IOC Report
1vYjXDbKHt.exe

loading gif

Files

File Path
Type
Category
Malicious
1vYjXDbKHt.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_1vYjXDbKHt.exe_99619b3a52565bf22bd23f28e399941b8e44_afd12b50_0914c2ec-397b-4795-91d1-4f77b5cb6182\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1874.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Oct 26 17:08:38 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER196F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER19CE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1vYjXDbKHt.exe
"C:\Users\user\Desktop\1vYjXDbKHt.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1040

URLs

Name
IP
Malicious
http://62.204.41.177/edd20096ecef326d.php
62.204.41.177
malicious
http://62.204.41.177/
62.204.41.177
malicious
http://62.204.41.177
unknown
malicious
http://62.204.41.177/edd20096ecef326d.php3
unknown
http://62.204.41.177/edd20096ecef326d.php2
unknown
http://62.204.41.177/edd20096ecef326d.phpR
unknown
http://62.204.41.177/8
unknown
http://upx.sf.net
unknown
http://62.204.41.177/CP
unknown
http://62.204.41.177/edd20096ecef326d.phpkP
unknown
http://62.204.41.177/edd20096ecef326d.php9
unknown
http://62.204.41.177/ows
unknown
http://62.204.41.177/edd20096ecef326d.phpe
unknown
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
198.187.3.20.in-addr.arpa
unknown
malicious

IPs

IP
Domain
Country
Malicious
62.204.41.177
unknown
United Kingdom
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{684ff05f-2786-e22b-5e5f-e36791042650}\Root\InventoryApplicationFile\1vyjxdbkht.exe|1ed0371d7ddee083
ProgramId
\REGISTRY\A\{684ff05f-2786-e22b-5e5f-e36791042650}\Root\InventoryApplicationFile\1vyjxdbkht.exe|1ed0371d7ddee083
FileId
\REGISTRY\A\{684ff05f-2786-e22b-5e5f-e36791042650}\Root\InventoryApplicationFile\1vyjxdbkht.exe|1ed0371d7ddee083
LowerCaseLongPath
\REGISTRY\A\{684ff05f-2786-e22b-5e5f-e36791042650}\Root\InventoryApplicationFile\1vyjxdbkht.exe|1ed0371d7ddee083
LongPathHash
\REGISTRY\A\{684ff05f-2786-e22b-5e5f-e36791042650}\Root\InventoryApplicationFile\1vyjxdbkht.exe|1ed0371d7ddee083
Name
\REGISTRY\A\{684ff05f-2786-e22b-5e5f-e36791042650}\Root\InventoryApplicationFile\1vyjxdbkht.exe|1ed0371d7ddee083
OriginalFileName
\REGISTRY\A\{684ff05f-2786-e22b-5e5f-e36791042650}\Root\InventoryApplicationFile\1vyjxdbkht.exe|1ed0371d7ddee083
Publisher
\REGISTRY\A\{684ff05f-2786-e22b-5e5f-e36791042650}\Root\InventoryApplicationFile\1vyjxdbkht.exe|1ed0371d7ddee083
Version
\REGISTRY\A\{684ff05f-2786-e22b-5e5f-e36791042650}\Root\InventoryApplicationFile\1vyjxdbkht.exe|1ed0371d7ddee083
BinFileVersion
\REGISTRY\A\{684ff05f-2786-e22b-5e5f-e36791042650}\Root\InventoryApplicationFile\1vyjxdbkht.exe|1ed0371d7ddee083
BinaryType
\REGISTRY\A\{684ff05f-2786-e22b-5e5f-e36791042650}\Root\InventoryApplicationFile\1vyjxdbkht.exe|1ed0371d7ddee083
ProductName
\REGISTRY\A\{684ff05f-2786-e22b-5e5f-e36791042650}\Root\InventoryApplicationFile\1vyjxdbkht.exe|1ed0371d7ddee083
ProductVersion
\REGISTRY\A\{684ff05f-2786-e22b-5e5f-e36791042650}\Root\InventoryApplicationFile\1vyjxdbkht.exe|1ed0371d7ddee083
LinkDate
\REGISTRY\A\{684ff05f-2786-e22b-5e5f-e36791042650}\Root\InventoryApplicationFile\1vyjxdbkht.exe|1ed0371d7ddee083
BinProductVersion
\REGISTRY\A\{684ff05f-2786-e22b-5e5f-e36791042650}\Root\InventoryApplicationFile\1vyjxdbkht.exe|1ed0371d7ddee083
AppxPackageFullName
\REGISTRY\A\{684ff05f-2786-e22b-5e5f-e36791042650}\Root\InventoryApplicationFile\1vyjxdbkht.exe|1ed0371d7ddee083
AppxPackageRelativeId
\REGISTRY\A\{684ff05f-2786-e22b-5e5f-e36791042650}\Root\InventoryApplicationFile\1vyjxdbkht.exe|1ed0371d7ddee083
Size
\REGISTRY\A\{684ff05f-2786-e22b-5e5f-e36791042650}\Root\InventoryApplicationFile\1vyjxdbkht.exe|1ed0371d7ddee083
Language
\REGISTRY\A\{684ff05f-2786-e22b-5e5f-e36791042650}\Root\InventoryApplicationFile\1vyjxdbkht.exe|1ed0371d7ddee083
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2350000
direct allocation
page read and write
malicious
874000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
B30000
direct allocation
page execute and read and write
malicious
51C000
unkown
page readonly
195000
stack
page read and write
64A000
unkown
page execute and read and write
4B1000
unkown
page execute and read and write
401000
unkown
page execute read
2480000
heap
page read and write
23EE000
stack
page read and write
2350000
heap
page read and write
2533000
heap
page read and write
1F0000
heap
page read and write
7DE000
stack
page read and write
1AB8E000
stack
page read and write
83E000
heap
page read and write
24CE000
stack
page read and write
8AA000
heap
page read and write
65C000
unkown
page execute and read and write
795000
heap
page read and write
4BD000
unkown
page execute and read and write
1AC8F000
stack
page read and write
439000
unkown
page readonly
1A90F000
stack
page read and write
A2F000
stack
page read and write
84A000
heap
page execute and read and write
43C000
unkown
page write copy
250E000
stack
page read and write
790000
heap
page read and write
1AA0E000
stack
page read and write
78E000
stack
page read and write
40E000
unkown
page execute read
9C000
stack
page read and write
19C000
stack
page read and write
BA0000
heap
page read and write
1AB4D000
stack
page read and write
1A80F000
stack
page read and write
23AE000
stack
page read and write
4E2000
unkown
page execute and read and write
B2F000
stack
page read and write
1AA4E000
stack
page read and write
1A70F000
stack
page read and write
83A000
heap
page read and write
400000
unkown
page readonly
1A60F000
stack
page read and write
242E000
stack
page read and write
740000
heap
page read and write
8CB000
heap
page read and write
830000
heap
page read and write
891000
heap
page read and write
2530000
heap
page read and write
There are 42 hidden memdumps, click here to show them.