IOC Report
6TAV5gMNBX.exe

loading gif

Files

File Path
Type
Category
Malicious
6TAV5gMNBX.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_6TAV5gMNBX.exe_5bcee375703a666167dbb9e7f3124c216df9de2f_a9778c24_2a40b31a-c82e-41ba-8673-aa5c75ee1375\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER11BB.tmp.dmp
Mini DuMP crash report, 16 streams, Wed Jul 3 14:34:41 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER12E5.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1315.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\6TAV5gMNBX.exe
"C:\Users\user\Desktop\6TAV5gMNBX.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7116 -s 808

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
ProgramId
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
FileId
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
LowerCaseLongPath
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
LongPathHash
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
Name
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
OriginalFileName
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
Publisher
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
Version
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
BinFileVersion
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
BinaryType
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
ProductName
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
ProductVersion
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
LinkDate
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
BinProductVersion
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
AppxPackageFullName
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
AppxPackageRelativeId
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
Size
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
Language
\REGISTRY\A\{8c64c205-2b3b-ec2e-42ca-f4cf97a960f6}\Root\InventoryApplicationFile\6tav5gmnbx.exe|62d1340b4a08a133
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
226881E0000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
71D27FE000
stack
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
71D26FF000
stack
page read and write
71D28FF000
stack
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
22688223000
heap
page read and write
226882A0000
heap
page read and write
22688450000
heap
page read and write
22688130000
heap
page read and write
71D2BFE000
stack
page read and write
22688160000
heap
page read and write
22688263000
heap
page read and write
71D2AFD000
stack
page read and write
22688250000
heap
page read and write
22688140000
heap
page read and write
226883D0000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
2268820A000
heap
page read and write
226881E6000
heap
page read and write
71D2DFE000
stack
page read and write
22688216000
heap
page read and write
7FF4F3530000
trusted library allocation
page execute and read and write
7FF848E22000
trusted library allocation
page read and write
22688220000
heap
page read and write
71D2CFF000
stack
page read and write
7FF848EC0000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
226882AE000
heap
page read and write
226881EC000
heap
page read and write
7FF848E24000
trusted library allocation
page read and write
22688535000
heap
page read and write
226883C0000
trusted library allocation
page read and write
226880A0000
unkown
page readonly
7FF848ECC000
trusted library allocation
page execute and read and write
22689DB0000
heap
page execute and read and write
22699DC9000
trusted library allocation
page read and write
22688180000
heap
page read and write
226881D0000
trusted library allocation
page read and write
22688284000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
7FF848EF6000
trusted library allocation
page execute and read and write
22699DC1000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
7FF848E14000
trusted library allocation
page read and write
22699DC3000
trusted library allocation
page read and write
22688455000
heap
page read and write
226880A2000
unkown
page readonly
22688214000
heap
page read and write
22688520000
heap
page read and write
226883D3000
trusted library allocation
page read and write
22689DC1000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
22689DA0000
heap
page execute and read and write
71D23F7000
stack
page read and write
22688530000
heap
page read and write
22688254000
heap
page read and write
71D29FE000
stack
page read and write
There are 50 hidden memdumps, click here to show them.