IOC Report
Gy53Tq6BdK.exe

loading gif

Files

File Path
Type
Category
Malicious
Gy53Tq6BdK.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Gy53Tq6BdK.exe_889e2fba9227189eadcce412837c98743734c3d_712c0000_4a3350ad-5789-46de-8efe-cfd0ca19d88c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER68C3.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Dec 23 06:25:25 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A4B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A7B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Gy53Tq6BdK.exe
"C:\Users\user\Desktop\Gy53Tq6BdK.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 1152

URLs

Name
IP
Malicious
https://curl.se/docs/hsts.html
unknown
http://html4/loose.dtd
unknown
http://home.fivetk5ht.top/zldPR
unknown
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851http://home.fivetk5ht.top/zldPRFrmVFHTtKntGp
unknown
https://httpbin.org/ipbefore
unknown
https://curl.se/docs/http-cookies.html
unknown
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv173457985135a1
unknown
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851
unknown
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv17
unknown
http://upx.sf.net
unknown
https://curl.se/docs/alt-svc.html
unknown
http://.css
unknown
http://.jpg
unknown
https://httpbin.org/ip
34.226.108.155
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851PX
unknown
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
httpbin.org
34.226.108.155
home.fivetk5ht.top
unknown

IPs

IP
Domain
Country
Malicious
34.226.108.155
httpbin.org
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
ProgramId
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
FileId
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
LowerCaseLongPath
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
LongPathHash
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
Name
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
OriginalFileName
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
Publisher
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
Version
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
BinFileVersion
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
BinaryType
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
ProductName
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
ProductVersion
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
LinkDate
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
BinProductVersion
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
AppxPackageFullName
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
AppxPackageRelativeId
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
Size
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
Language
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
681F000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
16F1000
heap
page read and write
430000
unkown
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
71B0000
direct allocation
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
3D9F000
stack
page read and write
6A60000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
3597000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7180000
direct allocation
page execute and read and write
11C0000
heap
page read and write
7180000
direct allocation
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7180000
direct allocation
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
4D5E000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7240000
direct allocation
page execute and read and write
6A61000
heap
page read and write
661E000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7230000
direct allocation
page execute and read and write
3580000
direct allocation
page read and write
16D7000
heap
page read and write
6A61000
heap
page read and write
519F000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7180000
direct allocation
page execute and read and write
1790000
heap
page read and write
6A61000
heap
page read and write
4B1E000
stack
page read and write
441F000
stack
page read and write
7150000
direct allocation
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
3590000
heap
page read and write
7160000
direct allocation
page execute and read and write
53DF000
stack
page read and write
6A61000
heap
page read and write
7580000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7210000
direct allocation
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
431000
unkown
page execute and write copy
619E000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7640000
direct allocation
page read and write
4F9E000
stack
page read and write
6A61000
heap
page read and write
7568000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7180000
direct allocation
page execute and read and write
7280000
direct allocation
page execute and read and write
7180000
direct allocation
page execute and read and write
16E6000
heap
page read and write
6A61000
heap
page read and write
177E000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7180000
direct allocation
page execute and read and write
48DE000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7180000
direct allocation
page execute and read and write
71E0000
direct allocation
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
1698000
heap
page read and write
6A61000
heap
page read and write
41DF000
stack
page read and write
6A61000
heap
page read and write
7180000
direct allocation
page execute and read and write
6A61000
heap
page read and write
71C0000
direct allocation
page execute and read and write
6A61000
heap
page read and write
16C0000
heap
page read and write
7180000
direct allocation
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
16D8000
heap
page read and write
16E2000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
16EE000
heap
page read and write
65DF000
stack
page read and write
6A61000
heap
page read and write
7270000
direct allocation
page execute and read and write
7180000
direct allocation
page execute and read and write
16E6000
heap
page read and write
6A61000
heap
page read and write
5F1F000
stack
page read and write
7180000
direct allocation
page execute and read and write
6A61000
heap
page read and write
3F9F000
stack
page read and write
6A61000
heap
page read and write
34DE000
stack
page read and write
6A61000
heap
page read and write
7312000
heap
page read and write
445E000
stack
page read and write
6A61000
heap
page read and write
3580000
direct allocation
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
16FC000
heap
page read and write
3580000
direct allocation
page read and write
6A61000
heap
page read and write
639F000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
3580000
direct allocation
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
16E6000
heap
page read and write
6A61000
heap
page read and write
349C000
stack
page read and write
6A61000
heap
page read and write
7190000
direct allocation
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
589E000
stack
page read and write
75F3000
heap
page read and write
10B9000
unkown
page execute and read and write
15FB000
stack
page read and write
6A61000
heap
page read and write
7461000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
3580000
direct allocation
page read and write
379F000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
16E6000
heap
page read and write
6A61000
heap
page read and write
74DC000
direct allocation
page read and write
B71000
unkown
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7291000
heap
page read and write
3560000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6EB0000
trusted library allocation
page read and write
6A61000
heap
page read and write
163E000
stack
page read and write
6A61000
heap
page read and write
6EB0000
trusted library allocation
page read and write
6A61000
heap
page read and write
7C97000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
3580000
direct allocation
page read and write
3580000
direct allocation
page read and write
63DE000
stack
page read and write
3580000
direct allocation
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7180000
direct allocation
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
1C7E000
stack
page read and write
16D6000
heap
page read and write
7290000
heap
page read and write
16E2000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
73D0000
heap
page read and write
6A61000
heap
page read and write
7180000
direct allocation
page execute and read and write
6A61000
heap
page read and write
7180000
direct allocation
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
3580000
direct allocation
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7312000
heap
page read and write
469E000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
3580000
direct allocation
page read and write
EE7000
unkown
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
16F1000
heap
page read and write
6A61000
heap
page read and write
B73000
unkown
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
16D9000
heap
page read and write
7200000
direct allocation
page execute and read and write
6A61000
heap
page read and write
3FDE000
stack
page read and write
355E000
stack
page read and write
6EF0000
direct allocation
page read and write
6A61000
heap
page read and write
F00000
unkown
page execute and write copy
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7566000
heap
page read and write
7180000
direct allocation
page execute and read and write
4ADF000
stack
page read and write
EFF000
unkown
page execute and write copy
7180000
direct allocation
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
51DE000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6EF0000
direct allocation
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
16C0000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7180000
direct allocation
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
3580000
direct allocation
page read and write
16E2000
heap
page read and write
1682000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
17A5000
heap
page read and write
114B000
stack
page read and write
7180000
direct allocation
page execute and read and write
6A61000
heap
page read and write
16E6000
heap
page read and write
5A9F000
stack
page read and write
1A7F000
stack
page read and write
164E000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
3B9F000
stack
page read and write
6A61000
heap
page read and write
7180000
direct allocation
page execute and read and write
6A61000
heap
page read and write
CF8000
unkown
page execute and read and write
5D1E000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7180000
direct allocation
page execute and read and write
6A61000
heap
page read and write
164A000
heap
page read and write
6EF0000
direct allocation
page read and write
6A61000
heap
page read and write
3580000
direct allocation
page read and write
16F5000
heap
page read and write
685E000
stack
page read and write
565E000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
431000
unkown
page execute and read and write
758A000
heap
page read and write
6A61000
heap
page read and write
541E000
stack
page read and write
6A61000
heap
page read and write
EF1000
unkown
page execute and read and write
345E000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7311000
heap
page read and write
7460000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
713F000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
74E6000
direct allocation
page read and write
71A0000
direct allocation
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
3580000
direct allocation
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
16D8000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
399F000
stack
page read and write
6A61000
heap
page read and write
7291000
heap
page read and write
6A61000
heap
page read and write
EFF000
unkown
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6F3C000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
561F000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
10BB000
unkown
page execute and write copy
465F000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
489F000
stack
page read and write
6A61000
heap
page read and write
351E000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7642000
direct allocation
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
E12000
unkown
page execute and read and write
6A61000
heap
page read and write
7170000
direct allocation
page execute and read and write
585F000
stack
page read and write
11B0000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7260000
direct allocation
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7180000
direct allocation
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
615F000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
E07000
unkown
page execute and read and write
71D0000
direct allocation
page execute and read and write
B78000
unkown
page execute and read and write
A0D000
unkown
page execute and read and write
6A61000
heap
page read and write
B76000
unkown
page read and write
7180000
direct allocation
page execute and read and write
6A5F000
stack
page read and write
7250000
direct allocation
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7470000
heap
page read and write
4D1F000
stack
page read and write
6A61000
heap
page read and write
5CDF000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
7220000
direct allocation
page execute and read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
5F5E000
stack
page read and write
72B2000
heap
page read and write
1640000
heap
page read and write
4F5F000
stack
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
5ADE000
stack
page read and write
17A0000
heap
page read and write
430000
unkown
page readonly
6A61000
heap
page read and write
6EB0000
trusted library allocation
page read and write
3580000
direct allocation
page read and write
6A61000
heap
page read and write
B76000
unkown
page write copy
6A61000
heap
page read and write
7180000
direct allocation
page execute and read and write
6EA0000
trusted library allocation
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
71F0000
direct allocation
page execute and read and write
16E2000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6A61000
heap
page read and write
6F00000
direct allocation
page read and write
421E000
stack
page read and write
6A61000
heap
page read and write
There are 482 hidden memdumps, click here to show them.