IOC Report
4JPKDcwtDo.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps21010010Label

Files

File Path
Type
Category
Malicious
Download
4JPKDcwtDo.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_4JPKDcwtDo.exe_2144ee45d5b124c7fd67aed41e39e58c7c8925f_fa237fa7_2443cf23-f9db-4df5-b79c-c735dba84e31\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB922.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Jan 26 14:48:12 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBA0D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBB18.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\4JPKDcwtDo.exe
"C:\Users\user\Desktop\4JPKDcwtDo.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7120 -s 616

URLs

Name
IP
Malicious
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://toppyneedus.biz:443/api
unknown
https://toppyneedus.biz/_
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://www.invisalign.com/?utm_source=admarke
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://upx.sf.net
unknown
https://toppyneedus.biz/api$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://toppyneedus.biz/apip
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://toppyneedus.biz/api
172.67.149.66
https://toppyneedus.biz/riq
unknown
http://crl.micro
unknown
https://toppyneedus.biz/pi
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://toppyneedus.biz/9
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://toppyneedus.biz/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://toppyneedus.biz/h
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
financialfreez.click
unknown
malicious
toppyneedus.biz
172.67.149.66
impolitewearr.biz
unknown

IPs

IP
Domain
Country
Malicious
172.67.149.66
toppyneedus.biz
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{ac453316-9d9a-d688-7f4f-028756f16aaf}\Root\InventoryApplicationFile\4jpkdcwtdo.exe|87f243954e7b8e55
ProgramId
\REGISTRY\A\{ac453316-9d9a-d688-7f4f-028756f16aaf}\Root\InventoryApplicationFile\4jpkdcwtdo.exe|87f243954e7b8e55
FileId
\REGISTRY\A\{ac453316-9d9a-d688-7f4f-028756f16aaf}\Root\InventoryApplicationFile\4jpkdcwtdo.exe|87f243954e7b8e55
LowerCaseLongPath
\REGISTRY\A\{ac453316-9d9a-d688-7f4f-028756f16aaf}\Root\InventoryApplicationFile\4jpkdcwtdo.exe|87f243954e7b8e55
LongPathHash
\REGISTRY\A\{ac453316-9d9a-d688-7f4f-028756f16aaf}\Root\InventoryApplicationFile\4jpkdcwtdo.exe|87f243954e7b8e55
Name
\REGISTRY\A\{ac453316-9d9a-d688-7f4f-028756f16aaf}\Root\InventoryApplicationFile\4jpkdcwtdo.exe|87f243954e7b8e55
OriginalFileName
\REGISTRY\A\{ac453316-9d9a-d688-7f4f-028756f16aaf}\Root\InventoryApplicationFile\4jpkdcwtdo.exe|87f243954e7b8e55
Publisher
\REGISTRY\A\{ac453316-9d9a-d688-7f4f-028756f16aaf}\Root\InventoryApplicationFile\4jpkdcwtdo.exe|87f243954e7b8e55
Version
\REGISTRY\A\{ac453316-9d9a-d688-7f4f-028756f16aaf}\Root\InventoryApplicationFile\4jpkdcwtdo.exe|87f243954e7b8e55
BinFileVersion
\REGISTRY\A\{ac453316-9d9a-d688-7f4f-028756f16aaf}\Root\InventoryApplicationFile\4jpkdcwtdo.exe|87f243954e7b8e55
BinaryType
\REGISTRY\A\{ac453316-9d9a-d688-7f4f-028756f16aaf}\Root\InventoryApplicationFile\4jpkdcwtdo.exe|87f243954e7b8e55
ProductName
\REGISTRY\A\{ac453316-9d9a-d688-7f4f-028756f16aaf}\Root\InventoryApplicationFile\4jpkdcwtdo.exe|87f243954e7b8e55
ProductVersion
\REGISTRY\A\{ac453316-9d9a-d688-7f4f-028756f16aaf}\Root\InventoryApplicationFile\4jpkdcwtdo.exe|87f243954e7b8e55
LinkDate
\REGISTRY\A\{ac453316-9d9a-d688-7f4f-028756f16aaf}\Root\InventoryApplicationFile\4jpkdcwtdo.exe|87f243954e7b8e55
BinProductVersion
\REGISTRY\A\{ac453316-9d9a-d688-7f4f-028756f16aaf}\Root\InventoryApplicationFile\4jpkdcwtdo.exe|87f243954e7b8e55
AppxPackageFullName
\REGISTRY\A\{ac453316-9d9a-d688-7f4f-028756f16aaf}\Root\InventoryApplicationFile\4jpkdcwtdo.exe|87f243954e7b8e55
AppxPackageRelativeId
\REGISTRY\A\{ac453316-9d9a-d688-7f4f-028756f16aaf}\Root\InventoryApplicationFile\4jpkdcwtdo.exe|87f243954e7b8e55
Size
\REGISTRY\A\{ac453316-9d9a-d688-7f4f-028756f16aaf}\Root\InventoryApplicationFile\4jpkdcwtdo.exe|87f243954e7b8e55
Language
\REGISTRY\A\{ac453316-9d9a-d688-7f4f-028756f16aaf}\Root\InventoryApplicationFile\4jpkdcwtdo.exe|87f243954e7b8e55
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
708000
heap
page read and write
2D41000
trusted library allocation
page read and write
2160000
direct allocation
page read and write
2D1E000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2D13000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
1F7000
heap
page read and write
401000
unkown
page execute read
1F5000
heap
page read and write
63E000
stack
page read and write
2D62000
trusted library allocation
page read and write
2BCE000
stack
page read and write
757000
heap
page read and write
2D00000
trusted library allocation
page read and write
6E9000
heap
page read and write
2D62000
trusted library allocation
page read and write
705000
heap
page read and write
2CFE000
trusted library allocation
page read and write
2D09000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
2CFF000
trusted library allocation
page read and write
6F6000
heap
page read and write
2D1E000
trusted library allocation
page read and write
2D0F000
trusted library allocation
page read and write
357C000
trusted library allocation
page read and write
6EA000
heap
page read and write
2A3F000
stack
page read and write
2CE9000
trusted library allocation
page read and write
411000
unkown
page execute read
2D79000
trusted library allocation
page read and write
2CFE000
trusted library allocation
page read and write
2D1F000
trusted library allocation
page read and write
2D06000
trusted library allocation
page read and write
23C0000
remote allocation
page read and write
2D5B000
trusted library allocation
page read and write
2CF5000
trusted library allocation
page read and write
2D01000
trusted library allocation
page read and write
2D01000
trusted library allocation
page read and write
3071000
trusted library allocation
page read and write
2CE7000
trusted library allocation
page read and write
2CFB000
trusted library allocation
page read and write
6CB000
heap
page read and write
2D1E000
trusted library allocation
page read and write
705000
heap
page read and write
2D15000
trusted library allocation
page read and write
2D56000
trusted library allocation
page read and write
2D09000
trusted library allocation
page read and write
6CB000
heap
page read and write
2FB0000
trusted library allocation
page read and write
2D3F000
trusted library allocation
page read and write
2D1A000
trusted library allocation
page read and write
2CFE000
trusted library allocation
page read and write
2D5E000
trusted library allocation
page read and write
6BB000
heap
page read and write
2D27000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
4D0000
heap
page read and write
2F4F000
stack
page read and write
2CF7000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
74C000
heap
page read and write
2D15000
trusted library allocation
page read and write
2250000
heap
page read and write
2D26000
trusted library allocation
page read and write
2D3F000
trusted library allocation
page read and write
2D3D000
trusted library allocation
page read and write
2D27000
trusted library allocation
page read and write
2B7E000
stack
page read and write
2D3B000
trusted library allocation
page read and write
2D46000
trusted library allocation
page read and write
2D2F000
trusted library allocation
page read and write
5FE000
stack
page read and write
708000
heap
page read and write
708000
heap
page read and write
400000
unkown
page execute and read and write
678000
heap
page execute and read and write
2D21000
trusted library allocation
page read and write
2D1F000
trusted library allocation
page read and write
66E000
heap
page read and write
73D0D000
unkown
page read and write
6D0000
heap
page read and write
4B3000
unkown
page readonly
6F6000
heap
page read and write
2D33000
trusted library allocation
page read and write
6D0000
heap
page read and write
85F000
stack
page read and write
95F000
stack
page read and write
2CFE000
trusted library allocation
page read and write
2D58000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
23C0000
remote allocation
page read and write
2D0E000
trusted library allocation
page read and write
73D06000
unkown
page readonly
2E4E000
stack
page read and write
2D19000
trusted library allocation
page read and write
2CFE000
trusted library allocation
page read and write
2D22000
trusted library allocation
page read and write
2D2B000
trusted library allocation
page read and write
2CE3000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
2CFE000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2CE7000
trusted library allocation
page read and write
2CFE000
trusted library allocation
page read and write
2D09000
trusted library allocation
page read and write
2D62000
trusted library allocation
page read and write
6CA000
heap
page read and write
2FD0000
trusted library allocation
page read and write
2D3F000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
705000
heap
page read and write
2CFE000
trusted library allocation
page read and write
2D09000
trusted library allocation
page read and write
2D3E000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
6C6000
heap
page read and write
2CF4000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2D2E000
trusted library allocation
page read and write
2CEB000
trusted library allocation
page read and write
30E8000
trusted library allocation
page read and write
2D7B000
trusted library allocation
page read and write
2D58000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
6F6000
heap
page read and write
752000
heap
page read and write
2D1E000
trusted library allocation
page read and write
2D13000
trusted library allocation
page read and write
2D2E000
trusted library allocation
page read and write
2D62000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
2100000
direct allocation
page execute and read and write
2E00000
heap
page read and write
749000
heap
page read and write
2D42000
trusted library allocation
page read and write
2D46000
trusted library allocation
page read and write
752000
heap
page read and write
2D19000
trusted library allocation
page read and write
2D0D000
trusted library allocation
page read and write
6E9000
heap
page read and write
2D1E000
trusted library allocation
page read and write
2D29000
trusted library allocation
page read and write
73CF1000
unkown
page execute read
3058000
trusted library allocation
page read and write
2CEA000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
5B0000
heap
page read and write
2D4A000
trusted library allocation
page read and write
2D5F000
trusted library allocation
page read and write
2D51000
trusted library allocation
page read and write
2D07000
trusted library allocation
page read and write
6AA000
heap
page read and write
2D24000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
2F70000
heap
page read and write
2D16000
trusted library allocation
page read and write
2CCF000
stack
page read and write
74A000
heap
page read and write
6F6000
heap
page read and write
2D06000
trusted library allocation
page read and write
2D09000
trusted library allocation
page read and write
2CFF000
trusted library allocation
page read and write
2D1A000
trusted library allocation
page read and write
74B000
heap
page read and write
2D00000
trusted library allocation
page read and write
2CF5000
trusted library allocation
page read and write
2CF1000
trusted library allocation
page read and write
2F79000
trusted library allocation
page read and write
2D5F000
trusted library allocation
page read and write
2CF5000
trusted library allocation
page read and write
2CFC000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2D4B000
trusted library allocation
page read and write
2A7D000
stack
page read and write
2D1E000
trusted library allocation
page read and write
708000
heap
page read and write
2CF5000
trusted library allocation
page read and write
3071000
trusted library allocation
page read and write
2D79000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
74C000
heap
page read and write
2D21000
trusted library allocation
page read and write
2D55000
trusted library allocation
page read and write
2D51000
trusted library allocation
page read and write
2D71000
trusted library allocation
page read and write
2D5B000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
757000
heap
page read and write
2D40000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
2160000
heap
page read and write
2D00000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
23F0000
heap
page read and write
2D0E000
trusted library allocation
page read and write
2D01000
trusted library allocation
page read and write
2D5C000
trusted library allocation
page read and write
752000
heap
page read and write
2D37000
trusted library allocation
page read and write
2D24000
trusted library allocation
page read and write
2D05000
trusted library allocation
page read and write
2CE7000
trusted library allocation
page read and write
2D01000
trusted library allocation
page read and write
235D000
stack
page read and write
2D0D000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2CFB000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2D32000
trusted library allocation
page read and write
2D87000
trusted library allocation
page read and write
1F0000
heap
page read and write
2CFD000
trusted library allocation
page read and write
750000
heap
page read and write
2D1E000
trusted library allocation
page read and write
2D14000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
2CE7000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
2CFE000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
2D6F000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2D0D000
trusted library allocation
page read and write
283D000
stack
page read and write
2CFE000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2D4E000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2D0D000
trusted library allocation
page read and write
660000
heap
page read and write
2CFC000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2D16000
trusted library allocation
page read and write
223E000
stack
page read and write
2CFE000
trusted library allocation
page read and write
2D5B000
trusted library allocation
page read and write
745000
heap
page read and write
2D1E000
trusted library allocation
page read and write
2D71000
trusted library allocation
page read and write
2240000
heap
page read and write
2D1E000
trusted library allocation
page read and write
293F000
stack
page read and write
2D3E000
trusted library allocation
page read and write
3048000
trusted library allocation
page read and write
6D0000
heap
page read and write
2D1E000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
6D0000
heap
page read and write
2F7F000
trusted library allocation
page read and write
2D36000
trusted library allocation
page read and write
6CA000
heap
page read and write
6B4000
heap
page read and write
2CFB000
trusted library allocation
page read and write
2CEF000
trusted library allocation
page read and write
2D0D000
trusted library allocation
page read and write
6BA000
heap
page read and write
2D3F000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2D1A000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
2CFB000
trusted library allocation
page read and write
9B000
stack
page read and write
2D79000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
2D36000
trusted library allocation
page read and write
2D01000
trusted library allocation
page read and write
2D06000
trusted library allocation
page read and write
2D4F000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
239E000
stack
page read and write
2CFE000
trusted library allocation
page read and write
2D1B000
trusted library allocation
page read and write
2D4E000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2D27000
trusted library allocation
page read and write
2D37000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
4B3000
unkown
page readonly
2D06000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2CFE000
trusted library allocation
page read and write
2D21000
trusted library allocation
page read and write
2D81000
trusted library allocation
page read and write
2D0D000
trusted library allocation
page read and write
66A000
heap
page read and write
2D3F000
trusted library allocation
page read and write
21BE000
stack
page read and write
2D37000
trusted library allocation
page read and write
703000
heap
page read and write
6BA000
heap
page read and write
2D0B000
trusted library allocation
page read and write
2D48000
trusted library allocation
page read and write
2D35000
trusted library allocation
page read and write
74C000
heap
page read and write
2D4B000
trusted library allocation
page read and write
2CF3000
trusted library allocation
page read and write
6E9000
heap
page read and write
21FE000
stack
page read and write
2D5B000
trusted library allocation
page read and write
757000
heap
page read and write
2D0E000
trusted library allocation
page read and write
2D0D000
trusted library allocation
page read and write
2F71000
heap
page read and write
2CF5000
trusted library allocation
page read and write
2D2B000
trusted library allocation
page read and write
6CA000
heap
page read and write
2CF5000
trusted library allocation
page read and write
2D79000
trusted library allocation
page read and write
2D09000
trusted library allocation
page read and write
2CFF000
trusted library allocation
page read and write
23C0000
remote allocation
page read and write
2D18000
trusted library allocation
page read and write
2D57000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
74C000
heap
page read and write
3108000
trusted library allocation
page read and write
2D8F000
trusted library allocation
page read and write
2D16000
trusted library allocation
page read and write
459000
unkown
page execute and read and write
2D91000
trusted library allocation
page read and write
2D51000
trusted library allocation
page read and write
2CF5000
trusted library allocation
page read and write
3A85000
trusted library allocation
page read and write
2D31000
trusted library allocation
page read and write
6F6000
heap
page read and write
2CD0000
trusted library allocation
page read and write
2D0B000
trusted library allocation
page read and write
446000
unkown
page write copy
2D3E000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2D45000
trusted library allocation
page read and write
443000
unkown
page readonly
2D5F000
trusted library allocation
page read and write
2CFB000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2CFB000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
73D0F000
unkown
page readonly
2D15000
trusted library allocation
page read and write
2CF5000
trusted library allocation
page read and write
2D3B000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
2F98000
trusted library allocation
page read and write
2D4F000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
708000
heap
page read and write
2D29000
trusted library allocation
page read and write
2D3E000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
2CE9000
trusted library allocation
page read and write
2CFF000
trusted library allocation
page read and write
73CF0000
unkown
page readonly
2CFB000
trusted library allocation
page read and write
19B000
stack
page read and write
2D6F000
trusted library allocation
page read and write
2D31000
trusted library allocation
page read and write
2CF6000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
2D16000
trusted library allocation
page read and write
400000
unkown
page readonly
2D1E000
trusted library allocation
page read and write
752000
heap
page read and write
6E9000
heap
page read and write
2CFB000
trusted library allocation
page read and write
There are 364 hidden memdumps, click here to show them.