IOC Report
TP77MvSzt2.exe

loading gif

Files

File Path
Type
Category
Malicious
TP77MvSzt2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\ScreenUpdateSync[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\9B3F.tmp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_9B3F.tmp.exe_e95d69dd1c263f625dbdd8c1f29a502d88fbc8_bb09a85e_a5f03171-0ee3-41fc-b5fa-9883119bc31d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA83F.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Oct 26 17:08:35 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAAFF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAB2F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\TP77MvSzt2.exe
"C:\Users\user\Desktop\TP77MvSzt2.exe"
malicious
C:\Users\user\AppData\Local\Temp\9B3F.tmp.exe
"C:\Users\user\AppData\Local\Temp\9B3F.tmp.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5440 -s 1076

URLs

Name
IP
Malicious
http://62.204.41.177/edd20096ecef326d.php
62.204.41.177
malicious
http://62.204.41.177/
62.204.41.177
malicious
http://62.204.41.177
unknown
malicious
https://post-to-me.com/track_prt.php?sub=&cc=DE
unknown
http://176.113.115.37/ScreenUpdateSync.exen
unknown
https://post-to-me.com/track_prt.php?sub=
unknown
https://post-to-me.com/track_prt.php?sub=0&cc=DE#
unknown
http://62.204.41.177/edd20096ecef326d.php:Ic
unknown
https://post-to-me.com/track_prt.php?sub=0&cc=DE
104.21.56.70
http://176.113.115.37/ScreenUpdateSync.exeu
unknown
http://62.204.41.177/edd20096ecef326d.php~I
unknown
http://176.113.115.37/ScreenUpdateSync.exe48rt8k8rt4rwe5rbSOFTWARE
unknown
https://post-to-me.com/track_prt.php?sub=0&cc=DEO
unknown
https://post-to-me.com/
unknown
http://62.204.41.177/edd20096ecef326d.php_JP
unknown
http://upx.sf.net
unknown
http://62.204.41.177/edd20096ecef326d.phpBH
unknown
http://62.204.41.177/edd20096ecef326d.phpNH
unknown
http://62.204.41.177;ah
unknown
http://176.113.115.37/ScreenUpdateSync.exe
unknown
http://62.204.41.177/ows
unknown
http://62.204.41.177/%
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
post-to-me.com
104.21.56.70

IPs

IP
Domain
Country
Malicious
62.204.41.177
unknown
United Kingdom
malicious
176.113.115.37
unknown
Russian Federation
104.21.56.70
post-to-me.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\prtscreen
Enabled
\REGISTRY\A\{ab4b5a0d-408a-f076-6a96-0641de5f9438}\Root\InventoryApplicationFile\9b3f.tmp.exe|69ab3c5a47f545c0
ProgramId
\REGISTRY\A\{ab4b5a0d-408a-f076-6a96-0641de5f9438}\Root\InventoryApplicationFile\9b3f.tmp.exe|69ab3c5a47f545c0
FileId
\REGISTRY\A\{ab4b5a0d-408a-f076-6a96-0641de5f9438}\Root\InventoryApplicationFile\9b3f.tmp.exe|69ab3c5a47f545c0
LowerCaseLongPath
\REGISTRY\A\{ab4b5a0d-408a-f076-6a96-0641de5f9438}\Root\InventoryApplicationFile\9b3f.tmp.exe|69ab3c5a47f545c0
LongPathHash
\REGISTRY\A\{ab4b5a0d-408a-f076-6a96-0641de5f9438}\Root\InventoryApplicationFile\9b3f.tmp.exe|69ab3c5a47f545c0
Name
\REGISTRY\A\{ab4b5a0d-408a-f076-6a96-0641de5f9438}\Root\InventoryApplicationFile\9b3f.tmp.exe|69ab3c5a47f545c0
OriginalFileName
\REGISTRY\A\{ab4b5a0d-408a-f076-6a96-0641de5f9438}\Root\InventoryApplicationFile\9b3f.tmp.exe|69ab3c5a47f545c0
Publisher
\REGISTRY\A\{ab4b5a0d-408a-f076-6a96-0641de5f9438}\Root\InventoryApplicationFile\9b3f.tmp.exe|69ab3c5a47f545c0
Version
\REGISTRY\A\{ab4b5a0d-408a-f076-6a96-0641de5f9438}\Root\InventoryApplicationFile\9b3f.tmp.exe|69ab3c5a47f545c0
BinFileVersion
\REGISTRY\A\{ab4b5a0d-408a-f076-6a96-0641de5f9438}\Root\InventoryApplicationFile\9b3f.tmp.exe|69ab3c5a47f545c0
BinaryType
\REGISTRY\A\{ab4b5a0d-408a-f076-6a96-0641de5f9438}\Root\InventoryApplicationFile\9b3f.tmp.exe|69ab3c5a47f545c0
ProductName
\REGISTRY\A\{ab4b5a0d-408a-f076-6a96-0641de5f9438}\Root\InventoryApplicationFile\9b3f.tmp.exe|69ab3c5a47f545c0
ProductVersion
\REGISTRY\A\{ab4b5a0d-408a-f076-6a96-0641de5f9438}\Root\InventoryApplicationFile\9b3f.tmp.exe|69ab3c5a47f545c0
LinkDate
\REGISTRY\A\{ab4b5a0d-408a-f076-6a96-0641de5f9438}\Root\InventoryApplicationFile\9b3f.tmp.exe|69ab3c5a47f545c0
BinProductVersion
\REGISTRY\A\{ab4b5a0d-408a-f076-6a96-0641de5f9438}\Root\InventoryApplicationFile\9b3f.tmp.exe|69ab3c5a47f545c0
AppxPackageFullName
\REGISTRY\A\{ab4b5a0d-408a-f076-6a96-0641de5f9438}\Root\InventoryApplicationFile\9b3f.tmp.exe|69ab3c5a47f545c0
AppxPackageRelativeId
\REGISTRY\A\{ab4b5a0d-408a-f076-6a96-0641de5f9438}\Root\InventoryApplicationFile\9b3f.tmp.exe|69ab3c5a47f545c0
Size
\REGISTRY\A\{ab4b5a0d-408a-f076-6a96-0641de5f9438}\Root\InventoryApplicationFile\9b3f.tmp.exe|69ab3c5a47f545c0
Language
\REGISTRY\A\{ab4b5a0d-408a-f076-6a96-0641de5f9438}\Root\InventoryApplicationFile\9b3f.tmp.exe|69ab3c5a47f545c0
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page execute and read and write
malicious
2310000
direct allocation
page read and write
malicious
903000
heap
page read and write
malicious
B00000
direct allocation
page execute and read and write
malicious
49DF000
stack
page read and write
2C50000
heap
page read and write
1A63E000
stack
page read and write
5530000
remote allocation
page read and write
2E87000
heap
page read and write
2CFE000
stack
page read and write
1A87F000
stack
page read and write
511F000
stack
page read and write
8CA000
heap
page read and write
51F000
unkown
page readonly
750000
heap
page read and write
2E83000
heap
page read and write
2D90000
heap
page read and write
740000
heap
page read and write
5A6E000
heap
page read and write
19C000
stack
page read and write
501E000
stack
page read and write
2CB0000
heap
page read and write
2380000
heap
page read and write
400000
unkown
page readonly
4A1E000
stack
page read and write
2B56000
unkown
page readonly
44F000
unkown
page write copy
AFF000
stack
page read and write
5530000
remote allocation
page read and write
2C9E000
stack
page read and write
2E4B000
heap
page read and write
954000
heap
page read and write
43C000
unkown
page readonly
64A000
unkown
page execute and read and write
58FF000
stack
page read and write
5530000
remote allocation
page read and write
2420000
heap
page read and write
2DE6000
heap
page read and write
2F8F000
stack
page read and write
8C0000
heap
page read and write
57FC000
stack
page read and write
19A000
stack
page read and write
2B56000
unkown
page readonly
2D20000
heap
page read and write
2E09000
heap
page read and write
2383000
heap
page read and write
1AAFF000
stack
page read and write
B60000
heap
page read and write
4A97000
heap
page read and write
400000
unkown
page execute and read and write
400000
unkown
page readonly
2D9A000
heap
page read and write
40E000
unkown
page execute read
44C000
unkown
page readonly
2E52000
heap
page read and write
93A000
heap
page read and write
2E25000
heap
page read and write
1A8BE000
stack
page read and write
1AB5E000
stack
page read and write
8CE000
heap
page read and write
2DA9000
heap
page execute and read and write
5A76000
heap
page read and write
1A73F000
stack
page read and write
2E1E000
heap
page read and write
1F0000
heap
page read and write
48DE000
stack
page read and write
2D9E000
heap
page read and write
2E08000
heap
page read and write
745000
heap
page read and write
308F000
stack
page read and write
401000
unkown
page execute read
2E37000
heap
page read and write
89F000
stack
page read and write
2E4B000
heap
page read and write
9C000
stack
page read and write
2E26000
heap
page read and write
1AC5D000
stack
page read and write
2E37000
heap
page read and write
2E52000
heap
page read and write
401000
unkown
page execute read
240E000
stack
page read and write
79E000
stack
page read and write
9B000
stack
page read and write
4E2000
unkown
page execute and read and write
2E1E000
heap
page read and write
5AA1000
heap
page read and write
2E4C000
heap
page read and write
8D9000
heap
page execute and read and write
23CE000
stack
page read and write
65C000
unkown
page execute and read and write
4EDF000
stack
page read and write
1A77E000
stack
page read and write
2D40000
heap
page read and write
195000
stack
page read and write
1F0000
heap
page read and write
5A60000
heap
page read and write
5A61000
heap
page read and write
556E000
stack
page read and write
2E4C000
heap
page read and write
43F000
unkown
page write copy
40E000
unkown
page execute read
48A0000
direct allocation
page read and write
4FDF000
stack
page read and write
4A90000
heap
page read and write
4830000
direct allocation
page execute and read and write
1A9FE000
stack
page read and write
4A20000
heap
page read and write
1A5FF000
stack
page read and write
1A9BE000
stack
page read and write
9FE000
stack
page read and write
4BD000
unkown
page execute and read and write
1A4FF000
stack
page read and write
2CB5000
heap
page read and write
5A00000
heap
page read and write
5FB0000
heap
page read and write
2340000
heap
page read and write
2E7F000
heap
page read and write
4B1000
unkown
page execute and read and write
4A6E000
stack
page read and write
2E4F000
heap
page read and write
566F000
stack
page read and write
There are 111 hidden memdumps, click here to show them.