Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
4M3JIACIWk.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_4M3JIACIWk.exe_42abe2dd17d2b9ef6341786752f88f99cca66ab_4786b708_13c8a5b3-1761-4a90-bdd2-1bca33a5700f\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER869A.tmp.dmp
|
Mini DuMP crash report, 14 streams, Wed Oct 23 13:42:03 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8870.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER88AF.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\4M3JIACIWk.exe
|
"C:\Users\user\Desktop\4M3JIACIWk.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 1044
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.201.252.118/
|
185.201.252.118
|
||
http://185.201.252.118/ef952bc0f542da4b.php
|
185.201.252.118
|
||
http://185.201.252.118
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://185.201.252.118/ws
|
unknown
|
||
http://185.201.252.118/ef952bc0f542da4b.phpW
|
unknown
|
||
http://185.201.252.118/4
|
unknown
|
||
http://185.201.252.118/ef952bc0f542da4b.phpWindows
|
unknown
|
||
http://185.201.252.118/ef952bc0f542da4b.php3
|
unknown
|
||
http://185.201.252.118/Y
|
unknown
|
||
http://185.201.252.118/ef952bc0f542da4b.php&zV
|
unknown
|
||
http://185.201.252.118/ef952bc0f542da4b.php/
|
unknown
|
There are 2 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.201.252.118
|
unknown
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
|
ProgramId
|
||
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
|
FileId
|
||
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
|
LowerCaseLongPath
|
||
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
|
LongPathHash
|
||
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
|
Name
|
||
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
|
OriginalFileName
|
||
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
|
Publisher
|
||
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
|
Version
|
||
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
|
BinFileVersion
|
||
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
|
BinaryType
|
||
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
|
ProductName
|
||
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
|
ProductVersion
|
||
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
|
LinkDate
|
||
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
|
BinProductVersion
|
||
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
|
AppxPackageFullName
|
||
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
|
Size
|
||
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
|
Language
|
||
\REGISTRY\A\{45fb966e-599b-5480-0a33-40d269fcb140}\Root\InventoryApplicationFile\4m3jiaciwk.exe|8a12d8dfbeee3b40
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2480000
|
direct allocation
|
page read and write
|
||
23E0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
7C8000
|
heap
|
page read and write
|
||
438000
|
unkown
|
page readonly
|
||
1ACAE000
|
stack
|
page read and write
|
||
79E000
|
heap
|
page execute and read and write
|
||
40E000
|
unkown
|
page execute read
|
||
9BF000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
64A000
|
unkown
|
page execute and read and write
|
||
780000
|
heap
|
page read and write
|
||
765000
|
heap
|
page read and write
|
||
51B000
|
unkown
|
page readonly
|
||
2450000
|
heap
|
page read and write
|
||
1A66F000
|
stack
|
page read and write
|
||
1ADAE000
|
stack
|
page read and write
|
||
AFF000
|
stack
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
1A8AE000
|
stack
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
252E000
|
stack
|
page read and write
|
||
817000
|
heap
|
page read and write
|
||
195000
|
stack
|
page read and write
|
||
65C000
|
unkown
|
page execute and read and write
|
||
760000
|
heap
|
page read and write
|
||
2490000
|
heap
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
801000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
2470000
|
heap
|
page read and write
|
||
4B1000
|
unkown
|
page execute and read and write
|
||
4E2000
|
unkown
|
page execute and read and write
|
||
256E000
|
stack
|
page read and write
|
||
1A9FE000
|
stack
|
page read and write
|
||
1AC4D000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1A76F000
|
stack
|
page read and write
|
||
1AAFE000
|
stack
|
page read and write
|
||
1A86F000
|
stack
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
7FA000
|
heap
|
page read and write
|
||
1AB4E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2473000
|
heap
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
4BD000
|
unkown
|
page execute and read and write
|
||
24EE000
|
stack
|
page read and write
|
||
78A000
|
heap
|
page read and write
|
||
C3F000
|
stack
|
page read and write
|
||
78E000
|
heap
|
page read and write
|
||
43B000
|
unkown
|
page write copy
|
||
1A9AF000
|
stack
|
page read and write
|
There are 44 hidden memdumps, click here to show them.