IOC Report
17283307843512ddb9da5feb065e9e51f430014971376a63e309c849f05d5ebedafef72522599.dat-decoded.exe

loading gif

Files

File Path
Type
Category
Malicious
17283307843512ddb9da5feb065e9e51f430014971376a63e309c849f05d5ebedafef72522599.dat-decoded.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_17283307843512dd_f9fe3f1f1e94486b2f576f19d4787792f5ebeb4_c6a5d8df_b60491c4-c368-43a6-ad9e-7c62a9c6c501\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC59E.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 19:55:14 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC5ED.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC60D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\17283307843512ddb9da5feb065e9e51f430014971376a63e309c849f05d5ebedafef72522599.dat-decoded.exe
"C:\Users\user\Desktop\17283307843512ddb9da5feb065e9e51f430014971376a63e309c849f05d5ebedafef72522599.dat-decoded.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 228

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{b4c246e7-5a57-af34-117f-6af01f7f35a8}\Root\InventoryApplicationFile\17283307843512dd|ab014a8dbd7d5e74
ProgramId
\REGISTRY\A\{b4c246e7-5a57-af34-117f-6af01f7f35a8}\Root\InventoryApplicationFile\17283307843512dd|ab014a8dbd7d5e74
FileId
\REGISTRY\A\{b4c246e7-5a57-af34-117f-6af01f7f35a8}\Root\InventoryApplicationFile\17283307843512dd|ab014a8dbd7d5e74
LowerCaseLongPath
\REGISTRY\A\{b4c246e7-5a57-af34-117f-6af01f7f35a8}\Root\InventoryApplicationFile\17283307843512dd|ab014a8dbd7d5e74
LongPathHash
\REGISTRY\A\{b4c246e7-5a57-af34-117f-6af01f7f35a8}\Root\InventoryApplicationFile\17283307843512dd|ab014a8dbd7d5e74
Name
\REGISTRY\A\{b4c246e7-5a57-af34-117f-6af01f7f35a8}\Root\InventoryApplicationFile\17283307843512dd|ab014a8dbd7d5e74
OriginalFileName
\REGISTRY\A\{b4c246e7-5a57-af34-117f-6af01f7f35a8}\Root\InventoryApplicationFile\17283307843512dd|ab014a8dbd7d5e74
Publisher
\REGISTRY\A\{b4c246e7-5a57-af34-117f-6af01f7f35a8}\Root\InventoryApplicationFile\17283307843512dd|ab014a8dbd7d5e74
Version
\REGISTRY\A\{b4c246e7-5a57-af34-117f-6af01f7f35a8}\Root\InventoryApplicationFile\17283307843512dd|ab014a8dbd7d5e74
BinFileVersion
\REGISTRY\A\{b4c246e7-5a57-af34-117f-6af01f7f35a8}\Root\InventoryApplicationFile\17283307843512dd|ab014a8dbd7d5e74
BinaryType
\REGISTRY\A\{b4c246e7-5a57-af34-117f-6af01f7f35a8}\Root\InventoryApplicationFile\17283307843512dd|ab014a8dbd7d5e74
ProductName
\REGISTRY\A\{b4c246e7-5a57-af34-117f-6af01f7f35a8}\Root\InventoryApplicationFile\17283307843512dd|ab014a8dbd7d5e74
ProductVersion
\REGISTRY\A\{b4c246e7-5a57-af34-117f-6af01f7f35a8}\Root\InventoryApplicationFile\17283307843512dd|ab014a8dbd7d5e74
LinkDate
\REGISTRY\A\{b4c246e7-5a57-af34-117f-6af01f7f35a8}\Root\InventoryApplicationFile\17283307843512dd|ab014a8dbd7d5e74
BinProductVersion
\REGISTRY\A\{b4c246e7-5a57-af34-117f-6af01f7f35a8}\Root\InventoryApplicationFile\17283307843512dd|ab014a8dbd7d5e74
AppxPackageFullName
\REGISTRY\A\{b4c246e7-5a57-af34-117f-6af01f7f35a8}\Root\InventoryApplicationFile\17283307843512dd|ab014a8dbd7d5e74
AppxPackageRelativeId
\REGISTRY\A\{b4c246e7-5a57-af34-117f-6af01f7f35a8}\Root\InventoryApplicationFile\17283307843512dd|ab014a8dbd7d5e74
Size
\REGISTRY\A\{b4c246e7-5a57-af34-117f-6af01f7f35a8}\Root\InventoryApplicationFile\17283307843512dd|ab014a8dbd7d5e74
Language
\REGISTRY\A\{b4c246e7-5a57-af34-117f-6af01f7f35a8}\Root\InventoryApplicationFile\17283307843512dd|ab014a8dbd7d5e74
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
F11000
unkown
page execute and read and write
malicious
1D4D000
direct allocation
page execute and read and write
1711000
heap
page read and write
133C000
stack
page read and write
1A80000
direct allocation
page execute and read and write
F10000
unkown
page readonly
19FB000
heap
page read and write
1623000
heap
page read and write
162F000
heap
page read and write
F10000
unkown
page readonly
1C1E000
direct allocation
page execute and read and write
162F000
heap
page read and write
13B0000
direct allocation
page read and write
1635000
heap
page read and write
162F000
heap
page read and write
1D51000
direct allocation
page execute and read and write
161A000
heap
page read and write
1629000
heap
page read and write
162F000
heap
page read and write
162F000
heap
page read and write
18CE000
heap
page read and write
1DC2000
direct allocation
page execute and read and write
1629000
heap
page read and write
1390000
heap
page read and write
1711000
heap
page read and write
F11000
unkown
page execute read
1440000
heap
page read and write
1444000
heap
page read and write
1A6C000
heap
page read and write
123D000
stack
page read and write
1635000
heap
page read and write
1BAD000
direct allocation
page execute and read and write
1623000
heap
page read and write
1610000
heap
page read and write
13A0000
heap
page read and write
1834000
heap
page read and write
1BA9000
direct allocation
page execute and read and write
161E000
heap
page read and write
162F000
heap
page read and write
1710000
heap
page read and write
19F7000
heap
page read and write
There are 31 hidden memdumps, click here to show them.