Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
LHA9oUEAwZ.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\testnt.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_LHA9oUEAwZ.exe_7062d95b25b19cadb9259966c0d1ce298fffcd9_694179a5_37dded76-bd19-4478-840b-4d209993f4c2\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8909.tmp.dmp
|
Mini DuMP crash report, 16 streams, Tue Mar 26 19:08:39 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8B7B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8BAB.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\testnt.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 26 16:23:18
2024, mtime=Tue Mar 26 16:23:18 2024, atime=Tue Mar 26 16:23:18 2024, length=72192, window=hide
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\LHA9oUEAwZ.exe
|
"C:\Users\user\Desktop\LHA9oUEAwZ.exe"
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 6384 -s 844
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
win-britain.gl.at.ply.gg
|
|||
http://upx.sf.net
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
win-britain.gl.at.ply.gg
|
147.185.221.18
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
147.185.221.18
|
win-britain.gl.at.ply.gg
|
United States
|
||
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASMANCS
|
FileDirectory
|
||
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
|
ProgramId
|
||
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
|
FileId
|
||
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
|
LowerCaseLongPath
|
||
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
|
LongPathHash
|
||
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
|
Name
|
||
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
|
OriginalFileName
|
||
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
|
Publisher
|
||
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
|
Version
|
||
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
|
BinFileVersion
|
||
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
|
BinaryType
|
||
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
|
ProductName
|
||
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
|
ProductVersion
|
||
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
|
LinkDate
|
||
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
|
BinProductVersion
|
||
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
|
AppxPackageFullName
|
||
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
|
Size
|
||
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
|
Language
|
||
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
|
Usn
|
There are 23 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
DC2000
|
unkown
|
page readonly
|
||
3111000
|
trusted library allocation
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
7FFAAC4E0000
|
trusted library allocation
|
page execute and read and write
|
||
1B69D000
|
stack
|
page read and write
|
||
7FFAAC500000
|
trusted library allocation
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
7FFAAC38C000
|
trusted library allocation
|
page execute and read and write
|
||
30D0000
|
heap
|
page read and write
|
||
7FFAAC33D000
|
trusted library allocation
|
page execute and read and write
|
||
1C715000
|
stack
|
page read and write
|
||
7FFAAC34D000
|
trusted library allocation
|
page execute and read and write
|
||
137F000
|
heap
|
page read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
1C31E000
|
stack
|
page read and write
|
||
138B000
|
heap
|
page read and write
|
||
1C918000
|
stack
|
page read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
2FA0000
|
heap
|
page read and write
|
||
3677000
|
trusted library allocation
|
page read and write
|
||
1C032000
|
heap
|
page read and write
|
||
150E000
|
stack
|
page read and write
|
||
7FFAAC354000
|
trusted library allocation
|
page read and write
|
||
1111000
|
stack
|
page read and write
|
||
1BAC3000
|
heap
|
page read and write
|
||
7FFAAC4D0000
|
trusted library allocation
|
page read and write
|
||
3100000
|
heap
|
page execute and read and write
|
||
140E000
|
heap
|
page read and write
|
||
7FFAAC3E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC343000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
160F000
|
stack
|
page read and write
|
||
7FFAAC416000
|
trusted library allocation
|
page execute and read and write
|
||
1260000
|
heap
|
page read and write
|
||
13111000
|
trusted library allocation
|
page read and write
|
||
1352000
|
heap
|
page read and write
|
||
7FFAAC333000
|
trusted library allocation
|
page execute and read and write
|
||
1710000
|
trusted library allocation
|
page read and write
|
||
7FFB08321000
|
unkown
|
page execute read
|
||
7FFB08342000
|
unkown
|
page readonly
|
||
1240000
|
heap
|
page read and write
|
||
7FFAAC334000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC3EC000
|
trusted library allocation
|
page execute and read and write
|
||
1310000
|
heap
|
page read and write
|
||
133E000
|
heap
|
page read and write
|
||
7FFB08345000
|
unkown
|
page readonly
|
||
13121000
|
trusted library allocation
|
page read and write
|
||
1381000
|
heap
|
page read and write
|
||
7FFB08340000
|
unkown
|
page read and write
|
||
7FFAAC450000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC35D000
|
trusted library allocation
|
page execute and read and write
|
||
1750000
|
heap
|
page read and write
|
||
1BBD0000
|
heap
|
page execute and read and write
|
||
7FF47C220000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC4F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB08336000
|
unkown
|
page readonly
|
||
13D6000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC340000
|
trusted library allocation
|
page read and write
|
||
1713000
|
trusted library allocation
|
page read and write
|
||
1755000
|
heap
|
page read and write
|
||
DD4000
|
unkown
|
page readonly
|
||
1BBCB000
|
stack
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
13118000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4D2000
|
trusted library allocation
|
page read and write
|
||
1C818000
|
stack
|
page read and write
|
||
1C029000
|
heap
|
page read and write
|
||
1BFE3000
|
heap
|
page read and write
|
||
7FFAAC330000
|
trusted library allocation
|
page read and write
|
||
1CAA0000
|
heap
|
page read and write
|
||
1BFE0000
|
heap
|
page read and write
|
||
7FFB08320000
|
unkown
|
page readonly
|
||
13D0000
|
heap
|
page read and write
|
||
7FFAAC3E6000
|
trusted library allocation
|
page read and write
|
||
1BCDE000
|
stack
|
page read and write
|
||
1311E000
|
trusted library allocation
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
7FFAAC350000
|
trusted library allocation
|
page read and write
|
||
7FFAAC35B000
|
trusted library allocation
|
page execute and read and write
|
||
1B492000
|
heap
|
page read and write
|
||
1355000
|
heap
|
page read and write
|
||
1BAC0000
|
heap
|
page read and write
|
There are 75 hidden memdumps, click here to show them.