IOC Report
7950COPY.exe

loading gif

Files

File Path
Type
Category
Malicious
7950COPY.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7950COPY.exe_e07bac6fc75f0dd754c80383f3a605ac56aa5_579a01df_e20d6790-64c5-4ba2-a7a8-e1f22217ea1c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER40CA.tmp.dmp
Mini DuMP crash report, 16 streams, Sat Oct 26 18:11:33 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER44E2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4531.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3mwi2efp.lkh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mr4flysb.5fq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ocm30u3u.1vl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w2lohtxg.gea.ps1
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\7950COPY.exe
"C:\Users\user\Desktop\7950COPY.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\7950COPY.exe" -Force
malicious
C:\Windows\regedit.exe
"C:\Windows\regedit.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"
malicious
C:\Windows\SysWOW64\fltMC.exe
"C:\Windows\SysWOW64\fltMC.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6908 -s 1532
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\SysWOW64\psr.exe
"C:\Windows\SysWOW64\psr.exe"
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
EnableLUA
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance
Enabled
\REGISTRY\A\{c2722128-8f37-bcba-95bd-580fd3f1a9bd}\Root\InventoryApplicationFile\7950copy.exe|ecd39fcff9d767d6
ProgramId
\REGISTRY\A\{c2722128-8f37-bcba-95bd-580fd3f1a9bd}\Root\InventoryApplicationFile\7950copy.exe|ecd39fcff9d767d6
FileId
\REGISTRY\A\{c2722128-8f37-bcba-95bd-580fd3f1a9bd}\Root\InventoryApplicationFile\7950copy.exe|ecd39fcff9d767d6
LowerCaseLongPath
\REGISTRY\A\{c2722128-8f37-bcba-95bd-580fd3f1a9bd}\Root\InventoryApplicationFile\7950copy.exe|ecd39fcff9d767d6
LongPathHash
\REGISTRY\A\{c2722128-8f37-bcba-95bd-580fd3f1a9bd}\Root\InventoryApplicationFile\7950copy.exe|ecd39fcff9d767d6
Name
\REGISTRY\A\{c2722128-8f37-bcba-95bd-580fd3f1a9bd}\Root\InventoryApplicationFile\7950copy.exe|ecd39fcff9d767d6
OriginalFileName
\REGISTRY\A\{c2722128-8f37-bcba-95bd-580fd3f1a9bd}\Root\InventoryApplicationFile\7950copy.exe|ecd39fcff9d767d6
Publisher
\REGISTRY\A\{c2722128-8f37-bcba-95bd-580fd3f1a9bd}\Root\InventoryApplicationFile\7950copy.exe|ecd39fcff9d767d6
Version
\REGISTRY\A\{c2722128-8f37-bcba-95bd-580fd3f1a9bd}\Root\InventoryApplicationFile\7950copy.exe|ecd39fcff9d767d6
BinFileVersion
\REGISTRY\A\{c2722128-8f37-bcba-95bd-580fd3f1a9bd}\Root\InventoryApplicationFile\7950copy.exe|ecd39fcff9d767d6
BinaryType
\REGISTRY\A\{c2722128-8f37-bcba-95bd-580fd3f1a9bd}\Root\InventoryApplicationFile\7950copy.exe|ecd39fcff9d767d6
ProductName
\REGISTRY\A\{c2722128-8f37-bcba-95bd-580fd3f1a9bd}\Root\InventoryApplicationFile\7950copy.exe|ecd39fcff9d767d6
ProductVersion
\REGISTRY\A\{c2722128-8f37-bcba-95bd-580fd3f1a9bd}\Root\InventoryApplicationFile\7950copy.exe|ecd39fcff9d767d6
LinkDate
\REGISTRY\A\{c2722128-8f37-bcba-95bd-580fd3f1a9bd}\Root\InventoryApplicationFile\7950copy.exe|ecd39fcff9d767d6
BinProductVersion
\REGISTRY\A\{c2722128-8f37-bcba-95bd-580fd3f1a9bd}\Root\InventoryApplicationFile\7950copy.exe|ecd39fcff9d767d6
AppxPackageFullName
\REGISTRY\A\{c2722128-8f37-bcba-95bd-580fd3f1a9bd}\Root\InventoryApplicationFile\7950copy.exe|ecd39fcff9d767d6
AppxPackageRelativeId
\REGISTRY\A\{c2722128-8f37-bcba-95bd-580fd3f1a9bd}\Root\InventoryApplicationFile\7950copy.exe|ecd39fcff9d767d6
Size
\REGISTRY\A\{c2722128-8f37-bcba-95bd-580fd3f1a9bd}\Root\InventoryApplicationFile\7950copy.exe|ecd39fcff9d767d6
Language
\REGISTRY\A\{c2722128-8f37-bcba-95bd-580fd3f1a9bd}\Root\InventoryApplicationFile\7950copy.exe|ecd39fcff9d767d6
Usn
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
C50000
system
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3110000
trusted library allocation
page read and write
malicious
3160000
trusted library allocation
page read and write
malicious
5DB0000
system
page execute and read and write
malicious
17097B34000
trusted library allocation
page read and write
malicious
17095CCF000
heap
page read and write
2FE1000
heap
page read and write
2E93000
heap
page read and write
2E8A000
heap
page read and write
3106000
heap
page read and write
17095C66000
heap
page read and write
170A851F000
trusted library allocation
page read and write
17095EC0000
heap
page read and write
170977F0000
heap
page read and write
170AB942000
trusted library allocation
page read and write
2FE1000
heap
page read and write
17095CA6000
heap
page read and write
17095CA4000
heap
page read and write
2FE1000
heap
page read and write
3690000
trusted library allocation
page read and write
170B08C1000
trusted library allocation
page read and write
2FE1000
heap
page read and write
17095E43000
trusted library allocation
page read and write
51CC000
stack
page read and write
17097B7A000
trusted library allocation
page read and write
170AE142000
trusted library allocation
page read and write
17095BA0000
heap
page read and write
2FE1000
heap
page read and write
170A7C4E000
trusted library allocation
page read and write
2FD4000
heap
page read and write
2FE1000
heap
page read and write
3682000
direct allocation
page execute and read and write
31B0000
trusted library allocation
page read and write
35F52FF000
stack
page read and write
17095B02000
unkown
page readonly
170A9B42000
trusted library allocation
page read and write
2FE1000
heap
page read and write
3469000
direct allocation
page execute and read and write
2E8C000
heap
page read and write
2EED000
heap
page read and write
5BB8000
heap
page read and write
17095BD0000
heap
page read and write
170AC342000
trusted library allocation
page read and write
2E90000
heap
page read and write
2FE1000
heap
page read and write
9DC000
stack
page read and write
32C2000
heap
page read and write
3260000
trusted library allocation
page execute and read and write
2FE1000
heap
page read and write
6111000
direct allocation
page execute and read and write
59E0000
heap
page read and write
2FE1000
heap
page read and write
2FE1000
heap
page read and write
170A7E71000
trusted library allocation
page read and write
3611000
direct allocation
page execute and read and write
17095C6C000
heap
page read and write
346D000
direct allocation
page execute and read and write
34DE000
direct allocation
page execute and read and write
2FE1000
heap
page read and write
170A7801000
trusted library allocation
page read and write
17095EC5000
heap
page read and write
2FE1000
heap
page read and write
2FD4000
heap
page read and write
32C6000
heap
page read and write
2FE1000
heap
page read and write
17097801000
trusted library allocation
page read and write
170B12C1000
trusted library allocation
page read and write
6370000
heap
page read and write
3690000
trusted library allocation
page read and write
2FE1000
heap
page read and write
17095E60000
heap
page execute and read and write
5F8D000
direct allocation
page execute and read and write
30F0000
heap
page read and write
5E60000
direct allocation
page execute and read and write
170A82FD000
trusted library allocation
page read and write
17095CD2000
heap
page read and write
5990000
heap
page read and write
17095CDB000
heap
page read and write
15DDC000
system
page read and write
2FE1000
heap
page read and write
170AAF42000
trusted library allocation
page read and write
170A8742000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
170AFEC1000
trusted library allocation
page read and write
360D000
direct allocation
page execute and read and write
35F4FFE000
stack
page read and write
17095C8F000
heap
page read and write
2FE1000
heap
page read and write
17095BD5000
heap
page read and write
2E88000
heap
page read and write
17095B06000
unkown
page readonly
594E000
stack
page read and write
5DAE000
stack
page read and write
2E93000
heap
page read and write
2FE3000
heap
page read and write
17097825000
trusted library allocation
page read and write
59F0000
heap
page read and write
5BB0000
heap
page read and write
5B40000
direct allocation
page read and write
17095C00000
heap
page read and write
170AA542000
trusted library allocation
page read and write
2FE1000
heap
page read and write
17095E40000
trusted library allocation
page read and write
2FE1000
heap
page read and write
170A9142000
trusted library allocation
page read and write
612D000
direct allocation
page execute and read and write
170A7807000
trusted library allocation
page read and write
2FE1000
heap
page read and write
CD0000
heap
page read and write
17095B00000
unkown
page readonly
17095C60000
heap
page read and write
6B50000
unclassified section
page execute and read and write
2E80000
heap
page read and write
63DE000
stack
page read and write
39AC000
unclassified section
page read and write
6ADE000
unclassified section
page execute and read and write
5F89000
direct allocation
page execute and read and write
2FE1000
heap
page read and write
35F55FF000
stack
page read and write
36D2000
unclassified section
page read and write
2FE1000
heap
page read and write
2FC0000
heap
page read and write
3199000
heap
page read and write
61A8000
direct allocation
page execute and read and write
5AF0000
direct allocation
page read and write
17095C40000
trusted library allocation
page read and write
6126000
direct allocation
page execute and read and write
6380000
unclassified section
page execute and read and write
2E8A000
heap
page read and write
35F58FD000
stack
page read and write
170A7A2C000
trusted library allocation
page read and write
35F53FE000
stack
page read and write
30E0000
heap
page read and write
2FE1000
heap
page read and write
641E000
stack
page read and write
2FE1000
heap
page read and write
35F54FF000
stack
page read and write
170AD742000
trusted library allocation
page read and write
35F4BD2000
stack
page read and write
17097B68000
trusted library allocation
page read and write
35F50FE000
stack
page read and write
2FE1000
heap
page read and write
170ACD42000
trusted library allocation
page read and write
2FE1000
heap
page read and write
17095BE0000
heap
page read and write
2FE1000
heap
page read and write
62AF000
stack
page read and write
5FFE000
direct allocation
page execute and read and write
17095B90000
heap
page read and write
35F59FE000
stack
page read and write
2FE1000
heap
page read and write
400000
remote allocation
page execute and read and write
2FE1000
heap
page read and write
35F51FC000
stack
page read and write
3337000
heap
page read and write
3340000
direct allocation
page execute and read and write
2E88000
heap
page read and write
17095E30000
trusted library allocation
page read and write
2FD0000
heap
page read and write
5830000
heap
page read and write
57FA000
stack
page read and write
400000
remote allocation
page execute and read and write
15B02000
system
page read and write
2FE1000
heap
page read and write
170A7ACE000
trusted library allocation
page read and write
5B85000
direct allocation
page execute and read and write
598E000
stack
page read and write
2FE0000
heap
page read and write
2E8F000
heap
page read and write
3690000
trusted library allocation
page read and write
2FE1000
heap
page read and write
2FD4000
heap
page read and write
C3B000
stack
page read and write
17095E90000
heap
page execute and read and write
35F4EFE000
stack
page read and write
2E8D000
heap
page read and write
2FE1000
heap
page read and write
There are 168 hidden memdumps, click here to show them.