IOC Report
716b3c89802c1713871667444720e62f3fc064c9910a1.exe

loading gif

Files

File Path
Type
Category
Malicious
716b3c89802c1713871667444720e62f3fc064c9910a1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_716b3c89802c1713_f8ccb22a4c4c31327f9e350947f1b8aa63c20b9_f8134531_a8e8b695-8c6e-41e2-aafd-4f2ff9090335\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4AB4.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Oct 26 17:03:13 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4B8F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4BDE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exe
"C:\Users\user\Desktop\716b3c89802c1713871667444720e62f3fc064c9910a1.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7652 -s 1060

URLs

Name
IP
Malicious
http://62.204.41.177/edd20096ecef326d.php
62.204.41.177
malicious
http://62.204.41.177/
62.204.41.177
malicious
http://62.204.41.177
unknown
malicious
http://62.204.41.177/edd20096ecef326d.phpz(
unknown
http://62.204.41.177/edd20096ecef326d.phpO
unknown
http://62.204.41.177-
unknown
http://62.204.41.177/edd20096ecef326d.php&(
unknown
http://62.204.41.177/edd20096ecef326d.php~
unknown
http://62.204.41.177/9
unknown
http://upx.sf.net
unknown
http://62.204.41.177/edd20096ecef326d.php1f-9bc86c8e8c94
unknown
http://62.204.41.177/3#
unknown
http://62.204.41.177/edd20096ecef326d.phpy
unknown
http://62.204.41.177/ows
unknown
http://62.204.41.177/D
unknown
http://62.204.41.177/edd20096ecef326d.phpB
unknown
http://62.204.41.177Cc$
unknown
There are 7 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
62.204.41.177
unknown
United Kingdom
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{7030950a-e1a2-8c77-9059-0ed508e8e466}\Root\InventoryApplicationFile\716b3c89802c1713|f2f8e366cc5d334d
ProgramId
\REGISTRY\A\{7030950a-e1a2-8c77-9059-0ed508e8e466}\Root\InventoryApplicationFile\716b3c89802c1713|f2f8e366cc5d334d
FileId
\REGISTRY\A\{7030950a-e1a2-8c77-9059-0ed508e8e466}\Root\InventoryApplicationFile\716b3c89802c1713|f2f8e366cc5d334d
LowerCaseLongPath
\REGISTRY\A\{7030950a-e1a2-8c77-9059-0ed508e8e466}\Root\InventoryApplicationFile\716b3c89802c1713|f2f8e366cc5d334d
LongPathHash
\REGISTRY\A\{7030950a-e1a2-8c77-9059-0ed508e8e466}\Root\InventoryApplicationFile\716b3c89802c1713|f2f8e366cc5d334d
Name
\REGISTRY\A\{7030950a-e1a2-8c77-9059-0ed508e8e466}\Root\InventoryApplicationFile\716b3c89802c1713|f2f8e366cc5d334d
OriginalFileName
\REGISTRY\A\{7030950a-e1a2-8c77-9059-0ed508e8e466}\Root\InventoryApplicationFile\716b3c89802c1713|f2f8e366cc5d334d
Publisher
\REGISTRY\A\{7030950a-e1a2-8c77-9059-0ed508e8e466}\Root\InventoryApplicationFile\716b3c89802c1713|f2f8e366cc5d334d
Version
\REGISTRY\A\{7030950a-e1a2-8c77-9059-0ed508e8e466}\Root\InventoryApplicationFile\716b3c89802c1713|f2f8e366cc5d334d
BinFileVersion
\REGISTRY\A\{7030950a-e1a2-8c77-9059-0ed508e8e466}\Root\InventoryApplicationFile\716b3c89802c1713|f2f8e366cc5d334d
BinaryType
\REGISTRY\A\{7030950a-e1a2-8c77-9059-0ed508e8e466}\Root\InventoryApplicationFile\716b3c89802c1713|f2f8e366cc5d334d
ProductName
\REGISTRY\A\{7030950a-e1a2-8c77-9059-0ed508e8e466}\Root\InventoryApplicationFile\716b3c89802c1713|f2f8e366cc5d334d
ProductVersion
\REGISTRY\A\{7030950a-e1a2-8c77-9059-0ed508e8e466}\Root\InventoryApplicationFile\716b3c89802c1713|f2f8e366cc5d334d
LinkDate
\REGISTRY\A\{7030950a-e1a2-8c77-9059-0ed508e8e466}\Root\InventoryApplicationFile\716b3c89802c1713|f2f8e366cc5d334d
BinProductVersion
\REGISTRY\A\{7030950a-e1a2-8c77-9059-0ed508e8e466}\Root\InventoryApplicationFile\716b3c89802c1713|f2f8e366cc5d334d
AppxPackageFullName
\REGISTRY\A\{7030950a-e1a2-8c77-9059-0ed508e8e466}\Root\InventoryApplicationFile\716b3c89802c1713|f2f8e366cc5d334d
AppxPackageRelativeId
\REGISTRY\A\{7030950a-e1a2-8c77-9059-0ed508e8e466}\Root\InventoryApplicationFile\716b3c89802c1713|f2f8e366cc5d334d
Size
\REGISTRY\A\{7030950a-e1a2-8c77-9059-0ed508e8e466}\Root\InventoryApplicationFile\716b3c89802c1713|f2f8e366cc5d334d
Language
\REGISTRY\A\{7030950a-e1a2-8c77-9059-0ed508e8e466}\Root\InventoryApplicationFile\716b3c89802c1713|f2f8e366cc5d334d
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page execute and read and write
malicious
2CF0000
direct allocation
page execute and read and write
malicious
4810000
direct allocation
page read and write
malicious
2EB3000
heap
page read and write
malicious
1CFDE000
stack
page read and write
1CD9E000
stack
page read and write
19C000
stack
page read and write
2C40000
heap
page read and write
49F3000
heap
page read and write
439000
unkown
page readonly
401000
unkown
page execute read
1CB0E000
stack
page read and write
1CC5E000
stack
page read and write
2C8E000
stack
page read and write
49DE000
stack
page read and write
2CE0000
heap
page read and write
4850000
heap
page read and write
1D13D000
stack
page read and write
400000
unkown
page readonly
1D03E000
stack
page read and write
2CCE000
stack
page read and write
1F0000
heap
page read and write
2B43000
unkown
page readonly
1CC0F000
stack
page read and write
43C000
unkown
page write copy
2E7E000
heap
page read and write
2ED7000
heap
page read and write
2EF4000
heap
page read and write
40E000
unkown
page execute read
9C000
stack
page read and write
2E89000
heap
page execute and read and write
2F0B000
heap
page read and write
2E6F000
stack
page read and write
499F000
stack
page read and write
195000
stack
page read and write
2E70000
heap
page read and write
306F000
stack
page read and write
4B1000
unkown
page execute and read and write
1CACF000
stack
page read and write
2D60000
heap
page read and write
65C000
unkown
page execute and read and write
489E000
stack
page read and write
1CEDE000
stack
page read and write
2B43000
unkown
page readonly
64A000
unkown
page execute and read and write
2E7A000
heap
page read and write
1CE9E000
stack
page read and write
4E2000
unkown
page execute and read and write
2EEB000
heap
page read and write
49F0000
heap
page read and write
1CD5F000
stack
page read and write
4BD000
unkown
page execute and read and write
There are 42 hidden memdumps, click here to show them.