IOC Report
Lostitem.exe

loading gif

Files

File Path
Type
Category
Malicious
Lostitem.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Lostitem.exe_ed5bf9fc84baaaa4fe9d7bc8a34484cefcec24_10c8ff2b_079e8aba-c121-45cb-8fc1-8890f46db496\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDEAB.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Jul 3 17:24:25 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDF48.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDF78.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Lostitem.exe
"C:\Users\user\Desktop\Lostitem.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7576 -s 416

URLs

Name
IP
Malicious
http://139.155.135.230/Name.txt
unknown
http://139.155.135.230/ID.txt
unknown
http://upx.sf.net
unknown
http://www.indyproject.org/
unknown
http://139.155.135.230/ver.txt
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{8721f235-97dc-9936-53b8-dab940e3ae35}\Root\InventoryApplicationFile\lostitem.exe|1c1c18b471a0887e
ProgramId
\REGISTRY\A\{8721f235-97dc-9936-53b8-dab940e3ae35}\Root\InventoryApplicationFile\lostitem.exe|1c1c18b471a0887e
FileId
\REGISTRY\A\{8721f235-97dc-9936-53b8-dab940e3ae35}\Root\InventoryApplicationFile\lostitem.exe|1c1c18b471a0887e
LowerCaseLongPath
\REGISTRY\A\{8721f235-97dc-9936-53b8-dab940e3ae35}\Root\InventoryApplicationFile\lostitem.exe|1c1c18b471a0887e
LongPathHash
\REGISTRY\A\{8721f235-97dc-9936-53b8-dab940e3ae35}\Root\InventoryApplicationFile\lostitem.exe|1c1c18b471a0887e
Name
\REGISTRY\A\{8721f235-97dc-9936-53b8-dab940e3ae35}\Root\InventoryApplicationFile\lostitem.exe|1c1c18b471a0887e
OriginalFileName
\REGISTRY\A\{8721f235-97dc-9936-53b8-dab940e3ae35}\Root\InventoryApplicationFile\lostitem.exe|1c1c18b471a0887e
Publisher
\REGISTRY\A\{8721f235-97dc-9936-53b8-dab940e3ae35}\Root\InventoryApplicationFile\lostitem.exe|1c1c18b471a0887e
Version
\REGISTRY\A\{8721f235-97dc-9936-53b8-dab940e3ae35}\Root\InventoryApplicationFile\lostitem.exe|1c1c18b471a0887e
BinFileVersion
\REGISTRY\A\{8721f235-97dc-9936-53b8-dab940e3ae35}\Root\InventoryApplicationFile\lostitem.exe|1c1c18b471a0887e
BinaryType
\REGISTRY\A\{8721f235-97dc-9936-53b8-dab940e3ae35}\Root\InventoryApplicationFile\lostitem.exe|1c1c18b471a0887e
ProductName
\REGISTRY\A\{8721f235-97dc-9936-53b8-dab940e3ae35}\Root\InventoryApplicationFile\lostitem.exe|1c1c18b471a0887e
ProductVersion
\REGISTRY\A\{8721f235-97dc-9936-53b8-dab940e3ae35}\Root\InventoryApplicationFile\lostitem.exe|1c1c18b471a0887e
LinkDate
\REGISTRY\A\{8721f235-97dc-9936-53b8-dab940e3ae35}\Root\InventoryApplicationFile\lostitem.exe|1c1c18b471a0887e
BinProductVersion
\REGISTRY\A\{8721f235-97dc-9936-53b8-dab940e3ae35}\Root\InventoryApplicationFile\lostitem.exe|1c1c18b471a0887e
AppxPackageFullName
\REGISTRY\A\{8721f235-97dc-9936-53b8-dab940e3ae35}\Root\InventoryApplicationFile\lostitem.exe|1c1c18b471a0887e
AppxPackageRelativeId
\REGISTRY\A\{8721f235-97dc-9936-53b8-dab940e3ae35}\Root\InventoryApplicationFile\lostitem.exe|1c1c18b471a0887e
Size
\REGISTRY\A\{8721f235-97dc-9936-53b8-dab940e3ae35}\Root\InventoryApplicationFile\lostitem.exe|1c1c18b471a0887e
Language
\REGISTRY\A\{8721f235-97dc-9936-53b8-dab940e3ae35}\Root\InventoryApplicationFile\lostitem.exe|1c1c18b471a0887e
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B30000
heap
page read and write
9BA000
unkown
page write copy
EFF000
stack
page read and write
DFE000
stack
page read and write
A44000
unkown
page execute and write copy
9C3000
unkown
page readonly
9C1000
unkown
page readonly
42B000
unkown
page execute read
F65000
heap
page read and write
400000
unkown
page readonly
14C000
stack
page read and write
401000
unkown
page execute read
1C0000
heap
page read and write
F60000
heap
page read and write
190000
heap
page read and write
925000
unkown
page write copy
929000
unkown
page read and write
B37000
heap
page read and write
9BB000
unkown
page read and write
1A0000
heap
page read and write
There are 10 hidden memdumps, click here to show them.