IOC Report
N8QA5o2CZi

loading gif

Files

File Path
Type
Category
Malicious
N8QA5o2CZi.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_N8QA5o2CZi.exe_78b0c9615299cb947983b54d532b6d7373f784c_fcd62567_4e9c4169-3992-4df2-adf1-443e486e4bc8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBFBE.tmp.dmp
Mini DuMP crash report, 14 streams, Fri May 24 03:26:03 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBFFE.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC04D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\N8QA5o2CZi.exe
"C:\Users\user\Desktop\N8QA5o2CZi.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6432 -s 232

URLs

Name
IP
Malicious
http://upx.sf.net
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsusersIncIEEERootCA.cr
unknown
http://pki-ocsp.symauth.com0
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{88eb31a6-9517-637e-be01-f887af2b037e}\Root\InventoryApplicationFile\n8qa5o2czi.exe|f4089c14fca3c69
ProgramId
\REGISTRY\A\{88eb31a6-9517-637e-be01-f887af2b037e}\Root\InventoryApplicationFile\n8qa5o2czi.exe|f4089c14fca3c69
FileId
\REGISTRY\A\{88eb31a6-9517-637e-be01-f887af2b037e}\Root\InventoryApplicationFile\n8qa5o2czi.exe|f4089c14fca3c69
LowerCaseLongPath
\REGISTRY\A\{88eb31a6-9517-637e-be01-f887af2b037e}\Root\InventoryApplicationFile\n8qa5o2czi.exe|f4089c14fca3c69
LongPathHash
\REGISTRY\A\{88eb31a6-9517-637e-be01-f887af2b037e}\Root\InventoryApplicationFile\n8qa5o2czi.exe|f4089c14fca3c69
Name
\REGISTRY\A\{88eb31a6-9517-637e-be01-f887af2b037e}\Root\InventoryApplicationFile\n8qa5o2czi.exe|f4089c14fca3c69
OriginalFileName
\REGISTRY\A\{88eb31a6-9517-637e-be01-f887af2b037e}\Root\InventoryApplicationFile\n8qa5o2czi.exe|f4089c14fca3c69
Publisher
\REGISTRY\A\{88eb31a6-9517-637e-be01-f887af2b037e}\Root\InventoryApplicationFile\n8qa5o2czi.exe|f4089c14fca3c69
Version
\REGISTRY\A\{88eb31a6-9517-637e-be01-f887af2b037e}\Root\InventoryApplicationFile\n8qa5o2czi.exe|f4089c14fca3c69
BinFileVersion
\REGISTRY\A\{88eb31a6-9517-637e-be01-f887af2b037e}\Root\InventoryApplicationFile\n8qa5o2czi.exe|f4089c14fca3c69
BinaryType
\REGISTRY\A\{88eb31a6-9517-637e-be01-f887af2b037e}\Root\InventoryApplicationFile\n8qa5o2czi.exe|f4089c14fca3c69
ProductName
\REGISTRY\A\{88eb31a6-9517-637e-be01-f887af2b037e}\Root\InventoryApplicationFile\n8qa5o2czi.exe|f4089c14fca3c69
ProductVersion
\REGISTRY\A\{88eb31a6-9517-637e-be01-f887af2b037e}\Root\InventoryApplicationFile\n8qa5o2czi.exe|f4089c14fca3c69
LinkDate
\REGISTRY\A\{88eb31a6-9517-637e-be01-f887af2b037e}\Root\InventoryApplicationFile\n8qa5o2czi.exe|f4089c14fca3c69
BinProductVersion
\REGISTRY\A\{88eb31a6-9517-637e-be01-f887af2b037e}\Root\InventoryApplicationFile\n8qa5o2czi.exe|f4089c14fca3c69
AppxPackageFullName
\REGISTRY\A\{88eb31a6-9517-637e-be01-f887af2b037e}\Root\InventoryApplicationFile\n8qa5o2czi.exe|f4089c14fca3c69
AppxPackageRelativeId
\REGISTRY\A\{88eb31a6-9517-637e-be01-f887af2b037e}\Root\InventoryApplicationFile\n8qa5o2czi.exe|f4089c14fca3c69
Size
\REGISTRY\A\{88eb31a6-9517-637e-be01-f887af2b037e}\Root\InventoryApplicationFile\n8qa5o2czi.exe|f4089c14fca3c69
Language
\REGISTRY\A\{88eb31a6-9517-637e-be01-f887af2b037e}\Root\InventoryApplicationFile\n8qa5o2czi.exe|f4089c14fca3c69
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7D1000
unkown
page execute and write copy
190000
heap
page read and write
11BD000
unkown
page execute and read and write
11C0000
unkown
page execute and write copy
A11000
unkown
page execute and write copy
5C6D000
stack
page read and write
12D000
stack
page read and write
A16000
unkown
page readonly
1A0000
heap
page read and write
A16000
unkown
page readonly
7D0000
unkown
page readonly
A11000
unkown
page execute and write copy
7F2000
unkown
page execute and write copy
A27000
unkown
page execute and write copy
7D0000
unkown
page readonly
7F2000
unkown
page execute and write copy
7D1000
unkown
page execute and write copy
5E20000
heap
page read and write
11C0000
unkown
page execute and read and write
A27000
unkown
page execute and write copy
7FE000
unkown
page execute and write copy
180000
heap
page read and write
5E2D000
heap
page read and write
7FE000
unkown
page execute and write copy
11BD000
unkown
page execute and write copy
5E2A000
heap
page read and write
There are 16 hidden memdumps, click here to show them.