IOC Report
hi2jR57Z15.exe

loading gif

Files

File Path
Type
Category
Malicious
hi2jR57Z15.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_hi2jR57Z15.exe_474c1181a1d145a74de91ca944b8718d511095_25a11d06_5d33c381-6c33-4e15-9ec9-f6cd57fe64e4\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC62A.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 24 19:32:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC754.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC783.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\hi2jR57Z15.exe
"C:\Users\user\Desktop\hi2jR57Z15.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7276 -s 1044

URLs

Name
IP
Malicious
http://109.107.157.208/49aaa1bd4c594849.php
109.107.157.208
malicious
http://109.107.157.208/
109.107.157.208
malicious
http://109.107.157.208
unknown
malicious
http://109.107.157.208/49aaa1bd4c594849.php)w
unknown
http://109.107.157.208/49aaa1bd4c594849.php/
unknown
http://109.107.157.208/G
unknown
http://upx.sf.net
unknown
http://109.107.157.208/49aaa1bd4c594849.phpYpJ
unknown
http://109.107.157.208C
unknown

IPs

IP
Domain
Country
Malicious
109.107.157.208
unknown
unknown
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{1e94d3b6-3779-3dcc-9f49-6c83504d24e3}\Root\InventoryApplicationFile\hi2jr57z15.exe|cca60987b7f92171
ProgramId
\REGISTRY\A\{1e94d3b6-3779-3dcc-9f49-6c83504d24e3}\Root\InventoryApplicationFile\hi2jr57z15.exe|cca60987b7f92171
FileId
\REGISTRY\A\{1e94d3b6-3779-3dcc-9f49-6c83504d24e3}\Root\InventoryApplicationFile\hi2jr57z15.exe|cca60987b7f92171
LowerCaseLongPath
\REGISTRY\A\{1e94d3b6-3779-3dcc-9f49-6c83504d24e3}\Root\InventoryApplicationFile\hi2jr57z15.exe|cca60987b7f92171
LongPathHash
\REGISTRY\A\{1e94d3b6-3779-3dcc-9f49-6c83504d24e3}\Root\InventoryApplicationFile\hi2jr57z15.exe|cca60987b7f92171
Name
\REGISTRY\A\{1e94d3b6-3779-3dcc-9f49-6c83504d24e3}\Root\InventoryApplicationFile\hi2jr57z15.exe|cca60987b7f92171
OriginalFileName
\REGISTRY\A\{1e94d3b6-3779-3dcc-9f49-6c83504d24e3}\Root\InventoryApplicationFile\hi2jr57z15.exe|cca60987b7f92171
Publisher
\REGISTRY\A\{1e94d3b6-3779-3dcc-9f49-6c83504d24e3}\Root\InventoryApplicationFile\hi2jr57z15.exe|cca60987b7f92171
Version
\REGISTRY\A\{1e94d3b6-3779-3dcc-9f49-6c83504d24e3}\Root\InventoryApplicationFile\hi2jr57z15.exe|cca60987b7f92171
BinFileVersion
\REGISTRY\A\{1e94d3b6-3779-3dcc-9f49-6c83504d24e3}\Root\InventoryApplicationFile\hi2jr57z15.exe|cca60987b7f92171
BinaryType
\REGISTRY\A\{1e94d3b6-3779-3dcc-9f49-6c83504d24e3}\Root\InventoryApplicationFile\hi2jr57z15.exe|cca60987b7f92171
ProductName
\REGISTRY\A\{1e94d3b6-3779-3dcc-9f49-6c83504d24e3}\Root\InventoryApplicationFile\hi2jr57z15.exe|cca60987b7f92171
ProductVersion
\REGISTRY\A\{1e94d3b6-3779-3dcc-9f49-6c83504d24e3}\Root\InventoryApplicationFile\hi2jr57z15.exe|cca60987b7f92171
LinkDate
\REGISTRY\A\{1e94d3b6-3779-3dcc-9f49-6c83504d24e3}\Root\InventoryApplicationFile\hi2jr57z15.exe|cca60987b7f92171
BinProductVersion
\REGISTRY\A\{1e94d3b6-3779-3dcc-9f49-6c83504d24e3}\Root\InventoryApplicationFile\hi2jr57z15.exe|cca60987b7f92171
AppxPackageFullName
\REGISTRY\A\{1e94d3b6-3779-3dcc-9f49-6c83504d24e3}\Root\InventoryApplicationFile\hi2jr57z15.exe|cca60987b7f92171
AppxPackageRelativeId
\REGISTRY\A\{1e94d3b6-3779-3dcc-9f49-6c83504d24e3}\Root\InventoryApplicationFile\hi2jr57z15.exe|cca60987b7f92171
Size
\REGISTRY\A\{1e94d3b6-3779-3dcc-9f49-6c83504d24e3}\Root\InventoryApplicationFile\hi2jr57z15.exe|cca60987b7f92171
Language
\REGISTRY\A\{1e94d3b6-3779-3dcc-9f49-6c83504d24e3}\Root\InventoryApplicationFile\hi2jr57z15.exe|cca60987b7f92171
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
22E0000
direct allocation
page execute and read and write
malicious
84E000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
2330000
direct allocation
page read and write
malicious
65F000
unkown
page readonly
893000
heap
page read and write
4BD000
unkown
page execute and read and write
65C000
unkown
page execute and read and write
881000
heap
page read and write
1A8EE000
stack
page read and write
449000
unkown
page write copy
1A79E000
stack
page read and write
23C0000
heap
page read and write
23BE000
stack
page read and write
800000
direct allocation
page execute and read and write
2570000
heap
page read and write
400000
unkown
page readonly
2450000
heap
page read and write
84A000
heap
page read and write
7B0000
heap
page read and write
1F0000
heap
page read and write
840000
heap
page read and write
7B5000
heap
page read and write
1A9EE000
stack
page read and write
240E000
stack
page read and write
255F000
stack
page read and write
78E000
stack
page read and write
4E2000
unkown
page execute and read and write
4B1000
unkown
page execute and read and write
A3F000
stack
page read and write
7FE000
stack
page read and write
B3F000
stack
page read and write
45B000
unkown
page readonly
87E000
heap
page read and write
1A74F000
stack
page read and write
41C000
unkown
page execute read
23C3000
heap
page read and write
1A64F000
stack
page read and write
1AB2D000
stack
page read and write
194000
stack
page read and write
740000
heap
page read and write
2360000
heap
page read and write
1AA2E000
stack
page read and write
8AE000
heap
page read and write
401000
unkown
page execute read
64A000
unkown
page execute and read and write
1A89F000
stack
page read and write
8B4000
heap
page read and write
19E000
stack
page read and write
244E000
stack
page read and write
9C000
stack
page read and write
There are 41 hidden memdumps, click here to show them.