Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
GK059kPZ5B.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\ScreenUpdateSync[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\A865.tmp.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_A865.tmp.exe_6678317c8ae3237abe1e8f11d1632889f7f0bb9a_61c74afe_fc656f38-0a7f-4be7-885a-070ddb1037fe\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA9BD.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sat Oct 26 17:08:42 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAAB8.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAAF8.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\GK059kPZ5B.exe
|
"C:\Users\user\Desktop\GK059kPZ5B.exe"
|
||
C:\Users\user\AppData\Local\Temp\A865.tmp.exe
|
"C:\Users\user\AppData\Local\Temp\A865.tmp.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 1324
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://62.204.41.177/edd20096ecef326d.php
|
62.204.41.177
|
||
http://62.204.41.177/
|
62.204.41.177
|
||
http://62.204.41.177
|
unknown
|
||
https://post-to-me.com/track_prt.php?sub=&cc=DE
|
unknown
|
||
http://62.204.41.177/edd20096ecef326d.phpN
|
unknown
|
||
https://post-to-me.com/track_prt.php?sub=
|
unknown
|
||
http://176.113.115.37/ScreenUpdateSync.exeDT
|
unknown
|
||
https://post-to-me.com/track_prt.php?sub=0&cc=DE
|
172.67.179.207
|
||
http://62.204.41.177/6
|
unknown
|
||
http://176.113.115.37/ScreenUpdateSync.exe)a
|
unknown
|
||
http://176.113.115.37/ScreenUpdateSync.exe48rt8k8rt4rwe5rbSOFTWARE
|
unknown
|
||
https://post-to-me.com/
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://62.204.41.177i
|
unknown
|
||
http://62.204.41.177/edd20096ecef326d.phpZ
|
unknown
|
||
http://62.204.41.177/edd20096ecef326d.php$
|
unknown
|
||
http://176.113.115.37/ScreenUpdateSync.exe
|
unknown
|
||
http://62.204.41.177/edd20096ecef326d.phpf
|
unknown
|
||
https://post-to-me.com/track_prt.php?sub=0&cc=DEe
|
unknown
|
||
https://post-to-me.com/=
|
unknown
|
There are 10 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
post-to-me.com
|
172.67.179.207
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
62.204.41.177
|
unknown
|
United Kingdom
|
||
176.113.115.37
|
unknown
|
Russian Federation
|
||
172.67.179.207
|
post-to-me.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\prtscreen
|
Enabled
|
||
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
|
ProgramId
|
||
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
|
FileId
|
||
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
|
LowerCaseLongPath
|
||
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
|
LongPathHash
|
||
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
|
Name
|
||
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
|
OriginalFileName
|
||
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
|
Publisher
|
||
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
|
Version
|
||
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
|
BinFileVersion
|
||
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
|
BinaryType
|
||
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
|
ProductName
|
||
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
|
ProductVersion
|
||
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
|
LinkDate
|
||
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
|
BinProductVersion
|
||
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
|
AppxPackageFullName
|
||
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
|
Size
|
||
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
|
Language
|
||
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
|
Usn
|
There are 10 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2320000
|
direct allocation
|
page read and write
|
||
873000
|
heap
|
page read and write
|
||
22D0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
AFE000
|
stack
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
1AAFD000
|
stack
|
page read and write
|
||
34A7000
|
heap
|
page read and write
|
||
28BE000
|
stack
|
page read and write
|
||
707000
|
heap
|
page read and write
|
||
942000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
85E000
|
heap
|
page read and write
|
||
849000
|
heap
|
page execute and read and write
|
||
1AB6E000
|
stack
|
page read and write
|
||
40E000
|
unkown
|
page execute read
|
||
34C1000
|
heap
|
page read and write
|
||
66E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3980000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
4B1000
|
unkown
|
page execute and read and write
|
||
44C000
|
unkown
|
page readonly
|
||
620000
|
heap
|
page read and write
|
||
8A6000
|
heap
|
page read and write
|
||
34A8000
|
heap
|
page read and write
|
||
1A61E000
|
stack
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
90F000
|
heap
|
page read and write
|
||
65C000
|
unkown
|
page execute and read and write
|
||
2F00000
|
remote allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
43C000
|
unkown
|
page readonly
|
||
2500000
|
heap
|
page read and write
|
||
869000
|
heap
|
page execute and read and write
|
||
1A5DF000
|
stack
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
2F00000
|
remote allocation
|
page read and write
|
||
32CF000
|
stack
|
page read and write
|
||
31CC000
|
stack
|
page read and write
|
||
83A000
|
heap
|
page read and write
|
||
52F000
|
unkown
|
page readonly
|
||
1F0000
|
heap
|
page read and write
|
||
1A71F000
|
stack
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
83E000
|
heap
|
page read and write
|
||
287F000
|
stack
|
page read and write
|
||
29FE000
|
stack
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
911000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
795000
|
heap
|
page read and write
|
||
1A9BE000
|
stack
|
page read and write
|
||
44F000
|
unkown
|
page write copy
|
||
40E000
|
unkown
|
page execute read
|
||
B20000
|
heap
|
page read and write
|
||
B2F000
|
stack
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
A50000
|
direct allocation
|
page execute and read and write
|
||
8C6000
|
heap
|
page read and write
|
||
2F00000
|
remote allocation
|
page read and write
|
||
93F000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page write copy
|
||
1AC6F000
|
stack
|
page read and write
|
||
911000
|
heap
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
1A76E000
|
stack
|
page read and write
|
||
8DC000
|
heap
|
page read and write
|
||
911000
|
heap
|
page read and write
|
||
85A000
|
heap
|
page read and write
|
||
A2F000
|
stack
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
3499000
|
heap
|
page read and write
|
||
24EE000
|
stack
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
1A86F000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
740000
|
heap
|
page read and write
|
||
8F7000
|
heap
|
page read and write
|
||
29BF000
|
stack
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
195000
|
stack
|
page read and write
|
||
82F000
|
stack
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
51F000
|
unkown
|
page readonly
|
||
A4F000
|
stack
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
909000
|
heap
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
8AC000
|
heap
|
page read and write
|
||
348E000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
830000
|
heap
|
page read and write
|
||
4BD000
|
unkown
|
page execute and read and write
|
||
23AE000
|
stack
|
page read and write
|
||
52F000
|
unkown
|
page readonly
|
||
725000
|
heap
|
page read and write
|
||
1A8BE000
|
stack
|
page read and write
|
||
803000
|
heap
|
page read and write
|
||
4E2000
|
unkown
|
page execute and read and write
|
||
277F000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
AC0000
|
direct allocation
|
page read and write
|
||
24AF000
|
stack
|
page read and write
|
||
64A000
|
unkown
|
page execute and read and write
|
||
1A9FE000
|
stack
|
page read and write
|
There are 104 hidden memdumps, click here to show them.