IOC Report
relHAD3zcZ.exe

loading gif

Files

File Path
Type
Category
Malicious
relHAD3zcZ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_relHAD3zcZ.exe_3f3a4de3cefcddd217d3b74e32a13259cf428_197426d3_1ecb25d3-56db-4679-b7b6-ef8678d66f11\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCA94.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Dec 23 07:43:04 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCB41.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC1D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\relHAD3zcZ.exe
"C:\Users\user\Desktop\relHAD3zcZ.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 236

URLs

Name
IP
Malicious
http://222.186.172.42:1000/D1.dll
unknown
http://www.eyuyan.com)DVarFileInfo$
unknown
http://upx.sf.net
unknown
http://cs-g2-crl.thawte.com/ThawteCSG2.crl0
unknown
http://crl.thawte.com/ThawtePCA.crl0
unknown
http://ocsp.thawte.com0
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{af265cc4-6cab-4935-7ce4-c83e9d06880a}\Root\InventoryApplicationFile\relhad3zcz.exe|58e1048342e8031
ProgramId
\REGISTRY\A\{af265cc4-6cab-4935-7ce4-c83e9d06880a}\Root\InventoryApplicationFile\relhad3zcz.exe|58e1048342e8031
FileId
\REGISTRY\A\{af265cc4-6cab-4935-7ce4-c83e9d06880a}\Root\InventoryApplicationFile\relhad3zcz.exe|58e1048342e8031
LowerCaseLongPath
\REGISTRY\A\{af265cc4-6cab-4935-7ce4-c83e9d06880a}\Root\InventoryApplicationFile\relhad3zcz.exe|58e1048342e8031
LongPathHash
\REGISTRY\A\{af265cc4-6cab-4935-7ce4-c83e9d06880a}\Root\InventoryApplicationFile\relhad3zcz.exe|58e1048342e8031
Name
\REGISTRY\A\{af265cc4-6cab-4935-7ce4-c83e9d06880a}\Root\InventoryApplicationFile\relhad3zcz.exe|58e1048342e8031
OriginalFileName
\REGISTRY\A\{af265cc4-6cab-4935-7ce4-c83e9d06880a}\Root\InventoryApplicationFile\relhad3zcz.exe|58e1048342e8031
Publisher
\REGISTRY\A\{af265cc4-6cab-4935-7ce4-c83e9d06880a}\Root\InventoryApplicationFile\relhad3zcz.exe|58e1048342e8031
Version
\REGISTRY\A\{af265cc4-6cab-4935-7ce4-c83e9d06880a}\Root\InventoryApplicationFile\relhad3zcz.exe|58e1048342e8031
BinFileVersion
\REGISTRY\A\{af265cc4-6cab-4935-7ce4-c83e9d06880a}\Root\InventoryApplicationFile\relhad3zcz.exe|58e1048342e8031
BinaryType
\REGISTRY\A\{af265cc4-6cab-4935-7ce4-c83e9d06880a}\Root\InventoryApplicationFile\relhad3zcz.exe|58e1048342e8031
ProductName
\REGISTRY\A\{af265cc4-6cab-4935-7ce4-c83e9d06880a}\Root\InventoryApplicationFile\relhad3zcz.exe|58e1048342e8031
ProductVersion
\REGISTRY\A\{af265cc4-6cab-4935-7ce4-c83e9d06880a}\Root\InventoryApplicationFile\relhad3zcz.exe|58e1048342e8031
LinkDate
\REGISTRY\A\{af265cc4-6cab-4935-7ce4-c83e9d06880a}\Root\InventoryApplicationFile\relhad3zcz.exe|58e1048342e8031
BinProductVersion
\REGISTRY\A\{af265cc4-6cab-4935-7ce4-c83e9d06880a}\Root\InventoryApplicationFile\relhad3zcz.exe|58e1048342e8031
AppxPackageFullName
\REGISTRY\A\{af265cc4-6cab-4935-7ce4-c83e9d06880a}\Root\InventoryApplicationFile\relhad3zcz.exe|58e1048342e8031
AppxPackageRelativeId
\REGISTRY\A\{af265cc4-6cab-4935-7ce4-c83e9d06880a}\Root\InventoryApplicationFile\relhad3zcz.exe|58e1048342e8031
Size
\REGISTRY\A\{af265cc4-6cab-4935-7ce4-c83e9d06880a}\Root\InventoryApplicationFile\relhad3zcz.exe|58e1048342e8031
Language
\REGISTRY\A\{af265cc4-6cab-4935-7ce4-c83e9d06880a}\Root\InventoryApplicationFile\relhad3zcz.exe|58e1048342e8031
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
559000
unkown
page execute read
malicious
559000
unkown
page execute read
malicious
C5E000
stack
page read and write
780000
unkown
page write copy
83E000
stack
page read and write
77A000
unkown
page execute read
89A000
heap
page read and write
780000
unkown
page read and write
19D000
stack
page read and write
401000
unkown
page execute read
554000
unkown
page execute read
554000
unkown
page execute read
1F0000
heap
page read and write
401000
unkown
page execute read
7F0000
heap
page read and write
77A000
unkown
page execute read
790000
heap
page read and write
89E000
heap
page read and write
775000
unkown
page execute read
753000
unkown
page execute read
4B8000
unkown
page execute read
400000
unkown
page readonly
7DD000
stack
page read and write
753000
unkown
page execute read
777000
unkown
page execute read
777000
unkown
page execute read
4B8000
unkown
page execute read
890000
heap
page read and write
775000
unkown
page execute read
9D000
stack
page read and write
400000
unkown
page readonly
B5E000
stack
page read and write
There are 22 hidden memdumps, click here to show them.