IOC Report
artifact64big.exe

loading gif

Files

File Path
Type
Category
Malicious
artifact64big.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_artifact64big.ex_4e7be2bcadfbc826318a736dea297432b4c323_22dcf1e3_c7788152-41cc-4a27-9e38-0c76a74afca7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3F77.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Dec 22 04:29:08 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4014.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4073.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\artifact64big.exe
"C:\Users\user\Desktop\artifact64big.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7348 -s 176

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{bebca275-b3fd-81cd-47a4-acfcec4ac3bb}\Root\InventoryApplicationFile\artifact64big.ex|e661469169c039cf
ProgramId
\REGISTRY\A\{bebca275-b3fd-81cd-47a4-acfcec4ac3bb}\Root\InventoryApplicationFile\artifact64big.ex|e661469169c039cf
FileId
\REGISTRY\A\{bebca275-b3fd-81cd-47a4-acfcec4ac3bb}\Root\InventoryApplicationFile\artifact64big.ex|e661469169c039cf
LowerCaseLongPath
\REGISTRY\A\{bebca275-b3fd-81cd-47a4-acfcec4ac3bb}\Root\InventoryApplicationFile\artifact64big.ex|e661469169c039cf
LongPathHash
\REGISTRY\A\{bebca275-b3fd-81cd-47a4-acfcec4ac3bb}\Root\InventoryApplicationFile\artifact64big.ex|e661469169c039cf
Name
\REGISTRY\A\{bebca275-b3fd-81cd-47a4-acfcec4ac3bb}\Root\InventoryApplicationFile\artifact64big.ex|e661469169c039cf
OriginalFileName
\REGISTRY\A\{bebca275-b3fd-81cd-47a4-acfcec4ac3bb}\Root\InventoryApplicationFile\artifact64big.ex|e661469169c039cf
Publisher
\REGISTRY\A\{bebca275-b3fd-81cd-47a4-acfcec4ac3bb}\Root\InventoryApplicationFile\artifact64big.ex|e661469169c039cf
Version
\REGISTRY\A\{bebca275-b3fd-81cd-47a4-acfcec4ac3bb}\Root\InventoryApplicationFile\artifact64big.ex|e661469169c039cf
BinFileVersion
\REGISTRY\A\{bebca275-b3fd-81cd-47a4-acfcec4ac3bb}\Root\InventoryApplicationFile\artifact64big.ex|e661469169c039cf
BinaryType
\REGISTRY\A\{bebca275-b3fd-81cd-47a4-acfcec4ac3bb}\Root\InventoryApplicationFile\artifact64big.ex|e661469169c039cf
ProductName
\REGISTRY\A\{bebca275-b3fd-81cd-47a4-acfcec4ac3bb}\Root\InventoryApplicationFile\artifact64big.ex|e661469169c039cf
ProductVersion
\REGISTRY\A\{bebca275-b3fd-81cd-47a4-acfcec4ac3bb}\Root\InventoryApplicationFile\artifact64big.ex|e661469169c039cf
LinkDate
\REGISTRY\A\{bebca275-b3fd-81cd-47a4-acfcec4ac3bb}\Root\InventoryApplicationFile\artifact64big.ex|e661469169c039cf
BinProductVersion
\REGISTRY\A\{bebca275-b3fd-81cd-47a4-acfcec4ac3bb}\Root\InventoryApplicationFile\artifact64big.ex|e661469169c039cf
AppxPackageFullName
\REGISTRY\A\{bebca275-b3fd-81cd-47a4-acfcec4ac3bb}\Root\InventoryApplicationFile\artifact64big.ex|e661469169c039cf
AppxPackageRelativeId
\REGISTRY\A\{bebca275-b3fd-81cd-47a4-acfcec4ac3bb}\Root\InventoryApplicationFile\artifact64big.ex|e661469169c039cf
Size
\REGISTRY\A\{bebca275-b3fd-81cd-47a4-acfcec4ac3bb}\Root\InventoryApplicationFile\artifact64big.ex|e661469169c039cf
Language
\REGISTRY\A\{bebca275-b3fd-81cd-47a4-acfcec4ac3bb}\Root\InventoryApplicationFile\artifact64big.ex|e661469169c039cf
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF6E3CE4000
unkown
page readonly
1811A8B0000
heap
page read and write
1811A840000
heap
page read and write
7FF6E3CEB000
unkown
page readonly
1811A850000
heap
page read and write
7FF6E3CEB000
unkown
page readonly
7FF6E3CE8000
unkown
page read and write
1811AB65000
heap
page read and write
7FF6E3CE8000
unkown
page write copy
7FF6E3C90000
unkown
page readonly
54B03FD000
stack
page read and write
7FF6E3C91000
unkown
page execute read
54B01FF000
stack
page read and write
7FF6E3C91000
unkown
page execute read
1811A870000
heap
page read and write
54AFFFD000
stack
page read and write
1811A8B6000
heap
page read and write
1811AB60000
heap
page read and write
7FF6E3CE4000
unkown
page readonly
7FF6E3C90000
unkown
page readonly
There are 10 hidden memdumps, click here to show them.