IOC Report
GK059kPZ5B.exe

loading gif

Files

File Path
Type
Category
Malicious
GK059kPZ5B.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\ScreenUpdateSync[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\A865.tmp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_A865.tmp.exe_6678317c8ae3237abe1e8f11d1632889f7f0bb9a_61c74afe_fc656f38-0a7f-4be7-885a-070ddb1037fe\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA9BD.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Oct 26 17:08:42 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAAB8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAAF8.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\GK059kPZ5B.exe
"C:\Users\user\Desktop\GK059kPZ5B.exe"
malicious
C:\Users\user\AppData\Local\Temp\A865.tmp.exe
"C:\Users\user\AppData\Local\Temp\A865.tmp.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 1324

URLs

Name
IP
Malicious
http://62.204.41.177/edd20096ecef326d.php
62.204.41.177
malicious
http://62.204.41.177/
62.204.41.177
malicious
http://62.204.41.177
unknown
malicious
https://post-to-me.com/track_prt.php?sub=&cc=DE
unknown
http://62.204.41.177/edd20096ecef326d.phpN
unknown
https://post-to-me.com/track_prt.php?sub=
unknown
http://176.113.115.37/ScreenUpdateSync.exeDT
unknown
https://post-to-me.com/track_prt.php?sub=0&cc=DE
172.67.179.207
http://62.204.41.177/6
unknown
http://176.113.115.37/ScreenUpdateSync.exe)a
unknown
http://176.113.115.37/ScreenUpdateSync.exe48rt8k8rt4rwe5rbSOFTWARE
unknown
https://post-to-me.com/
unknown
http://upx.sf.net
unknown
http://62.204.41.177i
unknown
http://62.204.41.177/edd20096ecef326d.phpZ
unknown
http://62.204.41.177/edd20096ecef326d.php$
unknown
http://176.113.115.37/ScreenUpdateSync.exe
unknown
http://62.204.41.177/edd20096ecef326d.phpf
unknown
https://post-to-me.com/track_prt.php?sub=0&cc=DEe
unknown
https://post-to-me.com/=
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
post-to-me.com
172.67.179.207

IPs

IP
Domain
Country
Malicious
62.204.41.177
unknown
United Kingdom
malicious
176.113.115.37
unknown
Russian Federation
172.67.179.207
post-to-me.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\prtscreen
Enabled
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
ProgramId
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
FileId
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
LowerCaseLongPath
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
LongPathHash
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
Name
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
OriginalFileName
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
Publisher
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
Version
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
BinFileVersion
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
BinaryType
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
ProductName
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
ProductVersion
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
LinkDate
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
BinProductVersion
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
AppxPackageFullName
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
AppxPackageRelativeId
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
Size
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
Language
\REGISTRY\A\{7a31b1fa-d529-c9e9-6d11-6181c80708c1}\Root\InventoryApplicationFile\a865.tmp.exe|d72d60e1ee00c162
Usn
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2320000
direct allocation
page read and write
malicious
873000
heap
page read and write
malicious
22D0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
AFE000
stack
page read and write
3481000
heap
page read and write
2350000
heap
page read and write
1AAFD000
stack
page read and write
34A7000
heap
page read and write
28BE000
stack
page read and write
707000
heap
page read and write
942000
heap
page read and write
19C000
stack
page read and write
B6E000
stack
page read and write
9C000
stack
page read and write
85E000
heap
page read and write
849000
heap
page execute and read and write
1AB6E000
stack
page read and write
40E000
unkown
page execute read
34C1000
heap
page read and write
66E000
stack
page read and write
400000
unkown
page readonly
3980000
heap
page read and write
2F3E000
stack
page read and write
400000
unkown
page execute and read and write
4B1000
unkown
page execute and read and write
44C000
unkown
page readonly
620000
heap
page read and write
8A6000
heap
page read and write
34A8000
heap
page read and write
1A61E000
stack
page read and write
303F000
stack
page read and write
7F0000
heap
page read and write
90F000
heap
page read and write
65C000
unkown
page execute and read and write
2F00000
remote allocation
page read and write
1F0000
heap
page read and write
43C000
unkown
page readonly
2500000
heap
page read and write
869000
heap
page execute and read and write
1A5DF000
stack
page read and write
700000
heap
page read and write
800000
heap
page read and write
2F00000
remote allocation
page read and write
32CF000
stack
page read and write
31CC000
stack
page read and write
83A000
heap
page read and write
52F000
unkown
page readonly
1F0000
heap
page read and write
1A71F000
stack
page read and write
850000
heap
page read and write
83E000
heap
page read and write
287F000
stack
page read and write
29FE000
stack
page read and write
19A000
stack
page read and write
790000
heap
page read and write
911000
heap
page read and write
400000
unkown
page readonly
795000
heap
page read and write
1A9BE000
stack
page read and write
44F000
unkown
page write copy
40E000
unkown
page execute read
B20000
heap
page read and write
B2F000
stack
page read and write
9B000
stack
page read and write
A50000
direct allocation
page execute and read and write
8C6000
heap
page read and write
2F00000
remote allocation
page read and write
93F000
heap
page read and write
43F000
unkown
page write copy
1AC6F000
stack
page read and write
911000
heap
page read and write
2AFF000
stack
page read and write
1A76E000
stack
page read and write
8DC000
heap
page read and write
911000
heap
page read and write
85A000
heap
page read and write
A2F000
stack
page read and write
B90000
heap
page read and write
3499000
heap
page read and write
24EE000
stack
page read and write
6AE000
stack
page read and write
1A86F000
stack
page read and write
401000
unkown
page execute read
740000
heap
page read and write
8F7000
heap
page read and write
29BF000
stack
page read and write
7DE000
stack
page read and write
3480000
heap
page read and write
195000
stack
page read and write
82F000
stack
page read and write
78E000
stack
page read and write
51F000
unkown
page readonly
A4F000
stack
page read and write
720000
heap
page read and write
909000
heap
page read and write
3470000
heap
page read and write
8AC000
heap
page read and write
348E000
heap
page read and write
401000
unkown
page execute read
830000
heap
page read and write
4BD000
unkown
page execute and read and write
23AE000
stack
page read and write
52F000
unkown
page readonly
725000
heap
page read and write
1A8BE000
stack
page read and write
803000
heap
page read and write
4E2000
unkown
page execute and read and write
277F000
stack
page read and write
830000
heap
page read and write
AC0000
direct allocation
page read and write
24AF000
stack
page read and write
64A000
unkown
page execute and read and write
1A9FE000
stack
page read and write
There are 104 hidden memdumps, click here to show them.