IOC Report
6GUgc6JYS1.exe

loading gif

Files

File Path
Type
Category
Malicious
6GUgc6JYS1.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_6GUgc6JYS1.exe_14b8f6c7377787902fbdfdce8cfba71edc84f2_d9c5afb0_0b286928-5b74-4105-9195-d990964fe4a3\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF6.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Oct 26 07:11:56 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8E94.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EC3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\6GUgc6JYS1.exe
"C:\Users\user\Desktop\6GUgc6JYS1.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6608 -s 1228

URLs

Name
IP
Malicious
http://20.25.126.96/bDDs
malicious
http://20.25.126.96:443/bDDs
malicious
https://20.25.126.96/Y
unknown
https://20.25.126.96/bDDs2i
unknown
https://20.25.126.96/bDDs
unknown
https://20.25.126.96/bDDsH:px6
unknown
https://20.25.126.96/2
unknown
https://20.25.126.96/
unknown
https://20.25.126.96/bDDsF
unknown
https://20.25.126.96/DDs
unknown
http://upx.sf.net
unknown
https://20.25.126.96/.i$x
unknown
https://20.25.126.96/l
unknown
https://20.25.126.96/%
unknown
There are 4 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
20.25.126.96
unknown
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{8497d15a-67b3-4057-2658-201788aea4e4}\Root\InventoryApplicationFile\6gugc6jys1.exe|5839a9c949a5e361
ProgramId
\REGISTRY\A\{8497d15a-67b3-4057-2658-201788aea4e4}\Root\InventoryApplicationFile\6gugc6jys1.exe|5839a9c949a5e361
FileId
\REGISTRY\A\{8497d15a-67b3-4057-2658-201788aea4e4}\Root\InventoryApplicationFile\6gugc6jys1.exe|5839a9c949a5e361
LowerCaseLongPath
\REGISTRY\A\{8497d15a-67b3-4057-2658-201788aea4e4}\Root\InventoryApplicationFile\6gugc6jys1.exe|5839a9c949a5e361
LongPathHash
\REGISTRY\A\{8497d15a-67b3-4057-2658-201788aea4e4}\Root\InventoryApplicationFile\6gugc6jys1.exe|5839a9c949a5e361
Name
\REGISTRY\A\{8497d15a-67b3-4057-2658-201788aea4e4}\Root\InventoryApplicationFile\6gugc6jys1.exe|5839a9c949a5e361
OriginalFileName
\REGISTRY\A\{8497d15a-67b3-4057-2658-201788aea4e4}\Root\InventoryApplicationFile\6gugc6jys1.exe|5839a9c949a5e361
Publisher
\REGISTRY\A\{8497d15a-67b3-4057-2658-201788aea4e4}\Root\InventoryApplicationFile\6gugc6jys1.exe|5839a9c949a5e361
Version
\REGISTRY\A\{8497d15a-67b3-4057-2658-201788aea4e4}\Root\InventoryApplicationFile\6gugc6jys1.exe|5839a9c949a5e361
BinFileVersion
\REGISTRY\A\{8497d15a-67b3-4057-2658-201788aea4e4}\Root\InventoryApplicationFile\6gugc6jys1.exe|5839a9c949a5e361
BinaryType
\REGISTRY\A\{8497d15a-67b3-4057-2658-201788aea4e4}\Root\InventoryApplicationFile\6gugc6jys1.exe|5839a9c949a5e361
ProductName
\REGISTRY\A\{8497d15a-67b3-4057-2658-201788aea4e4}\Root\InventoryApplicationFile\6gugc6jys1.exe|5839a9c949a5e361
ProductVersion
\REGISTRY\A\{8497d15a-67b3-4057-2658-201788aea4e4}\Root\InventoryApplicationFile\6gugc6jys1.exe|5839a9c949a5e361
LinkDate
\REGISTRY\A\{8497d15a-67b3-4057-2658-201788aea4e4}\Root\InventoryApplicationFile\6gugc6jys1.exe|5839a9c949a5e361
BinProductVersion
\REGISTRY\A\{8497d15a-67b3-4057-2658-201788aea4e4}\Root\InventoryApplicationFile\6gugc6jys1.exe|5839a9c949a5e361
AppxPackageFullName
\REGISTRY\A\{8497d15a-67b3-4057-2658-201788aea4e4}\Root\InventoryApplicationFile\6gugc6jys1.exe|5839a9c949a5e361
AppxPackageRelativeId
\REGISTRY\A\{8497d15a-67b3-4057-2658-201788aea4e4}\Root\InventoryApplicationFile\6gugc6jys1.exe|5839a9c949a5e361
Size
\REGISTRY\A\{8497d15a-67b3-4057-2658-201788aea4e4}\Root\InventoryApplicationFile\6gugc6jys1.exe|5839a9c949a5e361
Language
\REGISTRY\A\{8497d15a-67b3-4057-2658-201788aea4e4}\Root\InventoryApplicationFile\6gugc6jys1.exe|5839a9c949a5e361
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2598BC10000
unclassified section
page execute read
malicious
F928DFE000
stack
page read and write
F9283FE000
stack
page read and write
7FF78FD2B000
unkown
page write copy
F9281FD000
stack
page read and write
2598BCD2000
heap
page read and write
2598D900000
remote allocation
page read and write
2598BC98000
heap
page read and write
F9285FA000
stack
page read and write
2598BCA6000
heap
page read and write
2598BCD2000
heap
page read and write
7FF78FD20000
unkown
page readonly
F9287FF000
stack
page read and write
2598BF10000
heap
page read and write
7FF78FD24000
unkown
page write copy
7FF78FD25000
unkown
page readonly
2598BC20000
heap
page read and write
7FF78FD20000
unkown
page readonly
2598BCD2000
heap
page read and write
F9289FE000
stack
page read and write
2598BCD2000
heap
page read and write
2598BC9C000
heap
page read and write
2598BCDA000
heap
page read and write
2598BCD2000
heap
page read and write
2598BCD2000
heap
page read and write
7FF78FD2E000
unkown
page readonly
F9293F8000
stack
page read and write
2598BC73000
heap
page read and write
F9291FD000
stack
page read and write
2598D900000
remote allocation
page read and write
7FF78FD25000
unkown
page readonly
F9295FE000
stack
page read and write
7FF78FD24000
unkown
page write copy
F9293FA000
stack
page read and write
2598D900000
remote allocation
page read and write
2598BC40000
heap
page read and write
7FF78FD21000
unkown
page execute read
7FF78FD2B000
unkown
page read and write
2598BBF0000
heap
page read and write
2598BC46000
heap
page read and write
7FF78FD28000
unkown
page read and write
2598BB10000
heap
page read and write
2598BC5A000
heap
page read and write
2598BC4C000
heap
page read and write
2598BCC2000
heap
page read and write
7FF78FD21000
unkown
page execute read
7FF78FD2E000
unkown
page readonly
F928FFF000
stack
page read and write
F928BFE000
stack
page read and write
2598BF15000
heap
page read and write
There are 40 hidden memdumps, click here to show them.