IOC Report
1730032627a344c434affaafd4d77b56c55854c12f00c450a482da7e4394bd826a11e19ee9557.dat-decoded.exe

loading gif

Files

File Path
Type
Category
Malicious
1730032627a344c434affaafd4d77b56c55854c12f00c450a482da7e4394bd826a11e19ee9557.dat-decoded.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_1730032627a344c4_192ba15086e91c79a14798a5c8bd5a44eb25acd_f13d9399_7e6ca32c-3c9e-4c26-b948-4716c5bf6164\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3600.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Oct 27 12:39:45 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3640.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER366F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1730032627a344c434affaafd4d77b56c55854c12f00c450a482da7e4394bd826a11e19ee9557.dat-decoded.exe
"C:\Users\user\Desktop\1730032627a344c434affaafd4d77b56c55854c12f00c450a482da7e4394bd826a11e19ee9557.dat-decoded.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6264 -s 224

URLs

Name
IP
Malicious
founpiuer.store
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
thumbystriw.store
malicious
withdrwblon.cyou
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
crisiwarny.store
malicious
navygenerayk.store
malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{2af17eaa-bdaa-3bc0-a685-d3443e611ced}\Root\InventoryApplicationFile\1730032627a344c4|cfc5494813987c59
ProgramId
\REGISTRY\A\{2af17eaa-bdaa-3bc0-a685-d3443e611ced}\Root\InventoryApplicationFile\1730032627a344c4|cfc5494813987c59
FileId
\REGISTRY\A\{2af17eaa-bdaa-3bc0-a685-d3443e611ced}\Root\InventoryApplicationFile\1730032627a344c4|cfc5494813987c59
LowerCaseLongPath
\REGISTRY\A\{2af17eaa-bdaa-3bc0-a685-d3443e611ced}\Root\InventoryApplicationFile\1730032627a344c4|cfc5494813987c59
LongPathHash
\REGISTRY\A\{2af17eaa-bdaa-3bc0-a685-d3443e611ced}\Root\InventoryApplicationFile\1730032627a344c4|cfc5494813987c59
Name
\REGISTRY\A\{2af17eaa-bdaa-3bc0-a685-d3443e611ced}\Root\InventoryApplicationFile\1730032627a344c4|cfc5494813987c59
OriginalFileName
\REGISTRY\A\{2af17eaa-bdaa-3bc0-a685-d3443e611ced}\Root\InventoryApplicationFile\1730032627a344c4|cfc5494813987c59
Publisher
\REGISTRY\A\{2af17eaa-bdaa-3bc0-a685-d3443e611ced}\Root\InventoryApplicationFile\1730032627a344c4|cfc5494813987c59
Version
\REGISTRY\A\{2af17eaa-bdaa-3bc0-a685-d3443e611ced}\Root\InventoryApplicationFile\1730032627a344c4|cfc5494813987c59
BinFileVersion
\REGISTRY\A\{2af17eaa-bdaa-3bc0-a685-d3443e611ced}\Root\InventoryApplicationFile\1730032627a344c4|cfc5494813987c59
BinaryType
\REGISTRY\A\{2af17eaa-bdaa-3bc0-a685-d3443e611ced}\Root\InventoryApplicationFile\1730032627a344c4|cfc5494813987c59
ProductName
\REGISTRY\A\{2af17eaa-bdaa-3bc0-a685-d3443e611ced}\Root\InventoryApplicationFile\1730032627a344c4|cfc5494813987c59
ProductVersion
\REGISTRY\A\{2af17eaa-bdaa-3bc0-a685-d3443e611ced}\Root\InventoryApplicationFile\1730032627a344c4|cfc5494813987c59
LinkDate
\REGISTRY\A\{2af17eaa-bdaa-3bc0-a685-d3443e611ced}\Root\InventoryApplicationFile\1730032627a344c4|cfc5494813987c59
BinProductVersion
\REGISTRY\A\{2af17eaa-bdaa-3bc0-a685-d3443e611ced}\Root\InventoryApplicationFile\1730032627a344c4|cfc5494813987c59
AppxPackageFullName
\REGISTRY\A\{2af17eaa-bdaa-3bc0-a685-d3443e611ced}\Root\InventoryApplicationFile\1730032627a344c4|cfc5494813987c59
AppxPackageRelativeId
\REGISTRY\A\{2af17eaa-bdaa-3bc0-a685-d3443e611ced}\Root\InventoryApplicationFile\1730032627a344c4|cfc5494813987c59
Size
\REGISTRY\A\{2af17eaa-bdaa-3bc0-a685-d3443e611ced}\Root\InventoryApplicationFile\1730032627a344c4|cfc5494813987c59
Language
\REGISTRY\A\{2af17eaa-bdaa-3bc0-a685-d3443e611ced}\Root\InventoryApplicationFile\1730032627a344c4|cfc5494813987c59
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1F0000
heap
page read and write
6BA000
heap
page read and write
9D000
stack
page read and write
401000
unkown
page execute read
530000
heap
page read and write
401000
unkown
page execute read
449000
unkown
page write copy
446000
unkown
page readonly
19D000
stack
page read and write
459000
unkown
page readonly
5F0000
heap
page read and write
448000
unkown
page read and write
6BE000
heap
page read and write
400000
unkown
page readonly
6B0000
heap
page read and write
400000
unkown
page readonly
446000
unkown
page readonly
459000
unkown
page readonly
449000
unkown
page write copy
There are 9 hidden memdumps, click here to show them.