IOC Report
oqIz1tfl5h.exe

loading gif

Files

File Path
Type
Category
Malicious
oqIz1tfl5h.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_oqIz1tfl5h.exe_8b25a4823396b63ca5f0c2731cd36d3d9d2b70_5e1584ab_dc847be6-2db6-4642-b464-c40d110148c5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB777.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Oct 26 17:03:11 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB872.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB893.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\oqIz1tfl5h.exe
"C:\Users\user\Desktop\oqIz1tfl5h.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 1308

URLs

Name
IP
Malicious
http://62.204.41.177/
62.204.41.177
malicious
http://62.204.41.177/edd20096ecef326d.php
62.204.41.177
malicious
http://62.204.41.177
unknown
malicious
http://62.204.41.177/edd20096ecef326d.php~
unknown
http://upx.sf.net
unknown
http://62.204.41.177/5PIX:
unknown
http://62.204.41.177/edd20096ecef326d.php8
unknown
http://62.204.41.177/edd20096ecef326d.phpsktop
unknown
http://62.204.41.177/edd20096ecef326d.php4
unknown
http://62.204.41.177/edd20096ecef326d.phpT
unknown
http://62.204.41.177/ows
unknown
http://62.204.41.177/edd20096ecef326d.phptBWX
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
62.204.41.177
unknown
United Kingdom
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{610f3ae2-5d16-d0a5-8670-283c01253a4c}\Root\InventoryApplicationFile\oqiz1tfl5h.exe|c6f6071b7b90879b
ProgramId
\REGISTRY\A\{610f3ae2-5d16-d0a5-8670-283c01253a4c}\Root\InventoryApplicationFile\oqiz1tfl5h.exe|c6f6071b7b90879b
FileId
\REGISTRY\A\{610f3ae2-5d16-d0a5-8670-283c01253a4c}\Root\InventoryApplicationFile\oqiz1tfl5h.exe|c6f6071b7b90879b
LowerCaseLongPath
\REGISTRY\A\{610f3ae2-5d16-d0a5-8670-283c01253a4c}\Root\InventoryApplicationFile\oqiz1tfl5h.exe|c6f6071b7b90879b
LongPathHash
\REGISTRY\A\{610f3ae2-5d16-d0a5-8670-283c01253a4c}\Root\InventoryApplicationFile\oqiz1tfl5h.exe|c6f6071b7b90879b
Name
\REGISTRY\A\{610f3ae2-5d16-d0a5-8670-283c01253a4c}\Root\InventoryApplicationFile\oqiz1tfl5h.exe|c6f6071b7b90879b
OriginalFileName
\REGISTRY\A\{610f3ae2-5d16-d0a5-8670-283c01253a4c}\Root\InventoryApplicationFile\oqiz1tfl5h.exe|c6f6071b7b90879b
Publisher
\REGISTRY\A\{610f3ae2-5d16-d0a5-8670-283c01253a4c}\Root\InventoryApplicationFile\oqiz1tfl5h.exe|c6f6071b7b90879b
Version
\REGISTRY\A\{610f3ae2-5d16-d0a5-8670-283c01253a4c}\Root\InventoryApplicationFile\oqiz1tfl5h.exe|c6f6071b7b90879b
BinFileVersion
\REGISTRY\A\{610f3ae2-5d16-d0a5-8670-283c01253a4c}\Root\InventoryApplicationFile\oqiz1tfl5h.exe|c6f6071b7b90879b
BinaryType
\REGISTRY\A\{610f3ae2-5d16-d0a5-8670-283c01253a4c}\Root\InventoryApplicationFile\oqiz1tfl5h.exe|c6f6071b7b90879b
ProductName
\REGISTRY\A\{610f3ae2-5d16-d0a5-8670-283c01253a4c}\Root\InventoryApplicationFile\oqiz1tfl5h.exe|c6f6071b7b90879b
ProductVersion
\REGISTRY\A\{610f3ae2-5d16-d0a5-8670-283c01253a4c}\Root\InventoryApplicationFile\oqiz1tfl5h.exe|c6f6071b7b90879b
LinkDate
\REGISTRY\A\{610f3ae2-5d16-d0a5-8670-283c01253a4c}\Root\InventoryApplicationFile\oqiz1tfl5h.exe|c6f6071b7b90879b
BinProductVersion
\REGISTRY\A\{610f3ae2-5d16-d0a5-8670-283c01253a4c}\Root\InventoryApplicationFile\oqiz1tfl5h.exe|c6f6071b7b90879b
AppxPackageFullName
\REGISTRY\A\{610f3ae2-5d16-d0a5-8670-283c01253a4c}\Root\InventoryApplicationFile\oqiz1tfl5h.exe|c6f6071b7b90879b
AppxPackageRelativeId
\REGISTRY\A\{610f3ae2-5d16-d0a5-8670-283c01253a4c}\Root\InventoryApplicationFile\oqiz1tfl5h.exe|c6f6071b7b90879b
Size
\REGISTRY\A\{610f3ae2-5d16-d0a5-8670-283c01253a4c}\Root\InventoryApplicationFile\oqiz1tfl5h.exe|c6f6071b7b90879b
Language
\REGISTRY\A\{610f3ae2-5d16-d0a5-8670-283c01253a4c}\Root\InventoryApplicationFile\oqiz1tfl5h.exe|c6f6071b7b90879b
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2E24000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
3020000
direct allocation
page execute and read and write
malicious
3070000
direct allocation
page read and write
malicious
3090000
heap
page read and write
43C000
unkown
page readonly
40E000
unkown
page execute read
2B46000
unkown
page readonly
65C000
unkown
page execute and read and write
1F0000
heap
page read and write
2C8E000
stack
page read and write
2E5A000
heap
page read and write
48AE000
stack
page read and write
2CB5000
heap
page read and write
49C3000
heap
page read and write
1D15F000
stack
page read and write
2B46000
unkown
page readonly
301F000
stack
page read and write
1CEDE000
stack
page read and write
49C0000
heap
page read and write
2DE0000
heap
page read and write
2E7B000
heap
page read and write
30C0000
heap
page read and write
1CD9F000
stack
page read and write
195000
stack
page read and write
492E000
stack
page read and write
2F1E000
stack
page read and write
401000
unkown
page execute read
1CA9F000
stack
page read and write
2C40000
heap
page read and write
64A000
unkown
page execute and read and write
43F000
unkown
page write copy
1CB9F000
stack
page read and write
9C000
stack
page read and write
1CC9F000
stack
page read and write
1D01D000
stack
page read and write
4E2000
unkown
page execute and read and write
4BD000
unkown
page execute and read and write
2DBF000
stack
page read and write
48EE000
stack
page read and write
4960000
heap
page read and write
2DFA000
heap
page execute and read and write
4B1000
unkown
page execute and read and write
400000
unkown
page readonly
1CF1E000
stack
page read and write
49AE000
stack
page read and write
2CB0000
heap
page read and write
19C000
stack
page read and write
1D05E000
stack
page read and write
2DEA000
heap
page read and write
1CDDE000
stack
page read and write
2DEE000
heap
page read and write
There are 42 hidden memdumps, click here to show them.