bc74a17327a538bebd597bc1fc5fff7_5d7df1a8_a3bb7f14-0094-4484-b8c1-c1187a5af28d\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4E1.tmp.dmp
|
Mini DuMP crash report, 16 streams, Wed Jul 3 16:23:49 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER697.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6C7.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\json[1].json
|
JSON data
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\BDQfYL99b2.exe
|
"C:\Users\user\Desktop\BDQfYL99b2.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 1596 -s 1064
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bossnacarpet.com
|
|||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
http://geoplugin.net/json.gpal
|
unknown
|
||
http://geoplugin.net/json.gpc
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://geoplugin.net/json.gpG
|
unknown
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
http://geoplugin.net/json.gpl
|
unknown
|
||
http://geoplugin.net/json.gpr&
|
unknown
|
||
http://geoplugin.net/json.gpr2
|
unknown
|
||
http://geoplugin.net/json.gp/
|
unknown
|
||
http://geoplugin.net/json.gp.
|
unknown
|
There are 2 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
vegetachcnc.com
|
107.173.4.18
|
||
bossnacarpet.com
|
173.255.204.62
|
||
geoplugin.net
|
178.237.33.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
173.255.204.62
|
bossnacarpet.com
|
United States
|
||
107.173.4.18
|
vegetachcnc.com
|
United States
|
||
52.168.117.173
|
unknown
|
United States
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\chrome-6W1HCC
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\chrome-6W1HCC
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\chrome-6W1HCC
|
time
|
||
\REGISTRY\A\{b2f26673-e56f-e8e4-e632-faa0f22dfcd0}\Root\InventoryApplicationFile\bdqfyl99b2.exe|b039b1e7354bfdd2
|
ProgramId
|
||
\REGISTRY\A\{b2f26673-e56f-e8e4-e632-faa0f22dfcd0}\Root\InventoryApplicationFile\bdqfyl99b2.exe|b039b1e7354bfdd2
|
FileId
|
||
\REGISTRY\A\{b2f26673-e56f-e8e4-e632-faa0f22dfcd0}\Root\InventoryApplicationFile\bdqfyl99b2.exe|b039b1e7354bfdd2
|
LowerCaseLongPath
|
||
\REGISTRY\A\{b2f26673-e56f-e8e4-e632-faa0f22dfcd0}\Root\InventoryApplicationFile\bdqfyl99b2.exe|b039b1e7354bfdd2
|
LongPathHash
|
||
\REGISTRY\A\{b2f26673-e56f-e8e4-e632-faa0f22dfcd0}\Root\InventoryApplicationFile\bdqfyl99b2.exe|b039b1e7354bfdd2
|
Name
|
||
\REGISTRY\A\{b2f26673-e56f-e8e4-e632-faa0f22dfcd0}\Root\InventoryApplicationFile\bdqfyl99b2.exe|b039b1e7354bfdd2
|
OriginalFileName
|
||
\REGISTRY\A\{b2f26673-e56f-e8e4-e632-faa0f22dfcd0}\Root\InventoryApplicationFile\bdqfyl99b2.exe|b039b1e7354bfdd2
|
Publisher
|
||
\REGISTRY\A\{b2f26673-e56f-e8e4-e632-faa0f22dfcd0}\Root\InventoryApplicationFile\bdqfyl99b2.exe|b039b1e7354bfdd2
|
Version
|
||
\REGISTRY\A\{b2f26673-e56f-e8e4-e632-faa0f22dfcd0}\Root\InventoryApplicationFile\bdqfyl99b2.exe|b039b1e7354bfdd2
|
BinFileVersion
|
||
\REGISTRY\A\{b2f26673-e56f-e8e4-e632-faa0f22dfcd0}\Root\InventoryApplicationFile\bdqfyl99b2.exe|b039b1e7354bfdd2
|
BinaryType
|
||
\REGISTRY\A\{b2f26673-e56f-e8e4-e632-faa0f22dfcd0}\Root\InventoryApplicationFile\bdqfyl99b2.exe|b039b1e7354bfdd2
|
ProductName
|
||
\REGISTRY\A\{b2f26673-e56f-e8e4-e632-faa0f22dfcd0}\Root\InventoryApplicationFile\bdqfyl99b2.exe|b039b1e7354bfdd2
|
ProductVersion
|
||
\REGISTRY\A\{b2f26673-e56f-e8e4-e632-faa0f22dfcd0}\Root\InventoryApplicationFile\bdqfyl99b2.exe|b039b1e7354bfdd2
|
LinkDate
|
||
\REGISTRY\A\{b2f26673-e56f-e8e4-e632-faa0f22dfcd0}\Root\InventoryApplicationFile\bdqfyl99b2.exe|b039b1e7354bfdd2
|
BinProductVersion
|
||
\REGISTRY\A\{b2f26673-e56f-e8e4-e632-faa0f22dfcd0}\Root\InventoryApplicationFile\bdqfyl99b2.exe|b039b1e7354bfdd2
|
AppxPackageFullName
|
||
\REGISTRY\A\{b2f26673-e56f-e8e4-e632-faa0f22dfcd0}\Root\InventoryApplicationFile\bdqfyl99b2.exe|b039b1e7354bfdd2
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{b2f26673-e56f-e8e4-e632-faa0f22dfcd0}\Root\InventoryApplicationFile\bdqfyl99b2.exe|b039b1e7354bfdd2
|
Size
|
||
\REGISTRY\A\{b2f26673-e56f-e8e4-e632-faa0f22dfcd0}\Root\InventoryApplicationFile\bdqfyl99b2.exe|b039b1e7354bfdd2
|
Language
|
||
\REGISTRY\A\{b2f26673-e56f-e8e4-e632-faa0f22dfcd0}\Root\InventoryApplicationFile\bdqfyl99b2.exe|b039b1e7354bfdd2
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018000DDABBE6B3
|
There are 16 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
205CD11F000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4EA8000
|
heap
|
page read and write
|
||
205BCE10000
|
trusted library allocation
|
page read and write
|
||
7FFD345E3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34786000
|
trusted library allocation
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page read and write
|
||
205BB1EC000
|
unkown
|
page readonly
|
||
205BB41F000
|
heap
|
page read and write
|
||
6A20000
|
heap
|
page read and write
|
||
7FFD34600000
|
trusted library allocation
|
page read and write
|
||
4F1E000
|
heap
|
page read and write
|
||
205BCDD1000
|
trusted library allocation
|
page read and write
|
||
205CCDD1000
|
trusted library allocation
|
page read and write
|
||
205BB530000
|
trusted library allocation
|
page read and write
|
||
205BB533000
|
trusted library allocation
|
page read and write
|
||
4DB5000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD345F8000
|
trusted library allocation
|
page read and write
|
||
4F07000
|
heap
|
page read and write
|
||
4F1E000
|
heap
|
page read and write
|
||
205BB39B000
|
heap
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
205CCDE1000
|
trusted library allocation
|
page read and write
|
||
519F000
|
stack
|
page read and write
|
||
7A69CFE000
|
stack
|
page read and write
|
||
205D55A0000
|
trusted library section
|
page read and write
|
||
205BB1E2000
|
unkown
|
page readonly
|
||
7FF412510000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3463C000
|
trusted library allocation
|
page execute and read and write
|
||
205BB280000
|
heap
|
page read and write
|
||
205CCDD8000
|
trusted library allocation
|
page read and write
|
||
4F16000
|
heap
|
page read and write
|
||
205BB510000
|
trusted library allocation
|
page read and write
|
||
7FFD345E2000
|
trusted library allocation
|
page read and write
|
||
7FFD345F0000
|
trusted library allocation
|
page read and write
|
||
7FFD3479C000
|
trusted library allocation
|
page read and write
|
||
4EA0000
|
heap
|
page read and write
|
||
7FFD3469C000
|
trusted library allocation
|
page execute and read and write
|
||
205D5670000
|
heap
|
page read and write
|
||
205BCE41000
|
trusted library allocation
|
page read and write
|
||
205BB580000
|
heap
|
page execute and read and write
|
||
7FFD347D2000
|
trusted library allocation
|
page read and write
|
||
4C60000
|
heap
|
page read and write
|
||
752F000
|
stack
|
page read and write
|
||
205D4E00000
|
trusted library allocation
|
page read and write
|
||
205BB1E0000
|
unkown
|
page readonly
|
||
7FFD345E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34696000
|
trusted library allocation
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
205BD184000
|
trusted library allocation
|
page read and write
|
||
7FFD347D9000
|
trusted library allocation
|
page read and write
|
||
205BB520000
|
heap
|
page read and write
|
||
205BB2C5000
|
heap
|
page read and write
|
||
7A69AFE000
|
stack
|
page read and write
|
||
48FC000
|
stack
|
page read and write
|
||
7FFD345FD000
|
trusted library allocation
|
page execute and read and write
|
||
205D56B2000
|
heap
|
page read and write
|
||
205BB2D0000
|
heap
|
page read and write
|
||
205BCE9D000
|
trusted library allocation
|
page read and write
|
||
7FFD345ED000
|
trusted library allocation
|
page execute and read and write
|
||
7A6A1FE000
|
stack
|
page read and write
|
||
205BB529000
|
heap
|
page read and write
|
||
7FFD346A0000
|
trusted library allocation
|
page execute and read and write
|
||
205BB42C000
|
heap
|
page read and write
|
||
742E000
|
stack
|
page read and write
|
||
4EE6000
|
heap
|
page read and write
|
||
4EF0000
|
heap
|
page read and write
|
||
205BB625000
|
heap
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page execute and read and write
|
||
205BB370000
|
heap
|
page read and write
|
||
205BB39D000
|
heap
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
4F14000
|
heap
|
page read and write
|
||
205BB35B000
|
heap
|
page read and write
|
||
7A698F2000
|
stack
|
page read and write
|
||
205CCDDD000
|
trusted library allocation
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
7A699FE000
|
stack
|
page read and write
|
||
6B2F000
|
stack
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
205BB620000
|
heap
|
page read and write
|
||
7A69EFF000
|
stack
|
page read and write
|
||
7A69FFE000
|
stack
|
page read and write
|
||
49FB000
|
stack
|
page read and write
|
||
205BCDF6000
|
trusted library allocation
|
page read and write
|
||
478000
|
remote allocation
|
page execute and read and write
|
||
7FFD34796000
|
trusted library allocation
|
page read and write
|
||
205CD6C2000
|
trusted library allocation
|
page read and write
|
||
205D5ADD000
|
trusted library section
|
page read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
6C2F000
|
stack
|
page read and write
|
||
4F07000
|
heap
|
page read and write
|
||
4F1E000
|
heap
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
heap
|
page readonly
|
||
205BB372000
|
heap
|
page read and write
|
||
205BB33C000
|
heap
|
page read and write
|
||
205D5790000
|
heap
|
page execute and read and write
|
||
7FFD34604000
|
trusted library allocation
|
page read and write
|
||
205BB560000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
7FFD3460D000
|
trusted library allocation
|
page execute and read and write
|
||
4E9E000
|
stack
|
page read and write
|
||
205BB2A0000
|
heap
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page execute and read and write
|
||
4EE6000
|
heap
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
205BB330000
|
heap
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
205BB2C0000
|
heap
|
page read and write
|
||
7A69DFC000
|
stack
|
page read and write
|
||
7FFD3460B000
|
trusted library allocation
|
page execute and read and write
|
||
4E3D000
|
stack
|
page read and write
|
||
7FFD346C6000
|
trusted library allocation
|
page execute and read and write
|
||
205D57A0000
|
trusted library section
|
page read and write
|
||
7A69BFF000
|
stack
|
page read and write
|
||
7A6A0FE000
|
stack
|
page read and write
|
||
205BB41D000
|
heap
|
page read and write
|
||
205BB270000
|
heap
|
page read and write
|
||
4ED7000
|
heap
|
page read and write
|
||
7FFD345E4000
|
trusted library allocation
|
page read and write
|
||
205BB320000
|
trusted library allocation
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
7FFD345F2000
|
trusted library allocation
|
page read and write
|
There are 116 hidden memdumps, click here to show them.