IOC Report
7eDrKI88k8.exe

loading gif

Files

File Path
Type
Category
Malicious
7eDrKI88k8.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7eDrKI88k8.exe_386aeac2162098e0567dbe5f1ae453ab7e23de_672fd930_760c25d5-247e-4cfd-82c6-c615ab02275e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD5FD.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Dec 23 06:30:07 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD727.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD747.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\7eDrKI88k8.exe
"C:\Users\user\Desktop\7eDrKI88k8.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6412 -s 1128

URLs

Name
IP
Malicious
https://curl.se/docs/hsts.html
unknown
http://html4/loose.dtd
unknown
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851http://home.fivetk5ht.top/zldPRFrmVFHTtKntGp
unknown
https://httpbin.org/ipbefore
unknown
https://curl.se/docs/http-cookies.html
unknown
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851
unknown
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv17
unknown
http://upx.sf.net
unknown
https://curl.se/docs/alt-svc.html
unknown
http://.css
unknown
http://.jpg
unknown
https://httpbin.org/ip
98.85.100.80
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv17345798514fd4
unknown
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
httpbin.org
98.85.100.80
home.fivetk5ht.top
unknown

IPs

IP
Domain
Country
Malicious
98.85.100.80
httpbin.org
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{535cecb9-6938-95b2-a81a-46a4309cbd24}\Root\InventoryApplicationFile\7edrki88k8.exe|15bed8d68261ff97
ProgramId
\REGISTRY\A\{535cecb9-6938-95b2-a81a-46a4309cbd24}\Root\InventoryApplicationFile\7edrki88k8.exe|15bed8d68261ff97
FileId
\REGISTRY\A\{535cecb9-6938-95b2-a81a-46a4309cbd24}\Root\InventoryApplicationFile\7edrki88k8.exe|15bed8d68261ff97
LowerCaseLongPath
\REGISTRY\A\{535cecb9-6938-95b2-a81a-46a4309cbd24}\Root\InventoryApplicationFile\7edrki88k8.exe|15bed8d68261ff97
LongPathHash
\REGISTRY\A\{535cecb9-6938-95b2-a81a-46a4309cbd24}\Root\InventoryApplicationFile\7edrki88k8.exe|15bed8d68261ff97
Name
\REGISTRY\A\{535cecb9-6938-95b2-a81a-46a4309cbd24}\Root\InventoryApplicationFile\7edrki88k8.exe|15bed8d68261ff97
OriginalFileName
\REGISTRY\A\{535cecb9-6938-95b2-a81a-46a4309cbd24}\Root\InventoryApplicationFile\7edrki88k8.exe|15bed8d68261ff97
Publisher
\REGISTRY\A\{535cecb9-6938-95b2-a81a-46a4309cbd24}\Root\InventoryApplicationFile\7edrki88k8.exe|15bed8d68261ff97
Version
\REGISTRY\A\{535cecb9-6938-95b2-a81a-46a4309cbd24}\Root\InventoryApplicationFile\7edrki88k8.exe|15bed8d68261ff97
BinFileVersion
\REGISTRY\A\{535cecb9-6938-95b2-a81a-46a4309cbd24}\Root\InventoryApplicationFile\7edrki88k8.exe|15bed8d68261ff97
BinaryType
\REGISTRY\A\{535cecb9-6938-95b2-a81a-46a4309cbd24}\Root\InventoryApplicationFile\7edrki88k8.exe|15bed8d68261ff97
ProductName
\REGISTRY\A\{535cecb9-6938-95b2-a81a-46a4309cbd24}\Root\InventoryApplicationFile\7edrki88k8.exe|15bed8d68261ff97
ProductVersion
\REGISTRY\A\{535cecb9-6938-95b2-a81a-46a4309cbd24}\Root\InventoryApplicationFile\7edrki88k8.exe|15bed8d68261ff97
LinkDate
\REGISTRY\A\{535cecb9-6938-95b2-a81a-46a4309cbd24}\Root\InventoryApplicationFile\7edrki88k8.exe|15bed8d68261ff97
BinProductVersion
\REGISTRY\A\{535cecb9-6938-95b2-a81a-46a4309cbd24}\Root\InventoryApplicationFile\7edrki88k8.exe|15bed8d68261ff97
AppxPackageFullName
\REGISTRY\A\{535cecb9-6938-95b2-a81a-46a4309cbd24}\Root\InventoryApplicationFile\7edrki88k8.exe|15bed8d68261ff97
AppxPackageRelativeId
\REGISTRY\A\{535cecb9-6938-95b2-a81a-46a4309cbd24}\Root\InventoryApplicationFile\7edrki88k8.exe|15bed8d68261ff97
Size
\REGISTRY\A\{535cecb9-6938-95b2-a81a-46a4309cbd24}\Root\InventoryApplicationFile\7edrki88k8.exe|15bed8d68261ff97
Language
\REGISTRY\A\{535cecb9-6938-95b2-a81a-46a4309cbd24}\Root\InventoryApplicationFile\7edrki88k8.exe|15bed8d68261ff97
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
7EB0000
heap
page read and write
16EA000
unkown
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
7950000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
83A9000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7CCC000
direct allocation
page read and write
C30000
unkown
page read and write
1F80000
direct allocation
page read and write
7261000
heap
page read and write
7990000
direct allocation
page execute and read and write
573F000
stack
page read and write
6DFE000
stack
page read and write
1F80000
direct allocation
page read and write
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
49BF000
stack
page read and write
7A10000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
76B0000
trusted library allocation
page read and write
703E000
stack
page read and write
7A80000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
160F000
unkown
page execute and read and write
1F80000
direct allocation
page read and write
7A50000
direct allocation
page execute and read and write
7261000
heap
page read and write
7960000
direct allocation
page execute and read and write
7261000
heap
page read and write
18B8000
unkown
page execute and write copy
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
120D000
unkown
page execute and read and write
76A0000
trusted library allocation
page read and write
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
603F000
stack
page read and write
1985000
heap
page read and write
627F000
stack
page read and write
79F0000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
52FE000
stack
page read and write
7261000
heap
page read and write
7BBF000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
1FD1000
heap
page read and write
7261000
heap
page read and write
2039000
heap
page read and write
7BA0000
heap
page read and write
7970000
direct allocation
page execute and read and write
697E000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
4E3F000
stack
page read and write
7261000
heap
page read and write
7EA1000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
1701000
unkown
page execute and write copy
7261000
heap
page read and write
1F80000
direct allocation
page read and write
43BF000
stack
page read and write
45BF000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
819F000
stack
page read and write
7261000
heap
page read and write
79A0000
direct allocation
page execute and read and write
7980000
direct allocation
page execute and read and write
7A20000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
50BE000
stack
page read and write
2035000
heap
page read and write
3D2E000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
79C0000
direct allocation
page execute and read and write
7261000
heap
page read and write
7B5E000
stack
page read and write
7261000
heap
page read and write
607E000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7A40000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7CAB000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
2039000
heap
page read and write
7261000
heap
page read and write
C31000
unkown
page execute and read and write
2025000
heap
page read and write
7261000
heap
page read and write
1FDF000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
1980000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
553E000
stack
page read and write
6BBE000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
76F0000
direct allocation
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
839F000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
3DB0000
heap
page read and write
7261000
heap
page read and write
3CAC000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
1F80000
direct allocation
page read and write
7261000
heap
page read and write
2039000
heap
page read and write
7261000
heap
page read and write
7B80000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
1F80000
direct allocation
page read and write
18B6000
unkown
page execute and read and write
248F000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
4BFF000
stack
page read and write
1F70000
heap
page read and write
7CD6000
direct allocation
page read and write
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
6FFF000
stack
page read and write
577E000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
59BE000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
47BF000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
76F0000
direct allocation
page read and write
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
202C000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
3CEE000
stack
page read and write
1F90000
heap
page read and write
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
7980000
direct allocation
page execute and read and write
7CA1000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
66FF000
stack
page read and write
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
79B0000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
1DFB000
stack
page read and write
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
1F80000
direct allocation
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
C31000
unkown
page execute and write copy
7261000
heap
page read and write
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7BA1000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
52BF000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7E32000
direct allocation
page read and write
7980000
direct allocation
page execute and read and write
1F4E000
stack
page read and write
7261000
heap
page read and write
1FD7000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7EA0000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
5BBF000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
1FD4000
heap
page read and write
3FBF000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
1F80000
direct allocation
page read and write
41BF000
stack
page read and write
7261000
heap
page read and write
3C6E000
stack
page read and write
204D000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
773C000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
1F0E000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
14F7000
unkown
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
798E000
stack
page read and write
1F80000
direct allocation
page read and write
1378000
unkown
page execute and read and write
7261000
heap
page read and write
1F80000
direct allocation
page read and write
1700000
unkown
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
2045000
heap
page read and write
1616000
unkown
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7A70000
direct allocation
page execute and read and write
16F1000
unkown
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
2045000
heap
page read and write
1F80000
direct allocation
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
49FE000
stack
page read and write
7261000
heap
page read and write
7A60000
direct allocation
page execute and read and write
7261000
heap
page read and write
1376000
unkown
page read and write
6DBF000
stack
page read and write
228F000
stack
page read and write
1373000
unkown
page execute and read and write
2035000
heap
page read and write
79D0000
direct allocation
page execute and read and write
723F000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7B8A000
heap
page read and write
7261000
heap
page read and write
79E0000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
5E3E000
stack
page read and write
7E30000
direct allocation
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
C30000
unkown
page readonly
76F0000
direct allocation
page read and write
7261000
heap
page read and write
54FF000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
1376000
unkown
page write copy
7261000
heap
page read and write
1F9A000
heap
page read and write
1F9E000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
62BE000
stack
page read and write
7A30000
direct allocation
page execute and read and write
7A00000
direct allocation
page execute and read and write
7261000
heap
page read and write
7260000
heap
page read and write
7C13000
heap
page read and write
19D0000
heap
page read and write
7261000
heap
page read and write
793F000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
7261000
heap
page read and write
1F80000
direct allocation
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7C14000
heap
page read and write
673E000
stack
page read and write
202B000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
64FE000
stack
page read and write
1F80000
direct allocation
page read and write
7261000
heap
page read and write
2035000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
5DFF000
stack
page read and write
202B000
heap
page read and write
19C0000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7B90000
heap
page read and write
7261000
heap
page read and write
507F000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
2039000
heap
page read and write
64BF000
stack
page read and write
7261000
heap
page read and write
7240000
heap
page read and write
7BA1000
heap
page read and write
4E7E000
stack
page read and write
3D6E000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
3DB7000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
76B0000
trusted library allocation
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
3DAE000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
194B000
stack
page read and write
7261000
heap
page read and write
1F80000
direct allocation
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
4C3E000
stack
page read and write
76F0000
direct allocation
page read and write
7980000
direct allocation
page execute and read and write
7261000
heap
page read and write
693F000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
597F000
stack
page read and write
7A90000
direct allocation
page execute and read and write
2040000
heap
page read and write
5BFE000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
1371000
unkown
page execute and read and write
76B0000
trusted library allocation
page read and write
7261000
heap
page read and write
6B7F000
stack
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
7261000
heap
page read and write
1700000
unkown
page execute and write copy
7261000
heap
page read and write
7261000
heap
page read and write
There are 481 hidden memdumps, click here to show them.