IOC Report
PI No 20000814C.exe

loading gif

Files

File Path
Type
Category
Malicious
PI No 20000814C.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_PI No 20000814C._a57618b41515ff9a6eee1ffe6c8e07652c9a3_194af5ac_d6ddeb29-df61-48d3-b221-d18d1e03fe73\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERACA6.tmp.dmp
Mini DuMP crash report, 14 streams, Mon May 27 10:19:37 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAD53.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAD73.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PI No 20000814C.exe
"C:\Users\user\Desktop\PI No 20000814C.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 532

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{62ab7685-4b7d-2a02-917d-f0c7a22d1b3c}\Root\InventoryApplicationFile\pi no 20000814c.|eabc7d6156601d8
ProgramId
\REGISTRY\A\{62ab7685-4b7d-2a02-917d-f0c7a22d1b3c}\Root\InventoryApplicationFile\pi no 20000814c.|eabc7d6156601d8
FileId
\REGISTRY\A\{62ab7685-4b7d-2a02-917d-f0c7a22d1b3c}\Root\InventoryApplicationFile\pi no 20000814c.|eabc7d6156601d8
LowerCaseLongPath
\REGISTRY\A\{62ab7685-4b7d-2a02-917d-f0c7a22d1b3c}\Root\InventoryApplicationFile\pi no 20000814c.|eabc7d6156601d8
LongPathHash
\REGISTRY\A\{62ab7685-4b7d-2a02-917d-f0c7a22d1b3c}\Root\InventoryApplicationFile\pi no 20000814c.|eabc7d6156601d8
Name
\REGISTRY\A\{62ab7685-4b7d-2a02-917d-f0c7a22d1b3c}\Root\InventoryApplicationFile\pi no 20000814c.|eabc7d6156601d8
OriginalFileName
\REGISTRY\A\{62ab7685-4b7d-2a02-917d-f0c7a22d1b3c}\Root\InventoryApplicationFile\pi no 20000814c.|eabc7d6156601d8
Publisher
\REGISTRY\A\{62ab7685-4b7d-2a02-917d-f0c7a22d1b3c}\Root\InventoryApplicationFile\pi no 20000814c.|eabc7d6156601d8
Version
\REGISTRY\A\{62ab7685-4b7d-2a02-917d-f0c7a22d1b3c}\Root\InventoryApplicationFile\pi no 20000814c.|eabc7d6156601d8
BinFileVersion
\REGISTRY\A\{62ab7685-4b7d-2a02-917d-f0c7a22d1b3c}\Root\InventoryApplicationFile\pi no 20000814c.|eabc7d6156601d8
BinaryType
\REGISTRY\A\{62ab7685-4b7d-2a02-917d-f0c7a22d1b3c}\Root\InventoryApplicationFile\pi no 20000814c.|eabc7d6156601d8
ProductName
\REGISTRY\A\{62ab7685-4b7d-2a02-917d-f0c7a22d1b3c}\Root\InventoryApplicationFile\pi no 20000814c.|eabc7d6156601d8
ProductVersion
\REGISTRY\A\{62ab7685-4b7d-2a02-917d-f0c7a22d1b3c}\Root\InventoryApplicationFile\pi no 20000814c.|eabc7d6156601d8
LinkDate
\REGISTRY\A\{62ab7685-4b7d-2a02-917d-f0c7a22d1b3c}\Root\InventoryApplicationFile\pi no 20000814c.|eabc7d6156601d8
BinProductVersion
\REGISTRY\A\{62ab7685-4b7d-2a02-917d-f0c7a22d1b3c}\Root\InventoryApplicationFile\pi no 20000814c.|eabc7d6156601d8
AppxPackageFullName
\REGISTRY\A\{62ab7685-4b7d-2a02-917d-f0c7a22d1b3c}\Root\InventoryApplicationFile\pi no 20000814c.|eabc7d6156601d8
AppxPackageRelativeId
\REGISTRY\A\{62ab7685-4b7d-2a02-917d-f0c7a22d1b3c}\Root\InventoryApplicationFile\pi no 20000814c.|eabc7d6156601d8
Size
\REGISTRY\A\{62ab7685-4b7d-2a02-917d-f0c7a22d1b3c}\Root\InventoryApplicationFile\pi no 20000814c.|eabc7d6156601d8
Language
\REGISTRY\A\{62ab7685-4b7d-2a02-917d-f0c7a22d1b3c}\Root\InventoryApplicationFile\pi no 20000814c.|eabc7d6156601d8
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
EAF000
unkown
page readonly
EDF000
unkown
page write copy
E21000
unkown
page execute read
EE8000
unkown
page readonly
202F000
stack
page read and write
15FC000
stack
page read and write
EE8000
unkown
page readonly
EE3000
unkown
page write copy
1830000
heap
page read and write
ED5000
unkown
page readonly
EE3000
unkown
page write copy
1838000
heap
page read and write
17C0000
heap
page read and write
E20000
unkown
page readonly
3C80000
heap
page read and write
EDF000
unkown
page write copy
FDC000
stack
page read and write
1760000
heap
page read and write
E20000
unkown
page readonly
17AE000
stack
page read and write
E21000
unkown
page execute read
EAF000
unkown
page readonly
242F000
stack
page read and write
ED5000
unkown
page readonly
17D0000
heap
page read and write
1640000
heap
page read and write
175E000
stack
page read and write
There are 17 hidden memdumps, click here to show them.