IOC Report
GIYUCke96G

loading gif

Files

File Path
Type
Category
Malicious
GIYUCke96G.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_GIYUCke96G.exe_4f8fc75c7ae03519ba32df973fcbeda86d1ecbbb_135d818b_9064d5b3-0f98-489e-9c5d-f62a688a6a9c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD900.tmp.dmp
Mini DuMP crash report, 15 streams, Fri May 24 03:25:24 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDBFF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDCBB.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\GIYUCke96G.exe
"C:\Users\user\Desktop\GIYUCke96G.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2724 -s 396

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{4a08a453-3383-06ad-d11e-c40f5b3e06fd}\Root\InventoryApplicationFile\giyucke96g.exe|cdbc945deccebc26
ProgramId
\REGISTRY\A\{4a08a453-3383-06ad-d11e-c40f5b3e06fd}\Root\InventoryApplicationFile\giyucke96g.exe|cdbc945deccebc26
FileId
\REGISTRY\A\{4a08a453-3383-06ad-d11e-c40f5b3e06fd}\Root\InventoryApplicationFile\giyucke96g.exe|cdbc945deccebc26
LowerCaseLongPath
\REGISTRY\A\{4a08a453-3383-06ad-d11e-c40f5b3e06fd}\Root\InventoryApplicationFile\giyucke96g.exe|cdbc945deccebc26
LongPathHash
\REGISTRY\A\{4a08a453-3383-06ad-d11e-c40f5b3e06fd}\Root\InventoryApplicationFile\giyucke96g.exe|cdbc945deccebc26
Name
\REGISTRY\A\{4a08a453-3383-06ad-d11e-c40f5b3e06fd}\Root\InventoryApplicationFile\giyucke96g.exe|cdbc945deccebc26
OriginalFileName
\REGISTRY\A\{4a08a453-3383-06ad-d11e-c40f5b3e06fd}\Root\InventoryApplicationFile\giyucke96g.exe|cdbc945deccebc26
Publisher
\REGISTRY\A\{4a08a453-3383-06ad-d11e-c40f5b3e06fd}\Root\InventoryApplicationFile\giyucke96g.exe|cdbc945deccebc26
Version
\REGISTRY\A\{4a08a453-3383-06ad-d11e-c40f5b3e06fd}\Root\InventoryApplicationFile\giyucke96g.exe|cdbc945deccebc26
BinFileVersion
\REGISTRY\A\{4a08a453-3383-06ad-d11e-c40f5b3e06fd}\Root\InventoryApplicationFile\giyucke96g.exe|cdbc945deccebc26
BinaryType
\REGISTRY\A\{4a08a453-3383-06ad-d11e-c40f5b3e06fd}\Root\InventoryApplicationFile\giyucke96g.exe|cdbc945deccebc26
ProductName
\REGISTRY\A\{4a08a453-3383-06ad-d11e-c40f5b3e06fd}\Root\InventoryApplicationFile\giyucke96g.exe|cdbc945deccebc26
ProductVersion
\REGISTRY\A\{4a08a453-3383-06ad-d11e-c40f5b3e06fd}\Root\InventoryApplicationFile\giyucke96g.exe|cdbc945deccebc26
LinkDate
\REGISTRY\A\{4a08a453-3383-06ad-d11e-c40f5b3e06fd}\Root\InventoryApplicationFile\giyucke96g.exe|cdbc945deccebc26
BinProductVersion
\REGISTRY\A\{4a08a453-3383-06ad-d11e-c40f5b3e06fd}\Root\InventoryApplicationFile\giyucke96g.exe|cdbc945deccebc26
AppxPackageFullName
\REGISTRY\A\{4a08a453-3383-06ad-d11e-c40f5b3e06fd}\Root\InventoryApplicationFile\giyucke96g.exe|cdbc945deccebc26
AppxPackageRelativeId
\REGISTRY\A\{4a08a453-3383-06ad-d11e-c40f5b3e06fd}\Root\InventoryApplicationFile\giyucke96g.exe|cdbc945deccebc26
Size
\REGISTRY\A\{4a08a453-3383-06ad-d11e-c40f5b3e06fd}\Root\InventoryApplicationFile\giyucke96g.exe|cdbc945deccebc26
Language
\REGISTRY\A\{4a08a453-3383-06ad-d11e-c40f5b3e06fd}\Root\InventoryApplicationFile\giyucke96g.exe|cdbc945deccebc26
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
140000000
unkown
page readonly
1402BA000
unkown
page readonly
1D0000
heap
page read and write
1402E1000
unkown
page readonly
1A0000
heap
page read and write
5EA000
heap
page read and write
129000
stack
page read and write
7BE000
stack
page read and write
140000000
unkown
page readonly
2230000
heap
page read and write
140001000
unkown
page execute read
116000
stack
page read and write
1402CD000
unkown
page write copy
8BF000
stack
page read and write
1402BA000
unkown
page readonly
1402CD000
unkown
page write copy
5C9000
heap
page read and write
5CC000
heap
page read and write
520000
unclassified section
page execute and read and write
1402E1000
unkown
page readonly
5C0000
heap
page read and write
1402D5000
unkown
page read and write
140001000
unkown
page execute read
112000
stack
page read and write
190000
heap
page read and write
There are 15 hidden memdumps, click here to show them.