IOC Report
cdc57Mn7dE.exe

loading gif

Files

File Path
Type
Category
Malicious
cdc57Mn7dE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_cdc57Mn7dE.exe_bd757485709271bfe2785ff4ad59b44c4ffe5d_6fd29381_8c9c070d-2f38-429d-ac2f-f6f2d369b6f3\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER66.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFF0C.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Oct 25 22:58:53 2024, 0x1205a4 type
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\cdc57Mn7dE.exe
"C:\Users\user\Desktop\cdc57Mn7dE.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 60 -s 1180

URLs

Name
IP
Malicious
http://62.204.41.177/edd20096ecef326d.php
62.204.41.177
malicious
http://62.204.41.177/
62.204.41.177
malicious
http://62.204.41.177
unknown
malicious
http://62.204.41.177/n
unknown
http://62.204.41.177/edd20096ecef326d.php4
unknown
http://62.204.41.177/edd20096ecef326d.phpt
unknown
http://62.204.41.177E
unknown
http://62.204.41.177/edd20096ecef326d.phpU
unknown
http://62.204.41.177/edd20096ecef326d.phpu
unknown
http://62.204.41.177/9
unknown
http://upx.sf.net
unknown
http://62.204.41.177/ows
unknown
http://62.204.41.177v
unknown
http://62.204.41.177/edd20096ecef326d.phpTQ
unknown
http://62.204.41.177/F
unknown
There are 5 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
62.204.41.177
unknown
United Kingdom
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{16f0bce8-0b8f-b463-a923-e34c4ced525d}\Root\InventoryApplicationFile\cdc57mn7de.exe|622b2056f4e29bf
ProgramId
\REGISTRY\A\{16f0bce8-0b8f-b463-a923-e34c4ced525d}\Root\InventoryApplicationFile\cdc57mn7de.exe|622b2056f4e29bf
FileId
\REGISTRY\A\{16f0bce8-0b8f-b463-a923-e34c4ced525d}\Root\InventoryApplicationFile\cdc57mn7de.exe|622b2056f4e29bf
LowerCaseLongPath
\REGISTRY\A\{16f0bce8-0b8f-b463-a923-e34c4ced525d}\Root\InventoryApplicationFile\cdc57mn7de.exe|622b2056f4e29bf
LongPathHash
\REGISTRY\A\{16f0bce8-0b8f-b463-a923-e34c4ced525d}\Root\InventoryApplicationFile\cdc57mn7de.exe|622b2056f4e29bf
Name
\REGISTRY\A\{16f0bce8-0b8f-b463-a923-e34c4ced525d}\Root\InventoryApplicationFile\cdc57mn7de.exe|622b2056f4e29bf
OriginalFileName
\REGISTRY\A\{16f0bce8-0b8f-b463-a923-e34c4ced525d}\Root\InventoryApplicationFile\cdc57mn7de.exe|622b2056f4e29bf
Publisher
\REGISTRY\A\{16f0bce8-0b8f-b463-a923-e34c4ced525d}\Root\InventoryApplicationFile\cdc57mn7de.exe|622b2056f4e29bf
Version
\REGISTRY\A\{16f0bce8-0b8f-b463-a923-e34c4ced525d}\Root\InventoryApplicationFile\cdc57mn7de.exe|622b2056f4e29bf
BinFileVersion
\REGISTRY\A\{16f0bce8-0b8f-b463-a923-e34c4ced525d}\Root\InventoryApplicationFile\cdc57mn7de.exe|622b2056f4e29bf
BinaryType
\REGISTRY\A\{16f0bce8-0b8f-b463-a923-e34c4ced525d}\Root\InventoryApplicationFile\cdc57mn7de.exe|622b2056f4e29bf
ProductName
\REGISTRY\A\{16f0bce8-0b8f-b463-a923-e34c4ced525d}\Root\InventoryApplicationFile\cdc57mn7de.exe|622b2056f4e29bf
ProductVersion
\REGISTRY\A\{16f0bce8-0b8f-b463-a923-e34c4ced525d}\Root\InventoryApplicationFile\cdc57mn7de.exe|622b2056f4e29bf
LinkDate
\REGISTRY\A\{16f0bce8-0b8f-b463-a923-e34c4ced525d}\Root\InventoryApplicationFile\cdc57mn7de.exe|622b2056f4e29bf
BinProductVersion
\REGISTRY\A\{16f0bce8-0b8f-b463-a923-e34c4ced525d}\Root\InventoryApplicationFile\cdc57mn7de.exe|622b2056f4e29bf
AppxPackageFullName
\REGISTRY\A\{16f0bce8-0b8f-b463-a923-e34c4ced525d}\Root\InventoryApplicationFile\cdc57mn7de.exe|622b2056f4e29bf
AppxPackageRelativeId
\REGISTRY\A\{16f0bce8-0b8f-b463-a923-e34c4ced525d}\Root\InventoryApplicationFile\cdc57mn7de.exe|622b2056f4e29bf
Size
\REGISTRY\A\{16f0bce8-0b8f-b463-a923-e34c4ced525d}\Root\InventoryApplicationFile\cdc57mn7de.exe|622b2056f4e29bf
Language
\REGISTRY\A\{16f0bce8-0b8f-b463-a923-e34c4ced525d}\Root\InventoryApplicationFile\cdc57mn7de.exe|622b2056f4e29bf
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B20000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
B90000
direct allocation
page read and write
malicious
865000
heap
page read and write
malicious
755000
heap
page read and write
B1F000
stack
page read and write
401000
unkown
page execute read
40E000
unkown
page execute read
1A8EF000
stack
page read and write
249E000
stack
page read and write
1AB2E000
stack
page read and write
83B000
heap
page execute and read and write
82A000
heap
page read and write
439000
unkown
page readonly
8BA000
heap
page read and write
1A6EF000
stack
page read and write
1AA2E000
stack
page read and write
B80000
heap
page read and write
51C000
unkown
page readonly
79E000
stack
page read and write
BA0000
heap
page read and write
1A5EF000
stack
page read and write
82E000
heap
page read and write
400000
unkown
page readonly
8AE000
heap
page read and write
740000
heap
page read and write
9C000
stack
page read and write
1F0000
heap
page read and write
C70000
heap
page read and write
4B1000
unkown
page execute and read and write
43C000
unkown
page write copy
1A7EF000
stack
page read and write
820000
heap
page read and write
C3E000
stack
page read and write
1A9ED000
stack
page read and write
BFE000
stack
page read and write
64A000
unkown
page execute and read and write
89E000
heap
page read and write
245E000
stack
page read and write
24DE000
stack
page read and write
19C000
stack
page read and write
4BD000
unkown
page execute and read and write
65C000
unkown
page execute and read and write
2510000
heap
page read and write
195000
stack
page read and write
7DE000
stack
page read and write
A1F000
stack
page read and write
4E2000
unkown
page execute and read and write
750000
heap
page read and write
B83000
heap
page read and write
There are 40 hidden memdumps, click here to show them.