Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Document for shipping.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Document for shi_1e66adbaabbf5113cadc695eb21a9b827719b085_a5a929e4_dc820042-fdf7-4e79-be5a-b9c3276b8ecf\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER52C7.tmp.dmp
|
Mini DuMP crash report, 15 streams, Thu Apr 18 04:28:20 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER53B2.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER53E2.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Document for shipping.exe
|
"C:\Users\user\Desktop\Document for shipping.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7148 -s 1180
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://foo/bar/mainwindow.baml
|
unknown
|
||
http://foo/bar/mainwindow.bamld
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://defaultcontainer/MainWindow.xamld
|
unknown
|
||
http://foo/MainWindow.xaml
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
|
ProgramId
|
||
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
|
FileId
|
||
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
|
LowerCaseLongPath
|
||
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
|
LongPathHash
|
||
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
|
Name
|
||
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
|
OriginalFileName
|
||
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
|
Publisher
|
||
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
|
Version
|
||
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
|
BinFileVersion
|
||
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
|
BinaryType
|
||
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
|
ProductName
|
||
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
|
ProductVersion
|
||
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
|
LinkDate
|
||
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
|
BinProductVersion
|
||
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
|
AppxPackageFullName
|
||
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
|
Size
|
||
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
|
Language
|
||
\REGISTRY\A\{f57ed935-4545-d749-0b16-6396f45835dd}\Root\InventoryApplicationFile\document for shi|3497bddfdbe0b019
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C00DA5911BCE
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
134000
|
unkown
|
page readonly
|
||
4F6000
|
stack
|
page read and write
|
||
471E000
|
stack
|
page read and write
|
||
233D000
|
trusted library allocation
|
page execute and read and write
|
||
2330000
|
trusted library allocation
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
2530000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
24EF000
|
stack
|
page read and write
|
||
234A000
|
trusted library allocation
|
page execute and read and write
|
||
71E000
|
heap
|
page read and write
|
||
2390000
|
trusted library allocation
|
page read and write
|
||
3589000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
2370000
|
trusted library allocation
|
page read and write
|
||
3591000
|
trusted library allocation
|
page read and write
|
||
2380000
|
trusted library allocation
|
page execute and read and write
|
||
753000
|
heap
|
page read and write
|
||
2346000
|
trusted library allocation
|
page execute and read and write
|
||
235B000
|
trusted library allocation
|
page execute and read and write
|
||
718000
|
heap
|
page read and write
|
||
2357000
|
trusted library allocation
|
page execute and read and write
|
||
4EC0000
|
trusted library section
|
page read and write
|
||
6F421000
|
unkown
|
page execute read
|
||
4A60000
|
heap
|
page read and write
|
||
2324000
|
trusted library allocation
|
page read and write
|
||
B7F000
|
stack
|
page read and write
|
||
4B9E000
|
stack
|
page read and write
|
||
2578000
|
heap
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
82000
|
unkown
|
page readonly
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
78D000
|
heap
|
page read and write
|
||
7B2000
|
heap
|
page read and write
|
||
2355000
|
trusted library allocation
|
page execute and read and write
|
||
6F43F000
|
unkown
|
page readonly
|
||
3815000
|
trusted library allocation
|
page read and write
|
||
2336000
|
trusted library allocation
|
page read and write
|
||
23A0000
|
heap
|
page execute and read and write
|
||
3581000
|
trusted library allocation
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
797000
|
heap
|
page read and write
|
||
23EE000
|
stack
|
page read and write
|
||
3587000
|
trusted library allocation
|
page read and write
|
||
252D000
|
stack
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
2570000
|
heap
|
page read and write
|
||
4BC0000
|
heap
|
page execute and read and write
|
||
745000
|
heap
|
page read and write
|
||
358D000
|
trusted library allocation
|
page read and write
|
||
A7F000
|
stack
|
page read and write
|
||
2581000
|
trusted library allocation
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
1CA000
|
stack
|
page read and write
|
||
2340000
|
trusted library allocation
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
heap
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
6F420000
|
unkown
|
page readonly
|
||
960000
|
trusted library allocation
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
69E000
|
stack
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
2641000
|
trusted library allocation
|
page read and write
|
||
6F43D000
|
unkown
|
page read and write
|
||
2323000
|
trusted library allocation
|
page execute and read and write
|
||
6F436000
|
unkown
|
page readonly
|
||
160000
|
heap
|
page read and write
|
||
232D000
|
trusted library allocation
|
page execute and read and write
|
||
78B000
|
heap
|
page read and write
|
There are 63 hidden memdumps, click here to show them.