Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
24v3hhTWiA.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_24v3hhTWiA.exe_55a9558425bdb232d9cb2e64a1f513463d6cecb3_cb184bb6_d81e95d6-b9fa-4500-9770-b4897484fd6a\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA74E.tmp.dmp
|
Mini DuMP crash report, 16 streams, Sat Oct 26 20:47:55 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA953.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAB28.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\24v3hhTWiA.exe
|
"C:\Users\user\Desktop\24v3hhTWiA.exe"
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7292 -s 808
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
|
ProgramId
|
||
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
|
FileId
|
||
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
|
LowerCaseLongPath
|
||
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
|
LongPathHash
|
||
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
|
Name
|
||
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
|
OriginalFileName
|
||
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
|
Publisher
|
||
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
|
Version
|
||
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
|
BinFileVersion
|
||
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
|
BinaryType
|
||
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
|
ProductName
|
||
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
|
ProductVersion
|
||
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
|
LinkDate
|
||
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
|
BinProductVersion
|
||
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
|
AppxPackageFullName
|
||
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
|
Size
|
||
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
|
Language
|
||
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3F155FE000
|
stack
|
page read and write
|
||
3F149FE000
|
stack
|
page read and write
|
||
14073FB4000
|
unkown
|
page readonly
|
||
14010001000
|
trusted library allocation
|
page read and write
|
||
3F141FE000
|
stack
|
page read and write
|
||
140741D6000
|
heap
|
page read and write
|
||
14073F60000
|
unkown
|
page readonly
|
||
14010011000
|
trusted library allocation
|
page read and write
|
||
7FFB4B350000
|
trusted library allocation
|
page read and write
|
||
14074230000
|
heap
|
page read and write
|
||
7FFB4B34D000
|
trusted library allocation
|
page execute and read and write
|
||
1407416F000
|
heap
|
page read and write
|
||
3F151FD000
|
stack
|
page read and write
|
||
7FFB4B35A000
|
trusted library allocation
|
page read and write
|
||
3F14DFF000
|
stack
|
page read and write
|
||
14075B40000
|
heap
|
page read and write
|
||
140744B5000
|
heap
|
page read and write
|
||
7FFB4B3F0000
|
trusted library allocation
|
page read and write
|
||
1407416C000
|
heap
|
page read and write
|
||
14076530000
|
heap
|
page read and write
|
||
14074270000
|
heap
|
page read and write
|
||
14000001000
|
trusted library allocation
|
page read and write
|
||
14074160000
|
heap
|
page read and write
|
||
14074158000
|
heap
|
page read and write
|
||
1407419E000
|
heap
|
page read and write
|
||
14074305000
|
heap
|
page read and write
|
||
7FF4B7EA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B344000
|
trusted library allocation
|
page read and write
|
||
14074040000
|
heap
|
page read and write
|
||
7FFB4B36D000
|
trusted library allocation
|
page execute and read and write
|
||
14075B70000
|
heap
|
page execute and read and write
|
||
140742E3000
|
trusted library allocation
|
page read and write
|
||
14074156000
|
heap
|
page read and write
|
||
7FFB4B4E0000
|
trusted library allocation
|
page read and write
|
||
14010008000
|
trusted library allocation
|
page read and write
|
||
140742D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4F0000
|
trusted library allocation
|
page read and write
|
||
14074130000
|
heap
|
page read and write
|
||
1401000D000
|
trusted library allocation
|
page read and write
|
||
14074250000
|
heap
|
page read and write
|
||
14075BC0000
|
heap
|
page read and write
|
||
140742E0000
|
trusted library allocation
|
page read and write
|
||
3F15DFE000
|
stack
|
page read and write
|
||
7FFB4B39C000
|
trusted library allocation
|
page execute and read and write
|
||
14073F62000
|
unkown
|
page readonly
|
||
140744B0000
|
heap
|
page read and write
|
||
14074300000
|
heap
|
page read and write
|
||
7FFB4B426000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B460000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B343000
|
trusted library allocation
|
page execute and read and write
|
||
3F13DF0000
|
stack
|
page read and write
|
||
7FFB4B400000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B357000
|
trusted library allocation
|
page read and write
|
||
14075B80000
|
heap
|
page execute and read and write
|
||
3F159FE000
|
stack
|
page read and write
|
||
7FFB4B342000
|
trusted library allocation
|
page read and write
|
||
14074199000
|
heap
|
page read and write
|
||
7FFB4B352000
|
trusted library allocation
|
page read and write
|
||
140742B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3FC000
|
trusted library allocation
|
page execute and read and write
|
||
14074139000
|
heap
|
page read and write
|
||
14075BC8000
|
heap
|
page read and write
|
||
14010003000
|
trusted library allocation
|
page read and write
|
||
3F145FE000
|
stack
|
page read and write
|
There are 54 hidden memdumps, click here to show them.