Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_f474d7ace939a34cc5b3cdfa86976697e4a181ee_ce8703b6_e31620dd-330d-450a-b53a-41b59fb426cf\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER300C.tmp.dmp
|
Mini DuMP crash report, 15 streams, Wed Aug 28 16:57:33 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3126.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3146.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 1212 -s 876
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
|
unknown
|
||
https://aka.ms/dotnet-warnings/
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{12dc126a-23af-a25c-dd5e-71120ab4706d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
ProgramId
|
||
\REGISTRY\A\{12dc126a-23af-a25c-dd5e-71120ab4706d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
FileId
|
||
\REGISTRY\A\{12dc126a-23af-a25c-dd5e-71120ab4706d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
LowerCaseLongPath
|
||
\REGISTRY\A\{12dc126a-23af-a25c-dd5e-71120ab4706d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
LongPathHash
|
||
\REGISTRY\A\{12dc126a-23af-a25c-dd5e-71120ab4706d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
Name
|
||
\REGISTRY\A\{12dc126a-23af-a25c-dd5e-71120ab4706d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
OriginalFileName
|
||
\REGISTRY\A\{12dc126a-23af-a25c-dd5e-71120ab4706d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
Publisher
|
||
\REGISTRY\A\{12dc126a-23af-a25c-dd5e-71120ab4706d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
Version
|
||
\REGISTRY\A\{12dc126a-23af-a25c-dd5e-71120ab4706d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
BinFileVersion
|
||
\REGISTRY\A\{12dc126a-23af-a25c-dd5e-71120ab4706d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
BinaryType
|
||
\REGISTRY\A\{12dc126a-23af-a25c-dd5e-71120ab4706d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
ProductName
|
||
\REGISTRY\A\{12dc126a-23af-a25c-dd5e-71120ab4706d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
ProductVersion
|
||
\REGISTRY\A\{12dc126a-23af-a25c-dd5e-71120ab4706d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
LinkDate
|
||
\REGISTRY\A\{12dc126a-23af-a25c-dd5e-71120ab4706d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
BinProductVersion
|
||
\REGISTRY\A\{12dc126a-23af-a25c-dd5e-71120ab4706d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
AppxPackageFullName
|
||
\REGISTRY\A\{12dc126a-23af-a25c-dd5e-71120ab4706d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{12dc126a-23af-a25c-dd5e-71120ab4706d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
Size
|
||
\REGISTRY\A\{12dc126a-23af-a25c-dd5e-71120ab4706d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
Language
|
||
\REGISTRY\A\{12dc126a-23af-a25c-dd5e-71120ab4706d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018000DDABBE6B3
|
There are 13 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1CEF000
|
stack
|
page read and write
|
||
3597000
|
trusted library allocation
|
page read and write
|
||
19A5000
|
heap
|
page read and write
|
||
19F2000
|
heap
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
19E4000
|
heap
|
page read and write
|
||
1B70000
|
trusted library allocation
|
page read and write
|
||
1978000
|
heap
|
page read and write
|
||
13FB000
|
stack
|
page read and write
|
||
35A0000
|
trusted library allocation
|
page read and write
|
||
35AB000
|
trusted library allocation
|
page read and write
|
||
3580000
|
trusted library allocation
|
page execute and read and write
|
||
1A0C000
|
heap
|
page read and write
|
||
193A000
|
trusted library allocation
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
197E000
|
heap
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
359C000
|
trusted library allocation
|
page read and write
|
||
1BE0000
|
heap
|
page read and write
|
||
3591000
|
trusted library allocation
|
page read and write
|
||
1BBE000
|
stack
|
page read and write
|
||
3660000
|
heap
|
page read and write
|
||
58EE000
|
stack
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
12EC000
|
unkown
|
page readonly
|
||
638E000
|
stack
|
page read and write
|
||
35B0000
|
trusted library allocation
|
page read and write
|
||
618E000
|
stack
|
page read and write
|
||
1934000
|
trusted library allocation
|
page read and write
|
||
192D000
|
trusted library allocation
|
page execute and read and write
|
||
F00000
|
unkown
|
page readonly
|
||
35D0000
|
trusted library allocation
|
page read and write
|
||
5F90000
|
heap
|
page read and write
|
||
3650000
|
heap
|
page read and write
|
||
18FE000
|
stack
|
page read and write
|
||
19B4000
|
heap
|
page read and write
|
||
F02000
|
unkown
|
page readonly
|
||
188D000
|
stack
|
page read and write
|
||
5CAE000
|
stack
|
page read and write
|
||
1BC0000
|
heap
|
page read and write
|
||
1840000
|
heap
|
page read and write
|
||
47F1000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
unkown
|
page readonly
|
||
1957000
|
trusted library allocation
|
page execute and read and write
|
||
1936000
|
trusted library allocation
|
page read and write
|
||
47F5000
|
trusted library allocation
|
page read and write
|
||
1923000
|
trusted library allocation
|
page execute and read and write
|
||
628F000
|
stack
|
page read and write
|
||
195B000
|
trusted library allocation
|
page execute and read and write
|
||
5C6E000
|
stack
|
page read and write
|
||
5F80000
|
heap
|
page execute and read and write
|
||
1924000
|
trusted library allocation
|
page read and write
|
||
1910000
|
trusted library allocation
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page execute and read and write
|
||
1DD0000
|
heap
|
page read and write
|
||
1DCE000
|
stack
|
page read and write
|
||
1970000
|
heap
|
page read and write
|
||
1950000
|
trusted library allocation
|
page read and write
|
||
5D80000
|
heap
|
page read and write
|
||
37F1000
|
trusted library allocation
|
page read and write
|
||
199C000
|
heap
|
page read and write
|
||
16F8000
|
stack
|
page read and write
|
||
18B5000
|
heap
|
page read and write
|
||
366A000
|
heap
|
page read and write
|
||
1B6F000
|
stack
|
page read and write
|
||
35C0000
|
trusted library allocation
|
page read and write
|
||
37E0000
|
heap
|
page execute and read and write
|
There are 58 hidden memdumps, click here to show them.