Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
RJQySowVRb.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RJQySowVRb.exe_578156fadb6f1169ab472cfee580afe94862df50_4a02f318_6adae49a-b05d-4a0e-a1d6-d9dc6368ff1a\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D3B.tmp.dmp
|
Mini DuMP crash report, 14 streams, Mon Oct 7 17:32:03 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E26.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E47.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\RJQySowVRb.exe
|
"C:\Users\user\Desktop\RJQySowVRb.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 1228
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://62.204.41.150
|
unknown
|
||
http://62.204.41.150/
|
62.204.41.150
|
||
http://62.204.41.150/edd20096ecef326d.php
|
62.204.41.150
|
||
http://62.204.41.150/edd20096ecef326d.phpS
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://62.204.41.150/edd20096ecef326d.phpx
|
unknown
|
||
http://62.204.41.150/x
|
unknown
|
||
http://62.204.41.150/:
|
unknown
|
||
http://62.204.41.150/edd20096ecef326d.phpT
|
unknown
|
||
http://62.204.41.150/edd20096ecef326d.phpd
|
unknown
|
||
http://62.204.41.150=
|
unknown
|
There are 1 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
62.204.41.150
|
unknown
|
United Kingdom
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
|
ProgramId
|
||
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
|
FileId
|
||
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
|
LowerCaseLongPath
|
||
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
|
LongPathHash
|
||
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
|
Name
|
||
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
|
OriginalFileName
|
||
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
|
Publisher
|
||
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
|
Version
|
||
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
|
BinFileVersion
|
||
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
|
BinaryType
|
||
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
|
ProductName
|
||
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
|
ProductVersion
|
||
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
|
LinkDate
|
||
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
|
BinProductVersion
|
||
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
|
AppxPackageFullName
|
||
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
|
Size
|
||
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
|
Language
|
||
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
22D0000
|
direct allocation
|
page execute and read and write
|
||
979000
|
heap
|
page read and write
|
||
2320000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
19D000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
1A76F000
|
stack
|
page read and write
|
||
8EE000
|
stack
|
page read and write
|
||
1AC6F000
|
stack
|
page read and write
|
||
23CE000
|
stack
|
page read and write
|
||
4B1000
|
unkown
|
page execute and read and write
|
||
B2F000
|
stack
|
page read and write
|
||
1AB6E000
|
stack
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
1A9ED000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
194000
|
stack
|
page read and write
|
||
2453000
|
heap
|
page read and write
|
||
65C000
|
unkown
|
page execute and read and write
|
||
1AA2E000
|
stack
|
page read and write
|
||
44B000
|
unkown
|
page write copy
|
||
4E2000
|
unkown
|
page execute and read and write
|
||
1A7AE000
|
stack
|
page read and write
|
||
2330000
|
heap
|
page read and write
|
||
1A8AF000
|
stack
|
page read and write
|
||
64A000
|
unkown
|
page execute and read and write
|
||
255F000
|
stack
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
94D000
|
heap
|
page execute and read and write
|
||
740000
|
heap
|
page read and write
|
||
7A5000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
41D000
|
unkown
|
page readonly
|
||
1A66F000
|
stack
|
page read and write
|
||
1AB2E000
|
stack
|
page read and write
|
||
4BD000
|
unkown
|
page execute and read and write
|
||
2380000
|
heap
|
page read and write
|
||
93E000
|
heap
|
page read and write
|
||
9AE000
|
heap
|
page read and write
|
||
9CA000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
244E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
40F000
|
unkown
|
page readonly
|
||
240E000
|
stack
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
2450000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
1A8EE000
|
stack
|
page read and write
|
There are 42 hidden memdumps, click here to show them.