Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
2vPsGmF7E2.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_2vPsGmF7E2.exe_ebe7824e783d8dd956eebe3f8ae6df8cc8696_c718f7ac_f305f120-9219-4b40-a255-f29053f1022f\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD106.tmp.dmp
|
Mini DuMP crash report, 16 streams, Thu Oct 31 19:13:17 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD29D.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD30C.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\2vPsGmF7E2.exe
|
"C:\Users\user\Desktop\2vPsGmF7E2.exe"
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 5736 -s 1652
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
completed-rally.gl.at.ply.gg
|
|||
http://upx.sf.net
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://rentry.co/8wum7vax/raw
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://ip-api.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASMANCS
|
FileDirectory
|
||
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
|
ProgramId
|
||
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
|
FileId
|
||
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
|
LowerCaseLongPath
|
||
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
|
LongPathHash
|
||
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
|
Name
|
||
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
|
OriginalFileName
|
||
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
|
Publisher
|
||
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
|
Version
|
||
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
|
BinFileVersion
|
||
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
|
BinaryType
|
||
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
|
ProductName
|
||
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
|
ProductVersion
|
||
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
|
LinkDate
|
||
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
|
BinProductVersion
|
||
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
|
AppxPackageFullName
|
||
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
|
Size
|
||
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
|
Language
|
||
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
|
Usn
|
There are 23 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7D2000
|
unkown
|
page readonly
|
||
2BAC000
|
trusted library allocation
|
page read and write
|
||
7FFAACCE0000
|
trusted library allocation
|
page execute and read and write
|
||
E40000
|
heap
|
page execute and read and write
|
||
11F5000
|
heap
|
page read and write
|
||
DDD000
|
heap
|
page read and write
|
||
7D0000
|
unkown
|
page readonly
|
||
7FF4F8C50000
|
trusted library allocation
|
page execute and read and write
|
||
CE0000
|
trusted library allocation
|
page read and write
|
||
7FFAACCA6000
|
trusted library allocation
|
page execute and read and write
|
||
ED5000
|
heap
|
page read and write
|
||
7FFAACD62000
|
trusted library allocation
|
page read and write
|
||
7FFAACBC4000
|
trusted library allocation
|
page read and write
|
||
1BDAE000
|
stack
|
page read and write
|
||
7FFB167B0000
|
unkown
|
page read and write
|
||
11DE000
|
stack
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
2C39000
|
trusted library allocation
|
page read and write
|
||
DC3000
|
heap
|
page read and write
|
||
D42000
|
heap
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page read and write
|
||
1B66E000
|
stack
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
2C62000
|
trusted library allocation
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
7FFAACBE0000
|
trusted library allocation
|
page read and write
|
||
1B96B000
|
stack
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
2C3F000
|
trusted library allocation
|
page read and write
|
||
12BA8000
|
trusted library allocation
|
page read and write
|
||
D45000
|
heap
|
page read and write
|
||
7FFAACC70000
|
trusted library allocation
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
7FFAACBDD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB16790000
|
unkown
|
page readonly
|
||
1B12D000
|
stack
|
page read and write
|
||
7FFAACC1C000
|
trusted library allocation
|
page execute and read and write
|
||
2C49000
|
trusted library allocation
|
page read and write
|
||
2C46000
|
trusted library allocation
|
page read and write
|
||
B31000
|
stack
|
page read and write
|
||
7FFAACC7C000
|
trusted library allocation
|
page execute and read and write
|
||
2BC8000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
unkown
|
page readonly
|
||
ED0000
|
heap
|
page read and write
|
||
7FFAACBEB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
1B9C4000
|
heap
|
page read and write
|
||
7FFAACBED000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB167A6000
|
unkown
|
page readonly
|
||
7FFAACBCD000
|
trusted library allocation
|
page execute and read and write
|
||
1B56A000
|
stack
|
page read and write
|
||
7FFAACD70000
|
trusted library allocation
|
page execute and read and write
|
||
1B973000
|
heap
|
page read and write
|
||
D6F000
|
heap
|
page read and write
|
||
7FFB167B5000
|
unkown
|
page readonly
|
||
7FFAACC80000
|
trusted library allocation
|
page execute and read and write
|
||
C70000
|
heap
|
page read and write
|
||
7FFAACBC3000
|
trusted library allocation
|
page execute and read and write
|
||
2C42000
|
trusted library allocation
|
page read and write
|
||
7FFAACBD3000
|
trusted library allocation
|
page read and write
|
||
2C58000
|
trusted library allocation
|
page read and write
|
||
1B76E000
|
stack
|
page read and write
|
||
FDE000
|
stack
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
2C3C000
|
trusted library allocation
|
page read and write
|
||
7FFB167B2000
|
unkown
|
page readonly
|
||
1B86E000
|
stack
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
D0C000
|
heap
|
page read and write
|
||
D33000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
7FFB16791000
|
unkown
|
page execute read
|
||
10DE000
|
stack
|
page read and write
|
||
E23000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
1B970000
|
heap
|
page read and write
|
||
DFE000
|
heap
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
2BA1000
|
trusted library allocation
|
page read and write
|
||
1BEAE000
|
stack
|
page read and write
|
||
D2C000
|
heap
|
page read and write
|
||
12BA1000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
1BCAE000
|
stack
|
page read and write
|
||
1BFAD000
|
stack
|
page read and write
|
||
EC0000
|
heap
|
page execute and read and write
|
There are 79 hidden memdumps, click here to show them.