Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_100f1c346cbcff15_b159fbceb9912cab3fd2e3d37e4ec18be14df62d_95985173_2e3eaac1-891a-4140-88f1-7c1710ec26ab\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3CD3.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 8 01:52:03 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3E1C.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3E4C.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe
|
"C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5500 -s 1308
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://62.204.41.150
|
unknown
|
||
http://62.204.41.150/
|
62.204.41.150
|
||
http://62.204.41.150/edd20096ecef326d.php
|
62.204.41.150
|
||
http://upx.sf.net
|
unknown
|
||
http://62.204.41.150/0
|
unknown
|
||
http://62.204.41.150/edd20096ecef326d.php?
|
unknown
|
||
http://62.204.41.150/edd20096ecef326d.phpo
|
unknown
|
||
http://62.204.41.150/edd20096ecef326d.phpL
|
unknown
|
||
http://62.204.41.150/edd20096ecef326d.phpl
|
unknown
|
||
http://62.204.41.150/edd20096ecef326d.php)
|
unknown
|
||
http://62.204.41.150/ows
|
unknown
|
There are 1 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
62.204.41.150
|
unknown
|
United Kingdom
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
|
ProgramId
|
||
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
|
FileId
|
||
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
|
LowerCaseLongPath
|
||
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
|
LongPathHash
|
||
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
|
Name
|
||
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
|
OriginalFileName
|
||
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
|
Publisher
|
||
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
|
Version
|
||
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
|
BinFileVersion
|
||
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
|
BinaryType
|
||
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
|
ProductName
|
||
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
|
ProductVersion
|
||
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
|
LinkDate
|
||
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
|
BinProductVersion
|
||
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
|
AppxPackageFullName
|
||
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
|
Size
|
||
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
|
Language
|
||
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
22F0000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
22A0000
|
direct allocation
|
page execute and read and write
|
||
77D000
|
heap
|
page read and write
|
||
65C000
|
unkown
|
page execute and read and write
|
||
73A000
|
heap
|
page read and write
|
||
23B3000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
194000
|
stack
|
page read and write
|
||
40F000
|
unkown
|
page readonly
|
||
2520000
|
heap
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page readonly
|
||
4B1000
|
unkown
|
page execute and read and write
|
||
6E0000
|
heap
|
page read and write
|
||
41D000
|
unkown
|
page readonly
|
||
AFF000
|
stack
|
page read and write
|
||
4E2000
|
unkown
|
page execute and read and write
|
||
73E000
|
heap
|
page read and write
|
||
9FF000
|
stack
|
page read and write
|
||
236E000
|
stack
|
page read and write
|
||
1A9EE000
|
stack
|
page read and write
|
||
1A89E000
|
stack
|
page read and write
|
||
799000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
1A6FF000
|
stack
|
page read and write
|
||
72E000
|
stack
|
page read and write
|
||
1A84F000
|
stack
|
page read and write
|
||
1A5FF000
|
stack
|
page read and write
|
||
751000
|
heap
|
page execute and read and write
|
||
6BE000
|
stack
|
page read and write
|
||
64A000
|
unkown
|
page execute and read and write
|
||
4BD000
|
unkown
|
page execute and read and write
|
||
23AE000
|
stack
|
page read and write
|
||
44B000
|
unkown
|
page write copy
|
||
24BF000
|
stack
|
page read and write
|
||
1AAEE000
|
stack
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
24FE000
|
stack
|
page read and write
|
||
7C8000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
670000
|
heap
|
page read and write
|
||
7AC000
|
heap
|
page read and write
|
||
1A74E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1A99D000
|
stack
|
page read and write
|
There are 38 hidden memdumps, click here to show them.