IOC Report
100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe

loading gif

Files

File Path
Type
Category
Malicious
100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_100f1c346cbcff15_b159fbceb9912cab3fd2e3d37e4ec18be14df62d_95985173_2e3eaac1-891a-4140-88f1-7c1710ec26ab\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3CD3.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 01:52:03 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3E1C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3E4C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe
"C:\Users\user\Desktop\100f1c346cbcff15f4d9d75c791000625850e1c82b44c.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5500 -s 1308

URLs

Name
IP
Malicious
http://62.204.41.150
unknown
malicious
http://62.204.41.150/
62.204.41.150
malicious
http://62.204.41.150/edd20096ecef326d.php
62.204.41.150
malicious
http://upx.sf.net
unknown
http://62.204.41.150/0
unknown
http://62.204.41.150/edd20096ecef326d.php?
unknown
http://62.204.41.150/edd20096ecef326d.phpo
unknown
http://62.204.41.150/edd20096ecef326d.phpL
unknown
http://62.204.41.150/edd20096ecef326d.phpl
unknown
http://62.204.41.150/edd20096ecef326d.php)
unknown
http://62.204.41.150/ows
unknown
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
62.204.41.150
unknown
United Kingdom
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
ProgramId
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
FileId
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
LowerCaseLongPath
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
LongPathHash
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
Name
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
OriginalFileName
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
Publisher
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
Version
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
BinFileVersion
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
BinaryType
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
ProductName
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
ProductVersion
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
LinkDate
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
BinProductVersion
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
AppxPackageFullName
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
AppxPackageRelativeId
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
Size
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
Language
\REGISTRY\A\{cb2f4823-6c90-d30a-3105-4b2ff12e6b86}\Root\InventoryApplicationFile\100f1c346cbcff15|16dd5f6746e738e1
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
22F0000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
22A0000
direct allocation
page execute and read and write
malicious
77D000
heap
page read and write
malicious
65C000
unkown
page execute and read and write
73A000
heap
page read and write
23B3000
heap
page read and write
730000
heap
page read and write
194000
stack
page read and write
40F000
unkown
page readonly
2520000
heap
page read and write
2500000
heap
page read and write
460000
unkown
page readonly
4B1000
unkown
page execute and read and write
6E0000
heap
page read and write
41D000
unkown
page readonly
AFF000
stack
page read and write
4E2000
unkown
page execute and read and write
73E000
heap
page read and write
9FF000
stack
page read and write
236E000
stack
page read and write
1A9EE000
stack
page read and write
1A89E000
stack
page read and write
799000
heap
page read and write
9C000
stack
page read and write
23B0000
heap
page read and write
1F0000
heap
page read and write
1A6FF000
stack
page read and write
72E000
stack
page read and write
1A84F000
stack
page read and write
1A5FF000
stack
page read and write
751000
heap
page execute and read and write
6BE000
stack
page read and write
64A000
unkown
page execute and read and write
4BD000
unkown
page execute and read and write
23AE000
stack
page read and write
44B000
unkown
page write copy
24BF000
stack
page read and write
1AAEE000
stack
page read and write
19D000
stack
page read and write
24FE000
stack
page read and write
7C8000
heap
page read and write
400000
unkown
page readonly
670000
heap
page read and write
7AC000
heap
page read and write
1A74E000
stack
page read and write
401000
unkown
page execute read
1A99D000
stack
page read and write
There are 38 hidden memdumps, click here to show them.