IOC Report
X3wHy1PMMl.exe

loading gif

Files

File Path
Type
Category
Malicious
X3wHy1PMMl.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_X3wHy1PMMl.exe_6fb70a6b89a1fcb85aae6e66dbf2a80fdba22e5_0823464b_4ef544fd-0f3a-45a5-bb27-c9a520d1a7f8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_X3wHy1PMMl.exe_752a80b92e4080208fdb25f4d516950dc99_0823464b_b4369cab-eb03-4b3f-8375-36451f3f54a4\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD925.tmp.dmp
Mini DuMP crash report, 14 streams, Mon May 27 01:02:56 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD974.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD9B4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDB29.tmp.dmp
Mini DuMP crash report, 14 streams, Mon May 27 01:02:56 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDB68.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDB88.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\X3wHy1PMMl.exe
"C:\Users\user\Desktop\X3wHy1PMMl.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6220 -s 228
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6220 -s 236

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{8bbc8f8c-1abb-2bbf-f6f6-d08b3bc60791}\Root\InventoryApplicationFile\x3why1pmml.exe|8dacb4a7529c1b56
ProgramId
\REGISTRY\A\{8bbc8f8c-1abb-2bbf-f6f6-d08b3bc60791}\Root\InventoryApplicationFile\x3why1pmml.exe|8dacb4a7529c1b56
FileId
\REGISTRY\A\{8bbc8f8c-1abb-2bbf-f6f6-d08b3bc60791}\Root\InventoryApplicationFile\x3why1pmml.exe|8dacb4a7529c1b56
LowerCaseLongPath
\REGISTRY\A\{8bbc8f8c-1abb-2bbf-f6f6-d08b3bc60791}\Root\InventoryApplicationFile\x3why1pmml.exe|8dacb4a7529c1b56
LongPathHash
\REGISTRY\A\{8bbc8f8c-1abb-2bbf-f6f6-d08b3bc60791}\Root\InventoryApplicationFile\x3why1pmml.exe|8dacb4a7529c1b56
Name
\REGISTRY\A\{8bbc8f8c-1abb-2bbf-f6f6-d08b3bc60791}\Root\InventoryApplicationFile\x3why1pmml.exe|8dacb4a7529c1b56
OriginalFileName
\REGISTRY\A\{8bbc8f8c-1abb-2bbf-f6f6-d08b3bc60791}\Root\InventoryApplicationFile\x3why1pmml.exe|8dacb4a7529c1b56
Publisher
\REGISTRY\A\{8bbc8f8c-1abb-2bbf-f6f6-d08b3bc60791}\Root\InventoryApplicationFile\x3why1pmml.exe|8dacb4a7529c1b56
Version
\REGISTRY\A\{8bbc8f8c-1abb-2bbf-f6f6-d08b3bc60791}\Root\InventoryApplicationFile\x3why1pmml.exe|8dacb4a7529c1b56
BinFileVersion
\REGISTRY\A\{8bbc8f8c-1abb-2bbf-f6f6-d08b3bc60791}\Root\InventoryApplicationFile\x3why1pmml.exe|8dacb4a7529c1b56
BinaryType
\REGISTRY\A\{8bbc8f8c-1abb-2bbf-f6f6-d08b3bc60791}\Root\InventoryApplicationFile\x3why1pmml.exe|8dacb4a7529c1b56
ProductName
\REGISTRY\A\{8bbc8f8c-1abb-2bbf-f6f6-d08b3bc60791}\Root\InventoryApplicationFile\x3why1pmml.exe|8dacb4a7529c1b56
ProductVersion
\REGISTRY\A\{8bbc8f8c-1abb-2bbf-f6f6-d08b3bc60791}\Root\InventoryApplicationFile\x3why1pmml.exe|8dacb4a7529c1b56
LinkDate
\REGISTRY\A\{8bbc8f8c-1abb-2bbf-f6f6-d08b3bc60791}\Root\InventoryApplicationFile\x3why1pmml.exe|8dacb4a7529c1b56
BinProductVersion
\REGISTRY\A\{8bbc8f8c-1abb-2bbf-f6f6-d08b3bc60791}\Root\InventoryApplicationFile\x3why1pmml.exe|8dacb4a7529c1b56
AppxPackageFullName
\REGISTRY\A\{8bbc8f8c-1abb-2bbf-f6f6-d08b3bc60791}\Root\InventoryApplicationFile\x3why1pmml.exe|8dacb4a7529c1b56
AppxPackageRelativeId
\REGISTRY\A\{8bbc8f8c-1abb-2bbf-f6f6-d08b3bc60791}\Root\InventoryApplicationFile\x3why1pmml.exe|8dacb4a7529c1b56
Size
\REGISTRY\A\{8bbc8f8c-1abb-2bbf-f6f6-d08b3bc60791}\Root\InventoryApplicationFile\x3why1pmml.exe|8dacb4a7529c1b56
Language
\REGISTRY\A\{8bbc8f8c-1abb-2bbf-f6f6-d08b3bc60791}\Root\InventoryApplicationFile\x3why1pmml.exe|8dacb4a7529c1b56
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1F0000
heap
page read and write
410000
unkown
page execute and read and write
640000
heap
page read and write
424000
unkown
page readonly
64E000
heap
page read and write
412000
unkown
page readonly
412000
unkown
page readonly
410000
unkown
page execute and write copy
470000
heap
page read and write
9D000
stack
page read and write
19D000
stack
page read and write
400000
unkown
page readonly
430000
heap
page read and write
400000
unkown
page readonly
64A000
heap
page read and write
424000
unkown
page readonly
There are 6 hidden memdumps, click here to show them.