Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
1727426286cf469675e3a7fae43b5e2efcc15639ae08e5067de36f3129e2eb678168920527172.dat-decoded.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_2SSM3MSIR0DTTRQ2_504a3634ea5f948835717bb7b0f19bfc2412817f_35627730_24d8b2c5-b163-42cf-9ebb-b8dff9900c0d\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1929.tmp.dmp
|
Mini DuMP crash report, 15 streams, Fri Sep 27 08:47:43 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1EB8.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1EF7.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\1727426286cf469675e3a7fae43b5e2efcc15639ae08e5067de36f3129e2eb678168920527172.dat-decoded.exe
|
"C:\Users\user\Desktop\1727426286cf469675e3a7fae43b5e2efcc15639ae08e5067de36f3129e2eb678168920527172.dat-decoded.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6764 -s 2620
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://aborters.duckdns.org:8081
|
unknown
|
||
http://anotherarmy.dns.army:8081
|
unknown
|
||
https://www.office.com/
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:642294%0D%0ADate%20a
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://chrome.google.com/webstore?hl=enXL
|
unknown
|
||
https://www.office.com/lB
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.97.3
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=
|
unknown
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://varders.kozow.com:8081
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:642294%0D%0ADate%20and%20Time:%2027/09/2024%20/%2015:33:28%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20642294%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://checkip.dyndns.org/
|
158.101.44.242
|
||
https://reallyfreegeoip.org/xml/8.46.123.33$
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://chrome.google.com/webstore?hl=enlB
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
https://www.office.com/XL
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 23 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.97.3
|
||
api.telegram.org
|
149.154.167.220
|
||
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
158.101.44.242
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
188.114.97.3
|
reallyfreegeoip.org
|
European Union
|
||
158.101.44.242
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
|
FileDirectory
|
||
\REGISTRY\A\{db2927db-b86b-efbd-8726-d0dbd88cbdd6}\Root\InventoryApplicationFile\1727426286cf4696|342a483a19cd6dd
|
ProgramId
|
||
\REGISTRY\A\{db2927db-b86b-efbd-8726-d0dbd88cbdd6}\Root\InventoryApplicationFile\1727426286cf4696|342a483a19cd6dd
|
FileId
|
||
\REGISTRY\A\{db2927db-b86b-efbd-8726-d0dbd88cbdd6}\Root\InventoryApplicationFile\1727426286cf4696|342a483a19cd6dd
|
LowerCaseLongPath
|
||
\REGISTRY\A\{db2927db-b86b-efbd-8726-d0dbd88cbdd6}\Root\InventoryApplicationFile\1727426286cf4696|342a483a19cd6dd
|
LongPathHash
|
||
\REGISTRY\A\{db2927db-b86b-efbd-8726-d0dbd88cbdd6}\Root\InventoryApplicationFile\1727426286cf4696|342a483a19cd6dd
|
Name
|
||
\REGISTRY\A\{db2927db-b86b-efbd-8726-d0dbd88cbdd6}\Root\InventoryApplicationFile\1727426286cf4696|342a483a19cd6dd
|
OriginalFileName
|
||
\REGISTRY\A\{db2927db-b86b-efbd-8726-d0dbd88cbdd6}\Root\InventoryApplicationFile\1727426286cf4696|342a483a19cd6dd
|
Publisher
|
||
\REGISTRY\A\{db2927db-b86b-efbd-8726-d0dbd88cbdd6}\Root\InventoryApplicationFile\1727426286cf4696|342a483a19cd6dd
|
Version
|
||
\REGISTRY\A\{db2927db-b86b-efbd-8726-d0dbd88cbdd6}\Root\InventoryApplicationFile\1727426286cf4696|342a483a19cd6dd
|
BinFileVersion
|
||
\REGISTRY\A\{db2927db-b86b-efbd-8726-d0dbd88cbdd6}\Root\InventoryApplicationFile\1727426286cf4696|342a483a19cd6dd
|
BinaryType
|
||
\REGISTRY\A\{db2927db-b86b-efbd-8726-d0dbd88cbdd6}\Root\InventoryApplicationFile\1727426286cf4696|342a483a19cd6dd
|
ProductName
|
||
\REGISTRY\A\{db2927db-b86b-efbd-8726-d0dbd88cbdd6}\Root\InventoryApplicationFile\1727426286cf4696|342a483a19cd6dd
|
ProductVersion
|
||
\REGISTRY\A\{db2927db-b86b-efbd-8726-d0dbd88cbdd6}\Root\InventoryApplicationFile\1727426286cf4696|342a483a19cd6dd
|
LinkDate
|
||
\REGISTRY\A\{db2927db-b86b-efbd-8726-d0dbd88cbdd6}\Root\InventoryApplicationFile\1727426286cf4696|342a483a19cd6dd
|
BinProductVersion
|
||
\REGISTRY\A\{db2927db-b86b-efbd-8726-d0dbd88cbdd6}\Root\InventoryApplicationFile\1727426286cf4696|342a483a19cd6dd
|
AppxPackageFullName
|
||
\REGISTRY\A\{db2927db-b86b-efbd-8726-d0dbd88cbdd6}\Root\InventoryApplicationFile\1727426286cf4696|342a483a19cd6dd
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{db2927db-b86b-efbd-8726-d0dbd88cbdd6}\Root\InventoryApplicationFile\1727426286cf4696|342a483a19cd6dd
|
Size
|
||
\REGISTRY\A\{db2927db-b86b-efbd-8726-d0dbd88cbdd6}\Root\InventoryApplicationFile\1727426286cf4696|342a483a19cd6dd
|
Language
|
||
\REGISTRY\A\{db2927db-b86b-efbd-8726-d0dbd88cbdd6}\Root\InventoryApplicationFile\1727426286cf4696|342a483a19cd6dd
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 26 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2A81000
|
trusted library allocation
|
page read and write
|
||
702000
|
unkown
|
page readonly
|
||
125E000
|
stack
|
page read and write
|
||
6700000
|
trusted library allocation
|
page execute and read and write
|
||
3AA9000
|
trusted library allocation
|
page read and write
|
||
3C5B000
|
trusted library allocation
|
page read and write
|
||
6248000
|
heap
|
page read and write
|
||
2AF8000
|
trusted library allocation
|
page read and write
|
||
2C04000
|
trusted library allocation
|
page read and write
|
||
2C36000
|
trusted library allocation
|
page read and write
|
||
2DCB000
|
trusted library allocation
|
page read and write
|
||
F1C000
|
stack
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
2C84000
|
trusted library allocation
|
page read and write
|
||
568E000
|
stack
|
page read and write
|
||
6740000
|
trusted library allocation
|
page execute and read and write
|
||
2C0A000
|
trusted library allocation
|
page read and write
|
||
2D7E000
|
trusted library allocation
|
page read and write
|
||
63BE000
|
stack
|
page read and write
|
||
2AE9000
|
trusted library allocation
|
page read and write
|
||
519E000
|
stack
|
page read and write
|
||
2B35000
|
trusted library allocation
|
page read and write
|
||
6246000
|
heap
|
page read and write
|
||
D4A000
|
trusted library allocation
|
page execute and read and write
|
||
3AEB000
|
trusted library allocation
|
page read and write
|
||
2D49000
|
trusted library allocation
|
page read and write
|
||
2DD5000
|
trusted library allocation
|
page read and write
|
||
61C0000
|
heap
|
page read and write
|
||
D70000
|
trusted library allocation
|
page read and write
|
||
2C3E000
|
trusted library allocation
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
3D4D000
|
trusted library allocation
|
page read and write
|
||
3C21000
|
trusted library allocation
|
page read and write
|
||
2C44000
|
trusted library allocation
|
page read and write
|
||
6730000
|
trusted library allocation
|
page read and write
|
||
3C2F000
|
trusted library allocation
|
page read and write
|
||
653E000
|
stack
|
page read and write
|
||
3E2A000
|
trusted library allocation
|
page read and write
|
||
3A85000
|
trusted library allocation
|
page read and write
|
||
1264000
|
trusted library allocation
|
page read and write
|
||
61FF000
|
heap
|
page read and write
|
||
3C2A000
|
trusted library allocation
|
page read and write
|
||
D24000
|
trusted library allocation
|
page read and write
|
||
2B29000
|
trusted library allocation
|
page read and write
|
||
2CEE000
|
trusted library allocation
|
page read and write
|
||
3D06000
|
trusted library allocation
|
page read and write
|
||
3B90000
|
trusted library allocation
|
page read and write
|
||
D20000
|
trusted library allocation
|
page read and write
|
||
2B68000
|
trusted library allocation
|
page read and write
|
||
D55000
|
trusted library allocation
|
page execute and read and write
|
||
105E000
|
stack
|
page read and write
|
||
5250000
|
heap
|
page read and write
|
||
2C12000
|
trusted library allocation
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
3C33000
|
trusted library allocation
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
63FF000
|
stack
|
page read and write
|
||
2AF4000
|
trusted library allocation
|
page read and write
|
||
2C9E000
|
trusted library allocation
|
page read and write
|
||
5140000
|
trusted library allocation
|
page read and write
|
||
D23000
|
trusted library allocation
|
page execute and read and write
|
||
F50000
|
heap
|
page read and write
|
||
3DD3000
|
trusted library allocation
|
page read and write
|
||
2DD3000
|
trusted library allocation
|
page read and write
|
||
2B8A000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page execute and read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
2AD2000
|
trusted library allocation
|
page read and write
|
||
2CEC000
|
trusted library allocation
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
D5B000
|
trusted library allocation
|
page execute and read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
4FFE000
|
stack
|
page read and write
|
||
3A9B000
|
trusted library allocation
|
page read and write
|
||
2CC5000
|
trusted library allocation
|
page read and write
|
||
D46000
|
trusted library allocation
|
page execute and read and write
|
||
2CA3000
|
trusted library allocation
|
page read and write
|
||
D57000
|
trusted library allocation
|
page execute and read and write
|
||
2C17000
|
trusted library allocation
|
page read and write
|
||
6244000
|
heap
|
page read and write
|
||
2D4D000
|
trusted library allocation
|
page read and write
|
||
2CB2000
|
trusted library allocation
|
page read and write
|
||
61DE000
|
heap
|
page read and write
|
||
558E000
|
stack
|
page read and write
|
||
657E000
|
stack
|
page read and write
|
||
3E26000
|
trusted library allocation
|
page read and write
|
||
50DD000
|
stack
|
page read and write
|
||
2DD1000
|
trusted library allocation
|
page read and write
|
||
2C0C000
|
trusted library allocation
|
page read and write
|
||
3CBB000
|
trusted library allocation
|
page read and write
|
||
6750000
|
trusted library allocation
|
page execute and read and write
|
||
2D43000
|
trusted library allocation
|
page read and write
|
||
1295000
|
trusted library allocation
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
2CA9000
|
trusted library allocation
|
page read and write
|
||
4C1E000
|
stack
|
page read and write
|
||
2C08000
|
trusted library allocation
|
page read and write
|
||
2D3E000
|
trusted library allocation
|
page read and write
|
||
D2D000
|
trusted library allocation
|
page execute and read and write
|
||
CD0000
|
heap
|
page read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
2DAB000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page execute and read and write
|
||
3BB0000
|
trusted library allocation
|
page read and write
|
||
B9E000
|
stack
|
page read and write
|
||
2AEC000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
511E000
|
stack
|
page read and write
|
||
2C3C000
|
trusted library allocation
|
page read and write
|
||
3CDA000
|
trusted library allocation
|
page read and write
|
||
D42000
|
trusted library allocation
|
page read and write
|
||
3A8F000
|
trusted library allocation
|
page read and write
|
||
2D46000
|
trusted library allocation
|
page read and write
|
||
2B2D000
|
trusted library allocation
|
page read and write
|
||
3B3B000
|
trusted library allocation
|
page read and write
|
||
3DEB000
|
trusted library allocation
|
page read and write
|
||
2CC1000
|
trusted library allocation
|
page read and write
|
||
2AFC000
|
trusted library allocation
|
page read and write
|
||
3BC6000
|
trusted library allocation
|
page read and write
|
||
625D000
|
heap
|
page read and write
|
||
2B21000
|
trusted library allocation
|
page read and write
|
||
2C49000
|
trusted library allocation
|
page read and write
|
||
2DDA000
|
trusted library allocation
|
page read and write
|
||
3B64000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
51DE000
|
stack
|
page read and write
|
||
2B31000
|
trusted library allocation
|
page read and write
|
||
2C3A000
|
trusted library allocation
|
page read and write
|
||
3B51000
|
trusted library allocation
|
page read and write
|
||
4A88000
|
trusted library allocation
|
page read and write
|
||
2CF9000
|
trusted library allocation
|
page read and write
|
||
2DDE000
|
trusted library allocation
|
page read and write
|
||
3DFB000
|
trusted library allocation
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
D80000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
61BE000
|
stack
|
page read and write
|
||
3C49000
|
trusted library allocation
|
page read and write
|
||
6211000
|
heap
|
page read and write
|
||
3D3C000
|
trusted library allocation
|
page read and write
|
||
56CE000
|
stack
|
page read and write
|
||
DC3000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page execute and read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
BE6000
|
heap
|
page read and write
|
||
2B41000
|
trusted library allocation
|
page read and write
|
||
3C86000
|
trusted library allocation
|
page read and write
|
||
3CA5000
|
trusted library allocation
|
page read and write
|
||
3A94000
|
trusted library allocation
|
page read and write
|
||
65BF000
|
stack
|
page read and write
|
||
D52000
|
trusted library allocation
|
page read and write
|
||
E39000
|
heap
|
page read and write
|
||
5240000
|
heap
|
page execute and read and write
|
||
746000
|
unkown
|
page readonly
|
||
5150000
|
heap
|
page read and write
|
||
D8E000
|
heap
|
page read and write
|
||
2B8C000
|
trusted library allocation
|
page read and write
|
||
570D000
|
stack
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
5226000
|
trusted library allocation
|
page read and write
|
||
5EBF000
|
stack
|
page read and write
|
||
2ADE000
|
trusted library allocation
|
page read and write
|
||
2D3A000
|
trusted library allocation
|
page read and write
|
||
D10000
|
trusted library allocation
|
page read and write
|
||
2B39000
|
trusted library allocation
|
page read and write
|
||
2B3D000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
66FF000
|
stack
|
page read and write
|
||
523D000
|
trusted library allocation
|
page read and write
|
||
E6F000
|
heap
|
page read and write
|
||
6770000
|
trusted library allocation
|
page execute and read and write
|
||
3DE9000
|
trusted library allocation
|
page read and write
|
||
F37000
|
trusted library allocation
|
page read and write
|
||
643E000
|
stack
|
page read and write
|
||
2CE6000
|
trusted library allocation
|
page read and write
|
||
2CF3000
|
trusted library allocation
|
page read and write
|
||
5224000
|
trusted library allocation
|
page read and write
|
||
6760000
|
trusted library allocation
|
page execute and read and write
|
||
3A81000
|
trusted library allocation
|
page read and write
|
||
522A000
|
trusted library allocation
|
page read and write
|
||
65FE000
|
stack
|
page read and write
|
||
3AA1000
|
trusted library allocation
|
page read and write
|
||
5DBE000
|
stack
|
page read and write
|
||
6720000
|
trusted library allocation
|
page execute and read and write
|
||
3C8A000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
7DB000
|
stack
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
6269000
|
heap
|
page read and write
|
||
3D26000
|
trusted library allocation
|
page read and write
|
||
60BF000
|
stack
|
page read and write
|
||
5FBE000
|
stack
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
2CBC000
|
trusted library allocation
|
page read and write
|
||
E49000
|
heap
|
page read and write
|
||
2B25000
|
trusted library allocation
|
page read and write
|
There are 190 hidden memdumps, click here to show them.