IOC Report
#U3000Order_shizcon October order %100% S51105P-E01 #Uff08#U898b#U7a4d#U4f9d#U983c#Uff09jpg .exe

loading gif

Files

File Path
Type
Category
Malicious
#U3000Order_shizcon October order %100% S51105P-E01 #Uff08#U898b#U7a4d#U4f9d#U983c#Uff09jpg .exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_#U3000Order_shiz_97ff7d3039296a4f3d3ed724df995b8825aedf7_2ada7f0d_9c96b19e-2e44-44c2-a252-b1b9dbfb37d8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERABFA.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Oct 23 04:39:36 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERACE5.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAD15.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\#U3000Order_shizcon October order %100% S51105P-E01 #Uff08#U898b#U7a4d#U4f9d#U983c#Uff09jpg .exe
"C:\Users\user\Desktop\#U3000Order_shizcon October order %100% S51105P-E01 #Uff08#U898b#U7a4d#U4f9d#U983c#Uff09jpg .exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7500 -s 780

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{49595105-fb69-8553-ad0f-daa4660ef829}\Root\InventoryApplicationFile\#u3000order_shiz|257538255a3b3ace
ProgramId
\REGISTRY\A\{49595105-fb69-8553-ad0f-daa4660ef829}\Root\InventoryApplicationFile\#u3000order_shiz|257538255a3b3ace
FileId
\REGISTRY\A\{49595105-fb69-8553-ad0f-daa4660ef829}\Root\InventoryApplicationFile\#u3000order_shiz|257538255a3b3ace
LowerCaseLongPath
\REGISTRY\A\{49595105-fb69-8553-ad0f-daa4660ef829}\Root\InventoryApplicationFile\#u3000order_shiz|257538255a3b3ace
LongPathHash
\REGISTRY\A\{49595105-fb69-8553-ad0f-daa4660ef829}\Root\InventoryApplicationFile\#u3000order_shiz|257538255a3b3ace
Name
\REGISTRY\A\{49595105-fb69-8553-ad0f-daa4660ef829}\Root\InventoryApplicationFile\#u3000order_shiz|257538255a3b3ace
OriginalFileName
\REGISTRY\A\{49595105-fb69-8553-ad0f-daa4660ef829}\Root\InventoryApplicationFile\#u3000order_shiz|257538255a3b3ace
Publisher
\REGISTRY\A\{49595105-fb69-8553-ad0f-daa4660ef829}\Root\InventoryApplicationFile\#u3000order_shiz|257538255a3b3ace
Version
\REGISTRY\A\{49595105-fb69-8553-ad0f-daa4660ef829}\Root\InventoryApplicationFile\#u3000order_shiz|257538255a3b3ace
BinFileVersion
\REGISTRY\A\{49595105-fb69-8553-ad0f-daa4660ef829}\Root\InventoryApplicationFile\#u3000order_shiz|257538255a3b3ace
BinaryType
\REGISTRY\A\{49595105-fb69-8553-ad0f-daa4660ef829}\Root\InventoryApplicationFile\#u3000order_shiz|257538255a3b3ace
ProductName
\REGISTRY\A\{49595105-fb69-8553-ad0f-daa4660ef829}\Root\InventoryApplicationFile\#u3000order_shiz|257538255a3b3ace
ProductVersion
\REGISTRY\A\{49595105-fb69-8553-ad0f-daa4660ef829}\Root\InventoryApplicationFile\#u3000order_shiz|257538255a3b3ace
LinkDate
\REGISTRY\A\{49595105-fb69-8553-ad0f-daa4660ef829}\Root\InventoryApplicationFile\#u3000order_shiz|257538255a3b3ace
BinProductVersion
\REGISTRY\A\{49595105-fb69-8553-ad0f-daa4660ef829}\Root\InventoryApplicationFile\#u3000order_shiz|257538255a3b3ace
AppxPackageFullName
\REGISTRY\A\{49595105-fb69-8553-ad0f-daa4660ef829}\Root\InventoryApplicationFile\#u3000order_shiz|257538255a3b3ace
AppxPackageRelativeId
\REGISTRY\A\{49595105-fb69-8553-ad0f-daa4660ef829}\Root\InventoryApplicationFile\#u3000order_shiz|257538255a3b3ace
Size
\REGISTRY\A\{49595105-fb69-8553-ad0f-daa4660ef829}\Root\InventoryApplicationFile\#u3000order_shiz|257538255a3b3ace
Language
\REGISTRY\A\{49595105-fb69-8553-ad0f-daa4660ef829}\Root\InventoryApplicationFile\#u3000order_shiz|257538255a3b3ace
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1A70000
heap
page read and write
143D000
heap
page read and write
30F0000
trusted library allocation
page read and write
FA0000
unkown
page readonly
18BF000
stack
page read and write
1454000
heap
page read and write
30A4000
trusted library allocation
page read and write
30DB000
trusted library allocation
page execute and read and write
3090000
trusted library allocation
page read and write
FA2000
unkown
page readonly
1770000
heap
page read and write
546E000
stack
page read and write
3240000
heap
page read and write
5880000
heap
page read and write
3270000
heap
page execute and read and write
1438000
heap
page read and write
17BE000
stack
page read and write
165E000
stack
page read and write
1526000
heap
page read and write
1457000
heap
page read and write
1530000
heap
page read and write
1446000
heap
page read and write
313E000
stack
page read and write
1610000
heap
page read and write
175E000
stack
page read and write
323F000
stack
page read and write
32C0000
heap
page read and write
42D1000
trusted library allocation
page read and write
3260000
trusted library allocation
page execute and read and write
11CC000
stack
page read and write
145D000
heap
page read and write
103A000
unkown
page readonly
1410000
heap
page read and write
30D0000
trusted library allocation
page read and write
30A3000
trusted library allocation
page execute and read and write
10CB000
stack
page read and write
141E000
heap
page read and write
30D7000
trusted library allocation
page execute and read and write
32D1000
trusted library allocation
page read and write
32BD000
stack
page read and write
141B000
heap
page read and write
1520000
heap
page read and write
There are 32 hidden memdumps, click here to show them.