IOC Report
5XpKRbh2k7

loading gif

Files

File Path
Type
Category
Malicious
5XpKRbh2k7.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_5XpKRbh2k7.exe_7c951b3511dd73c28dc917ef5d2d801ea4772771_6d508433_2edd89ab-d19c-4cd5-9845-e9eb5b195e2d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F60.tmp.dmp
Mini DuMP crash report, 16 streams, Tue Oct 29 05:43:09 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER301C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER304C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\5XpKRbh2k7.exe
"C:\Users\user\Desktop\5XpKRbh2k7.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7096 -s 760

URLs

Name
IP
Malicious
http://upx.sf.net
unknown
http://corppki/crl/msintcrca.crl
unknown
http://www.asp.net/
unknown
http://corppki/aia/MSIT%20CA%20Z1(2).crt0E
unknown
http://corppki/crl/MSIT%20CA%20Z1(2).crl
unknown
https://support.office.com/oReplacing
unknown
http://corppki/aia/msintcrca.crt0=
unknown
http://sqlite.org/rescode.html
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{792e7c9e-4aea-0431-9171-01abbd0bc15b}\Root\InventoryApplicationFile\5xpkrbh2k7.exe|ebb503534b781a60
ProgramId
\REGISTRY\A\{792e7c9e-4aea-0431-9171-01abbd0bc15b}\Root\InventoryApplicationFile\5xpkrbh2k7.exe|ebb503534b781a60
FileId
\REGISTRY\A\{792e7c9e-4aea-0431-9171-01abbd0bc15b}\Root\InventoryApplicationFile\5xpkrbh2k7.exe|ebb503534b781a60
LowerCaseLongPath
\REGISTRY\A\{792e7c9e-4aea-0431-9171-01abbd0bc15b}\Root\InventoryApplicationFile\5xpkrbh2k7.exe|ebb503534b781a60
LongPathHash
\REGISTRY\A\{792e7c9e-4aea-0431-9171-01abbd0bc15b}\Root\InventoryApplicationFile\5xpkrbh2k7.exe|ebb503534b781a60
Name
\REGISTRY\A\{792e7c9e-4aea-0431-9171-01abbd0bc15b}\Root\InventoryApplicationFile\5xpkrbh2k7.exe|ebb503534b781a60
OriginalFileName
\REGISTRY\A\{792e7c9e-4aea-0431-9171-01abbd0bc15b}\Root\InventoryApplicationFile\5xpkrbh2k7.exe|ebb503534b781a60
Publisher
\REGISTRY\A\{792e7c9e-4aea-0431-9171-01abbd0bc15b}\Root\InventoryApplicationFile\5xpkrbh2k7.exe|ebb503534b781a60
Version
\REGISTRY\A\{792e7c9e-4aea-0431-9171-01abbd0bc15b}\Root\InventoryApplicationFile\5xpkrbh2k7.exe|ebb503534b781a60
BinFileVersion
\REGISTRY\A\{792e7c9e-4aea-0431-9171-01abbd0bc15b}\Root\InventoryApplicationFile\5xpkrbh2k7.exe|ebb503534b781a60
BinaryType
\REGISTRY\A\{792e7c9e-4aea-0431-9171-01abbd0bc15b}\Root\InventoryApplicationFile\5xpkrbh2k7.exe|ebb503534b781a60
ProductName
\REGISTRY\A\{792e7c9e-4aea-0431-9171-01abbd0bc15b}\Root\InventoryApplicationFile\5xpkrbh2k7.exe|ebb503534b781a60
ProductVersion
\REGISTRY\A\{792e7c9e-4aea-0431-9171-01abbd0bc15b}\Root\InventoryApplicationFile\5xpkrbh2k7.exe|ebb503534b781a60
LinkDate
\REGISTRY\A\{792e7c9e-4aea-0431-9171-01abbd0bc15b}\Root\InventoryApplicationFile\5xpkrbh2k7.exe|ebb503534b781a60
BinProductVersion
\REGISTRY\A\{792e7c9e-4aea-0431-9171-01abbd0bc15b}\Root\InventoryApplicationFile\5xpkrbh2k7.exe|ebb503534b781a60
AppxPackageFullName
\REGISTRY\A\{792e7c9e-4aea-0431-9171-01abbd0bc15b}\Root\InventoryApplicationFile\5xpkrbh2k7.exe|ebb503534b781a60
AppxPackageRelativeId
\REGISTRY\A\{792e7c9e-4aea-0431-9171-01abbd0bc15b}\Root\InventoryApplicationFile\5xpkrbh2k7.exe|ebb503534b781a60
Size
\REGISTRY\A\{792e7c9e-4aea-0431-9171-01abbd0bc15b}\Root\InventoryApplicationFile\5xpkrbh2k7.exe|ebb503534b781a60
Language
\REGISTRY\A\{792e7c9e-4aea-0431-9171-01abbd0bc15b}\Root\InventoryApplicationFile\5xpkrbh2k7.exe|ebb503534b781a60
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1EE037FA000
heap
page read and write
1EE037E8000
heap
page read and write
2D512FE000
stack
page read and write
1EE155B3000
trusted library allocation
page read and write
2D515FF000
stack
page read and write
1EE0358C000
unkown
page readonly
1EE03780000
heap
page read and write
1EE03462000
unkown
page readonly
2D519FF000
stack
page read and write
1EE03589000
unkown
page readonly
7FFD9B8F0000
trusted library allocation
page read and write
1EE037FC000
heap
page read and write
1EE037FE000
heap
page read and write
1EE03B75000
heap
page read and write
1EE035EB000
unkown
page readonly
1EE039B0000
heap
page read and write
1EE03AA0000
heap
page execute and read and write
1EE03460000
unkown
page readonly
1EE055A0000
heap
page execute and read and write
1EE03B15000
heap
page read and write
7FFD9B9C6000
trusted library allocation
page execute and read and write
1EE03829000
heap
page read and write
7FFD9B8ED000
trusted library allocation
page execute and read and write
1EE037C0000
heap
page read and write
1EE03A10000
trusted library allocation
page read and write
1EE03B70000
heap
page read and write
7FFD9B8E4000
trusted library allocation
page read and write
1EE03790000
heap
page read and write
1EE037F0000
heap
page read and write
1EE03990000
heap
page read and write
7FFD9B8E3000
trusted library allocation
page execute and read and write
1EE036E7000
unkown
page readonly
7FFD9BA00000
trusted library allocation
page execute and read and write
7FFD9B9A0000
trusted library allocation
page execute and read and write
1EE055B1000
trusted library allocation
page read and write
2D50FE0000
stack
page read and write
2D516FD000
stack
page read and write
1EE03B10000
heap
page read and write
1EE155B1000
trusted library allocation
page read and write
2D513FE000
stack
page read and write
1EE03460000
unkown
page readonly
1EE1DE30000
heap
page read and write
2D517FE000
stack
page read and write
1EE0365F000
unkown
page readonly
1EE03840000
heap
page read and write
1EE03869000
heap
page read and write
1EE039F0000
trusted library allocation
page read and write
7FF475100000
trusted library allocation
page execute and read and write
2D518FE000
stack
page read and write
2D514FF000
stack
page read and write
1EE0385A000
heap
page read and write
1EE05440000
heap
page read and write
1EE037DB000
heap
page read and write
1EE037C9000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
There are 45 hidden memdumps, click here to show them.