Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
1732382826559c62d8b84c02e95636f46212b9f803082b7868187644fff4926ca8a53349c1874.dat-decoded.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_1732382826559c62_c9e6802a6b8064fb6ff81fe4b92118b45f1fd583_4ee20893_e28f43ba-ed04-47fb-bb23-c9b07e6ae222\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER49BA.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sat Nov 23 17:29:09 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4A09.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4A29.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\1732382826559c62d8b84c02e95636f46212b9f803082b7868187644fff4926ca8a53349c1874.dat-decoded.exe
|
"C:\Users\user\Desktop\1732382826559c62d8b84c02e95636f46212b9f803082b7868187644fff4926ca8a53349c1874.dat-decoded.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6648 -s 224
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
thicktoys.sbs
|
|||
http://upx.sf.net
|
unknown
|
||
300snails.sbs
|
|||
faintbl0w.sbs
|
|||
3xc1aimbl0w.sbs
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.214.172
|
||
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
|
84.201.211.34
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
|
ProgramId
|
||
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
|
FileId
|
||
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
|
LowerCaseLongPath
|
||
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
|
LongPathHash
|
||
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
|
Name
|
||
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
|
OriginalFileName
|
||
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
|
Publisher
|
||
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
|
Version
|
||
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
|
BinFileVersion
|
||
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
|
BinaryType
|
||
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
|
ProductName
|
||
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
|
ProductVersion
|
||
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
|
LinkDate
|
||
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
|
BinProductVersion
|
||
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
|
AppxPackageFullName
|
||
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
|
Size
|
||
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
|
Language
|
||
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
441000
|
unkown
|
page readonly
|
||
453000
|
unkown
|
page readonly
|
||
460000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
440000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
43F000
|
unkown
|
page readonly
|
||
1E0000
|
heap
|
page read and write
|
||
442000
|
unkown
|
page write copy
|
||
640000
|
heap
|
page read and write
|
||
442000
|
unkown
|
page write copy
|
||
47E000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
47A000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
453000
|
unkown
|
page readonly
|
||
9D000
|
stack
|
page read and write
|
||
470000
|
heap
|
page read and write
|
There are 10 hidden memdumps, click here to show them.