Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_2db7612a235b1823c476f2f7c37c3d2280d4ef70_4149fb10_1ad28681\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER68D7.tmp.dmp
|
Mini DuMP crash report, 15 streams, Wed Jun 7 00:18:22 2023, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER73C5.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7462.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
C:\Users\user\Desktop\file.exe
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 5788 -s 944
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{d378e567-adf1-2253-e69f-f4985a52b053}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProgramId
|
||
\REGISTRY\A\{d378e567-adf1-2253-e69f-f4985a52b053}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
FileId
|
||
\REGISTRY\A\{d378e567-adf1-2253-e69f-f4985a52b053}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LowerCaseLongPath
|
||
\REGISTRY\A\{d378e567-adf1-2253-e69f-f4985a52b053}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LongPathHash
|
||
\REGISTRY\A\{d378e567-adf1-2253-e69f-f4985a52b053}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Name
|
||
\REGISTRY\A\{d378e567-adf1-2253-e69f-f4985a52b053}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Publisher
|
||
\REGISTRY\A\{d378e567-adf1-2253-e69f-f4985a52b053}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Version
|
||
\REGISTRY\A\{d378e567-adf1-2253-e69f-f4985a52b053}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinFileVersion
|
||
\REGISTRY\A\{d378e567-adf1-2253-e69f-f4985a52b053}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinaryType
|
||
\REGISTRY\A\{d378e567-adf1-2253-e69f-f4985a52b053}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProductName
|
||
\REGISTRY\A\{d378e567-adf1-2253-e69f-f4985a52b053}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProductVersion
|
||
\REGISTRY\A\{d378e567-adf1-2253-e69f-f4985a52b053}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LinkDate
|
||
\REGISTRY\A\{d378e567-adf1-2253-e69f-f4985a52b053}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinProductVersion
|
||
\REGISTRY\A\{d378e567-adf1-2253-e69f-f4985a52b053}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Size
|
||
\REGISTRY\A\{d378e567-adf1-2253-e69f-f4985a52b053}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Language
|
||
\REGISTRY\A\{d378e567-adf1-2253-e69f-f4985a52b053}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
IsPeFile
|
||
\REGISTRY\A\{d378e567-adf1-2253-e69f-f4985a52b053}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
IsOsComponent
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
00184008C5A0EBAC
|
There are 12 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1377C000
|
trusted library allocation
|
page read and write
|
||
1B2D0000
|
trusted library section
|
page read and write
|
||
12A31000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
18543D13000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
7FF9A54F3000
|
trusted library allocation
|
page execute and read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
A54000
|
trusted library allocation
|
page read and write
|
||
18543A23000
|
unkown
|
page read and write
|
||
B37000
|
heap
|
page read and write
|
||
18543A28000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page execute and read and write
|
||
49AB3FE000
|
stack
|
page read and write
|
||
7FF9A5610000
|
trusted library allocation
|
page execute and read and write
|
||
7FF9A5500000
|
trusted library allocation
|
page read and write
|
||
12A23000
|
trusted library allocation
|
page read and write
|
||
7FF496F40000
|
trusted library allocation
|
page execute and read and write
|
||
2C0000
|
unkown
|
page readonly
|
||
1AE8D000
|
stack
|
page read and write
|
||
A61000
|
trusted library allocation
|
page read and write
|
||
A51000
|
trusted library allocation
|
page read and write
|
||
18543A38000
|
heap
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
12A28000
|
trusted library allocation
|
page read and write
|
||
18543A02000
|
unkown
|
page read and write
|
||
18543A0D000
|
unkown
|
page read and write
|
||
2A3C000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
7FF9A55A0000
|
trusted library allocation
|
page read and write
|
||
754000
|
stack
|
page read and write
|
||
AEC000
|
heap
|
page read and write
|
||
7FF9A5502000
|
trusted library allocation
|
page read and write
|
||
B6F000
|
heap
|
page read and write
|
||
7FF9A5696000
|
trusted library allocation
|
page read and write
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
18543A00000
|
unkown
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
AEE000
|
heap
|
page read and write
|
||
7FF9A5692000
|
trusted library allocation
|
page read and write
|
||
7FF9A554C000
|
trusted library allocation
|
page execute and read and write
|
||
18543B15000
|
trusted library allocation
|
page read and write
|
||
AE7000
|
heap
|
page read and write
|
||
185437B0000
|
trusted library allocation
|
page read and write
|
||
18543B00000
|
trusted library allocation
|
page read and write
|
||
B49000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
18543B02000
|
trusted library allocation
|
page read and write
|
||
7FF9A55B0000
|
trusted library allocation
|
page execute and read and write
|
||
F8F000
|
stack
|
page read and write
|
||
7FF9A54F4000
|
trusted library allocation
|
page read and write
|
||
AFF000
|
heap
|
page read and write
|
||
7FF9A5508000
|
trusted library allocation
|
page read and write
|
||
2C2000
|
unkown
|
page readonly
|
||
7F0000
|
heap
|
page read and write
|
||
7FF9A55A6000
|
trusted library allocation
|
page read and write
|
||
7F5000
|
heap
|
page read and write
|
||
7FF9A54FD000
|
trusted library allocation
|
page execute and read and write
|
||
49AB4F9000
|
stack
|
page read and write
|
||
18543A13000
|
unkown
|
page read and write
|
||
1B2CF000
|
stack
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
49AADED000
|
stack
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
B9A000
|
heap
|
page read and write
|
||
185437A0000
|
heap
|
page read and write
|
||
7FF9A5514000
|
trusted library allocation
|
page read and write
|
||
49AB2FF000
|
stack
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
A90000
|
trusted library allocation
|
page read and write
|
||
18543A20000
|
unkown
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
2C0000
|
unkown
|
page readonly
|
||
18543B23000
|
heap
|
page read and write
|
||
7FF9A5510000
|
trusted library allocation
|
page read and write
|
||
7FF9A551D000
|
trusted library allocation
|
page execute and read and write
|
||
2A10000
|
heap
|
page execute and read and write
|
||
B4B000
|
heap
|
page read and write
|
||
B33000
|
heap
|
page read and write
|
||
ACC000
|
heap
|
page read and write
|
||
18543D02000
|
heap
|
page read and write
|
||
18543C13000
|
heap
|
page read and write
|
||
7FF9A55D6000
|
trusted library allocation
|
page execute and read and write
|
||
282E000
|
stack
|
page read and write
|
||
18543C02000
|
heap
|
page read and write
|
||
18543D00000
|
heap
|
page read and write
|
||
12A21000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
49AB17F000
|
stack
|
page read and write
|
||
18543810000
|
heap
|
page read and write
|
||
AFB000
|
heap
|
page read and write
|
||
B03000
|
heap
|
page read and write
|
||
AB0000
|
trusted library allocation
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
A64000
|
trusted library allocation
|
page read and write
|
||
2A21000
|
trusted library allocation
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
There are 88 hidden memdumps, click here to show them.