Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
oaUNY8P657.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\sms561F.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
modified
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_sms561F.tmp_942c3da8370deac9a4ef501abf272bdc1219b_47ac16bd_5ad1f071-b479-4c6d-8e86-ee4719fcda92\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7417.tmp.dmp
|
Mini DuMP crash report, 16 streams, Sun Nov 17 18:20:16 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7B9A.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7C08.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\oaUNY8P657.exe
|
"C:\Users\user\Desktop\oaUNY8P657.exe"
|
||
C:\Users\user\Desktop\oaUNY8P657.exe
|
"C:\Users\user\Desktop\oaUNY8P657.exe"
|
||
C:\Users\user\AppData\Local\Temp\sms561F.tmp
|
"C:\Users\user~1\AppData\Local\Temp\sms561F.tmp"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7508 -s 1664
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
left-noon.gl.at.ply.gg
|
|||
https://i.ibb.co/Dwrj41N/Image.png
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://go.micu
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://ip-api.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
234C000
|
trusted library allocation
|
page read and write
|
||
1F9C5F20000
|
heap
|
page read and write
|
||
1E2000
|
unkown
|
page readonly
|
||
7FF78CB20000
|
unkown
|
page readonly
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1B217000
|
heap
|
page read and write
|
||
7A2000
|
heap
|
page read and write
|
||
7FFAAC370000
|
trusted library allocation
|
page read and write
|
||
2230000
|
heap
|
page read and write
|
||
7FFB0B631000
|
unkown
|
page execute read
|
||
21E766B0000
|
heap
|
page read and write
|
||
7FFAAC420000
|
trusted library allocation
|
page execute and read and write
|
||
70D000
|
heap
|
page read and write
|
||
531000
|
stack
|
page read and write
|
||
21E766F0000
|
heap
|
page read and write
|
||
23D5000
|
trusted library allocation
|
page read and write
|
||
7FF78CB48000
|
unkown
|
page readonly
|
||
716000
|
heap
|
page read and write
|
||
1AD9B000
|
stack
|
page read and write
|
||
7FF78CB21000
|
unkown
|
page execute read
|
||
754000
|
heap
|
page read and write
|
||
21E0000
|
trusted library allocation
|
page read and write
|
||
233E000
|
stack
|
page read and write
|
||
21D0000
|
trusted library allocation
|
page read and write
|
||
7FF78CB20000
|
unkown
|
page readonly
|
||
660000
|
heap
|
page read and write
|
||
7FF78CB20000
|
unkown
|
page readonly
|
||
1AC90000
|
heap
|
page execute and read and write
|
||
7FF78CB24000
|
unkown
|
page readonly
|
||
1B6FE000
|
stack
|
page read and write
|
||
21E76700000
|
heap
|
page read and write
|
||
915000
|
heap
|
page read and write
|
||
724000
|
heap
|
page read and write
|
||
7FFAAC446000
|
trusted library allocation
|
page execute and read and write
|
||
23E5000
|
trusted library allocation
|
page read and write
|
||
23E8000
|
trusted library allocation
|
page read and write
|
||
7FF78CB20000
|
unkown
|
page readonly
|
||
705000
|
heap
|
page read and write
|
||
70F000
|
heap
|
page read and write
|
||
7FF78CB28000
|
unkown
|
page read and write
|
||
23D2000
|
trusted library allocation
|
page read and write
|
||
1AFBE000
|
stack
|
page read and write
|
||
79D000
|
heap
|
page read and write
|
||
1B1CB000
|
heap
|
page read and write
|
||
8DE000
|
stack
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
7FFAAC510000
|
trusted library allocation
|
page execute and read and write
|
||
6EC000
|
heap
|
page read and write
|
||
1B219000
|
heap
|
page read and write
|
||
7FFAAC480000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC380000
|
trusted library allocation
|
page read and write
|
||
7FFAAC37D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF78CB48000
|
unkown
|
page readonly
|
||
1F9C5E2F000
|
heap
|
page read and write
|
||
7FF78CB44000
|
unkown
|
page readonly
|
||
7FFB0B652000
|
unkown
|
page readonly
|
||
7FFAAC38D000
|
trusted library allocation
|
page execute and read and write
|
||
21E765D0000
|
heap
|
page read and write
|
||
2341000
|
trusted library allocation
|
page read and write
|
||
7FF78CB21000
|
unkown
|
page execute read
|
||
7FF78CB24000
|
unkown
|
page readonly
|
||
1B223000
|
heap
|
page read and write
|
||
7FFAAC500000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
1F9C5E20000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
7FF78CB28000
|
unkown
|
page write copy
|
||
7FF78CB28000
|
unkown
|
page write copy
|
||
BB5000
|
heap
|
page read and write
|
||
1B1ED000
|
heap
|
page read and write
|
||
1B5FE000
|
stack
|
page read and write
|
||
1B1C3000
|
heap
|
page read and write
|
||
2400000
|
trusted library allocation
|
page read and write
|
||
7FF78CB28000
|
unkown
|
page write copy
|
||
7FF78CB2B000
|
unkown
|
page readonly
|
||
1F9C5DF0000
|
heap
|
page read and write
|
||
1F9C5E28000
|
heap
|
page read and write
|
||
74E000
|
heap
|
page read and write
|
||
7FF78CB44000
|
unkown
|
page readonly
|
||
7FF78CB44000
|
unkown
|
page readonly
|
||
7FF78CB23000
|
unkown
|
page write copy
|
||
7FF78CB44000
|
unkown
|
page readonly
|
||
7FF78CB24000
|
unkown
|
page readonly
|
||
F320FE5000
|
stack
|
page read and write
|
||
7FF47A0F0000
|
trusted library allocation
|
page execute and read and write
|
||
1A8CC000
|
stack
|
page read and write
|
||
1F9C5D70000
|
heap
|
page read and write
|
||
21E76772000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
7FF78CB23000
|
unkown
|
page write copy
|
||
7FFAAC373000
|
trusted library allocation
|
page read and write
|
||
7FF78CB21000
|
unkown
|
page execute read
|
||
1B1BB000
|
stack
|
page read and write
|
||
1AEBE000
|
stack
|
page read and write
|
||
2210000
|
heap
|
page execute and read and write
|
||
21E3000
|
trusted library allocation
|
page read and write
|
||
1F6000
|
unkown
|
page readonly
|
||
7FFB0B630000
|
unkown
|
page readonly
|
||
2368000
|
trusted library allocation
|
page read and write
|
||
7FFAAC38B000
|
trusted library allocation
|
page execute and read and write
|
||
21E7676C000
|
heap
|
page read and write
|
||
7FFB0B655000
|
unkown
|
page readonly
|
||
1F9C5D90000
|
heap
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
7FFAAC363000
|
trusted library allocation
|
page execute and read and write
|
||
12341000
|
trusted library allocation
|
page read and write
|
||
21E76766000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
3177FFC000
|
stack
|
page read and write
|
||
31780FF000
|
stack
|
page read and write
|
||
12348000
|
trusted library allocation
|
page read and write
|
||
79B000
|
heap
|
page read and write
|
||
7FF78CB21000
|
unkown
|
page execute read
|
||
7FFAAC3BC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF78CB48000
|
unkown
|
page readonly
|
||
680000
|
heap
|
page read and write
|
||
1B0BE000
|
stack
|
page read and write
|
||
1B7FD000
|
stack
|
page read and write
|
||
23D8000
|
trusted library allocation
|
page read and write
|
||
1B4FF000
|
stack
|
page read and write
|
||
23F6000
|
trusted library allocation
|
page read and write
|
||
7FFB0B646000
|
unkown
|
page readonly
|
||
F3211FF000
|
stack
|
page read and write
|
||
23DE000
|
trusted library allocation
|
page read and write
|
||
7FF78CB24000
|
unkown
|
page readonly
|
||
31781FF000
|
stack
|
page read and write
|
||
7FFB0B650000
|
unkown
|
page read and write
|
||
1B1C0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
7FFAAC364000
|
trusted library allocation
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
1F9C5C90000
|
heap
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
21E76760000
|
heap
|
page read and write
|
||
23DB000
|
trusted library allocation
|
page read and write
|
||
7FF78CB2B000
|
unkown
|
page readonly
|
||
7FF78CB23000
|
unkown
|
page write copy
|
||
7FF78CB2B000
|
unkown
|
page readonly
|
||
7FFAAC41C000
|
trusted library allocation
|
page execute and read and write
|
||
7DE000
|
heap
|
page read and write
|
||
7FFAAC36D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC502000
|
trusted library allocation
|
page read and write
|
||
7FFAAC410000
|
trusted library allocation
|
page read and write
|
||
F3213FF000
|
stack
|
page read and write
|
||
7FF78CB2B000
|
unkown
|
page readonly
|
||
7FF78CB23000
|
unkown
|
page write copy
|
||
1ADB0000
|
heap
|
page read and write
|
||
8F0000
|
trusted library allocation
|
page read and write
|
||
7FF78CB48000
|
unkown
|
page readonly
|
||
720000
|
heap
|
page read and write
|
There are 141 hidden memdumps, click here to show them.