Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
rPO_CW00402902400415.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rPO_CW0040290240_3337ff837319f9c3d7f3ada581f0997a8cb9321c_4b0452fd_c1c7692c-f1ab-48eb-a03e-dae1a522c1a4\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8D6B.tmp.dmp
|
Mini DuMP crash report, 16 streams, Wed Sep 25 11:46:59 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER93B5.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER93F4.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\rPO_CW00402902400415.exe
|
"C:\Users\user\Desktop\rPO_CW00402902400415.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 6860 -s 1040
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://mail.alhoneycomb.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.alhoneycomb.com
|
74.119.238.7
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
74.119.238.7
|
mail.alhoneycomb.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
|
ProgramId
|
||
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
|
FileId
|
||
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
|
LowerCaseLongPath
|
||
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
|
LongPathHash
|
||
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
|
Name
|
||
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
|
OriginalFileName
|
||
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
|
Publisher
|
||
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
|
Version
|
||
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
|
BinFileVersion
|
||
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
|
BinaryType
|
||
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
|
ProductName
|
||
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
|
ProductVersion
|
||
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
|
LinkDate
|
||
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
|
BinProductVersion
|
||
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
|
AppxPackageFullName
|
||
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
|
Size
|
||
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
|
Language
|
||
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2421000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
1930A253000
|
trusted library allocation
|
page read and write
|
||
19319F07000
|
trusted library allocation
|
page read and write
|
||
193226C0000
|
heap
|
page execute and read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
27BD000
|
trusted library allocation
|
page read and write
|
||
B9000
|
stack
|
page read and write
|
||
5742000
|
heap
|
page read and write
|
||
20F0000
|
heap
|
page read and write
|
||
21B8000
|
trusted library allocation
|
page read and write
|
||
2160000
|
trusted library allocation
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
440000
|
remote allocation
|
page execute and read and write
|
||
2065CFE000
|
stack
|
page read and write
|
||
C123000
|
heap
|
page read and write
|
||
19308360000
|
heap
|
page read and write
|
||
1931A0CD000
|
trusted library allocation
|
page read and write
|
||
7E40000
|
heap
|
page read and write
|
||
21AE000
|
stack
|
page read and write
|
||
7FFD9BB4A000
|
trusted library allocation
|
page read and write
|
||
2854000
|
trusted library allocation
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
2410000
|
heap
|
page execute and read and write
|
||
2697000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
3489000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
58C0000
|
trusted library allocation
|
page execute and read and write
|
||
250F000
|
trusted library allocation
|
page read and write
|
||
19308495000
|
heap
|
page read and write
|
||
2856000
|
trusted library allocation
|
page read and write
|
||
193083E9000
|
heap
|
page read and write
|
||
193084C0000
|
trusted library allocation
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
19309F48000
|
trusted library allocation
|
page read and write
|
||
2671000
|
trusted library allocation
|
page read and write
|
||
5870000
|
heap
|
page read and write
|
||
4E8000
|
heap
|
page read and write
|
||
2140000
|
trusted library allocation
|
page read and write
|
||
2130000
|
trusted library allocation
|
page read and write
|
||
55C000
|
heap
|
page read and write
|
||
58B3000
|
trusted library allocation
|
page read and write
|
||
20660FE000
|
stack
|
page read and write
|
||
2142000
|
trusted library allocation
|
page read and write
|
||
19308362000
|
heap
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
7FFD9BB44000
|
trusted library allocation
|
page read and write
|
||
4E66000
|
trusted library allocation
|
page read and write
|
||
25A5000
|
trusted library allocation
|
page read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
4860000
|
trusted library allocation
|
page read and write
|
||
193084F0000
|
trusted library allocation
|
page read and write
|
||
23B0000
|
trusted library allocation
|
page read and write
|
||
7FF484B80000
|
trusted library allocation
|
page execute and read and write
|
||
19308525000
|
heap
|
page read and write
|
||
3669000
|
trusted library allocation
|
page read and write
|
||
19308490000
|
heap
|
page read and write
|
||
34E9000
|
trusted library allocation
|
page read and write
|
||
2931000
|
trusted library allocation
|
page read and write
|
||
19322810000
|
heap
|
page read and write
|
||
374A000
|
trusted library allocation
|
page read and write
|
||
3609000
|
trusted library allocation
|
page read and write
|
||
228C000
|
stack
|
page read and write
|
||
19309F01000
|
trusted library allocation
|
page read and write
|
||
3569000
|
trusted library allocation
|
page read and write
|
||
2730000
|
trusted library allocation
|
page read and write
|
||
270C000
|
trusted library allocation
|
page read and write
|
||
1930834D000
|
heap
|
page read and write
|
||
5E4E000
|
stack
|
page read and write
|
||
1930838A000
|
heap
|
page read and write
|
||
27CC000
|
trusted library allocation
|
page read and write
|
||
5809000
|
heap
|
page read and write
|
||
23FD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9EC000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
373A000
|
trusted library allocation
|
page read and write
|
||
C0D0000
|
heap
|
page read and write
|
||
212D000
|
trusted library allocation
|
page execute and read and write
|
||
23F1000
|
trusted library allocation
|
page read and write
|
||
3689000
|
trusted library allocation
|
page read and write
|
||
2113000
|
trusted library allocation
|
page execute and read and write
|
||
35A9000
|
trusted library allocation
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
4C5E000
|
stack
|
page read and write
|
||
5DCC000
|
stack
|
page read and write
|
||
2145000
|
trusted library allocation
|
page execute and read and write
|
||
5AB000
|
heap
|
page read and write
|
||
19308343000
|
heap
|
page read and write
|
||
27A8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
57DC000
|
heap
|
page read and write
|
||
94A000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
50A000
|
heap
|
page read and write
|
||
59EE000
|
stack
|
page read and write
|
||
376A000
|
trusted library allocation
|
page read and write
|
||
514000
|
heap
|
page read and write
|
||
1930838C000
|
heap
|
page read and write
|
||
48D0000
|
heap
|
page read and write
|
||
7FFD9BA4C000
|
trusted library allocation
|
page execute and read and write
|
||
58D0000
|
trusted library allocation
|
page read and write
|
||
4CAC000
|
stack
|
page read and write
|
||
23E2000
|
trusted library allocation
|
page read and write
|
||
213A000
|
trusted library allocation
|
page execute and read and write
|
||
516000
|
heap
|
page read and write
|
||
36EA000
|
trusted library allocation
|
page read and write
|
||
27A6000
|
trusted library allocation
|
page read and write
|
||
3449000
|
trusted library allocation
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
372A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
26E0000
|
trusted library allocation
|
page read and write
|
||
19319F01000
|
trusted library allocation
|
page read and write
|
||
4A1C000
|
stack
|
page read and write
|
||
2065EFD000
|
stack
|
page read and write
|
||
193083FA000
|
heap
|
page read and write
|
||
7FFD9B9A2000
|
trusted library allocation
|
page read and write
|
||
282E000
|
trusted library allocation
|
page read and write
|
||
4FE000
|
heap
|
page read and write
|
||
20658F3000
|
stack
|
page read and write
|
||
5832000
|
heap
|
page read and write
|
||
7FFD9BA76000
|
trusted library allocation
|
page execute and read and write
|
||
57BA000
|
heap
|
page read and write
|
||
19309D70000
|
heap
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
7E20000
|
heap
|
page read and write
|
||
554000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page execute and read and write
|
||
19309EF0000
|
heap
|
page execute and read and write
|
||
451D000
|
stack
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page execute and read and write
|
||
4CE000
|
stack
|
page read and write
|
||
19308392000
|
heap
|
page read and write
|
||
48D4000
|
heap
|
page read and write
|
||
48A0000
|
heap
|
page execute and read and write
|
||
7250000
|
trusted library allocation
|
page read and write
|
||
3589000
|
trusted library allocation
|
page read and write
|
||
C10A000
|
heap
|
page read and write
|
||
58BD000
|
trusted library allocation
|
page read and write
|
||
26BB000
|
trusted library allocation
|
page read and write
|
||
5744000
|
heap
|
page read and write
|
||
2646000
|
trusted library allocation
|
page read and write
|
||
7BCC000
|
stack
|
page read and write
|
||
23AE000
|
stack
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page execute and read and write
|
||
7DCD000
|
stack
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
270A000
|
trusted library allocation
|
page read and write
|
||
277B000
|
trusted library allocation
|
page read and write
|
||
19308320000
|
heap
|
page read and write
|
||
1930832C000
|
heap
|
page read and write
|
||
465000
|
heap
|
page read and write
|
||
193083F7000
|
heap
|
page read and write
|
||
193084E0000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page execute and read and write
|
||
7CCC000
|
stack
|
page read and write
|
||
2136000
|
trusted library allocation
|
page execute and read and write
|
||
589000
|
heap
|
page read and write
|
||
193081B8000
|
unkown
|
page readonly
|
||
211D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7F850000
|
trusted library allocation
|
page execute and read and write
|
||
2120000
|
trusted library allocation
|
page read and write
|
||
563D000
|
stack
|
page read and write
|
||
2938000
|
trusted library allocation
|
page read and write
|
||
C10F000
|
heap
|
page read and write
|
||
2798000
|
trusted library allocation
|
page read and write
|
||
57CF000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
2114000
|
trusted library allocation
|
page read and write
|
||
3421000
|
trusted library allocation
|
page read and write
|
||
36AA000
|
trusted library allocation
|
page read and write
|
||
579000
|
heap
|
page read and write
|
||
7FFD9BB6E000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
7FD0000
|
trusted library allocation
|
page read and write
|
||
2132000
|
trusted library allocation
|
page read and write
|
||
57FE000
|
heap
|
page read and write
|
||
20661FE000
|
stack
|
page read and write
|
||
2290000
|
trusted library allocation
|
page execute and read and write
|
||
7AE000
|
stack
|
page read and write
|
||
2065FFE000
|
stack
|
page read and write
|
||
23DE000
|
trusted library allocation
|
page read and write
|
||
57D000
|
heap
|
page read and write
|
||
7E30000
|
heap
|
page read and write
|
||
4DAC000
|
stack
|
page read and write
|
||
3529000
|
trusted library allocation
|
page read and write
|
||
3509000
|
trusted library allocation
|
page read and write
|
||
930000
|
trusted library allocation
|
page read and write
|
||
19308460000
|
heap
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
82E000
|
stack
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
23D0000
|
trusted library allocation
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
2065DFC000
|
stack
|
page read and write
|
||
567B000
|
stack
|
page read and write
|
||
19308240000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
253A000
|
trusted library allocation
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
25FB000
|
trusted library allocation
|
page read and write
|
||
2734000
|
trusted library allocation
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
5ACE000
|
stack
|
page read and write
|
||
5759000
|
heap
|
page read and write
|
||
48E0000
|
heap
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
23DB000
|
trusted library allocation
|
page read and write
|
||
4E2C000
|
stack
|
page read and write
|
||
5CCC000
|
stack
|
page read and write
|
||
58A6000
|
trusted library allocation
|
page read and write
|
||
7FCA000
|
heap
|
page read and write
|
||
5B2000
|
heap
|
page read and write
|
||
5880000
|
heap
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
370A000
|
trusted library allocation
|
page read and write
|
||
36CA000
|
trusted library allocation
|
page read and write
|
||
35E9000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
2804000
|
trusted library allocation
|
page read and write
|
||
34A9000
|
trusted library allocation
|
page read and write
|
||
3629000
|
trusted library allocation
|
page read and write
|
||
5740000
|
heap
|
page read and write
|
||
20659FE000
|
stack
|
page read and write
|
||
35C9000
|
trusted library allocation
|
page read and write
|
||
2147000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9BB000
|
trusted library allocation
|
page execute and read and write
|
||
1B9000
|
stack
|
page read and write
|
||
19321F30000
|
trusted library allocation
|
page read and write
|
||
5750000
|
heap
|
page read and write
|
||
19308420000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
23EE000
|
trusted library allocation
|
page read and write
|
||
5825000
|
heap
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA46000
|
trusted library allocation
|
page read and write
|
||
5E0E000
|
stack
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
193084F3000
|
trusted library allocation
|
page read and write
|
||
3431000
|
trusted library allocation
|
page read and write
|
||
290C000
|
trusted library allocation
|
page read and write
|
||
3649000
|
trusted library allocation
|
page read and write
|
||
58B0000
|
trusted library allocation
|
page read and write
|
||
193225C0000
|
trusted library section
|
page read and write
|
||
19308520000
|
heap
|
page read and write
|
||
4B1C000
|
stack
|
page read and write
|
||
2110000
|
trusted library allocation
|
page read and write
|
||
19308440000
|
heap
|
page read and write
|
||
193081B2000
|
unkown
|
page readonly
|
||
946000
|
heap
|
page read and write
|
||
23F6000
|
trusted library allocation
|
page read and write
|
||
34C9000
|
trusted library allocation
|
page read and write
|
||
214B000
|
trusted library allocation
|
page execute and read and write
|
||
5746000
|
heap
|
page read and write
|
||
2673000
|
trusted library allocation
|
page read and write
|
||
25AB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page execute and read and write
|
||
193081B0000
|
unkown
|
page readonly
|
||
3549000
|
trusted library allocation
|
page read and write
|
||
4870000
|
trusted library allocation
|
page read and write
|
||
23C0000
|
trusted library allocation
|
page read and write
|
||
25FD000
|
trusted library allocation
|
page read and write
|
||
25D7000
|
trusted library allocation
|
page read and write
|
||
7FC0000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
2963000
|
trusted library allocation
|
page read and write
|
||
2560000
|
trusted library allocation
|
page read and write
|
||
2065BFF000
|
stack
|
page read and write
|
||
2065AFE000
|
stack
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
3679000
|
trusted library allocation
|
page read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
7FFD9B992000
|
trusted library allocation
|
page read and write
|
There are 272 hidden memdumps, click here to show them.