IOC Report
24v3hhTWiA.exe

loading gif

Files

File Path
Type
Category
Malicious
24v3hhTWiA.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_24v3hhTWiA.exe_55a9558425bdb232d9cb2e64a1f513463d6cecb3_cb184bb6_d81e95d6-b9fa-4500-9770-b4897484fd6a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA74E.tmp.dmp
Mini DuMP crash report, 16 streams, Sat Oct 26 20:47:55 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA953.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAB28.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\24v3hhTWiA.exe
"C:\Users\user\Desktop\24v3hhTWiA.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7292 -s 808

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
ProgramId
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
FileId
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
LowerCaseLongPath
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
LongPathHash
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
Name
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
OriginalFileName
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
Publisher
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
Version
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
BinFileVersion
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
BinaryType
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
ProductName
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
ProductVersion
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
LinkDate
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
BinProductVersion
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
AppxPackageFullName
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
AppxPackageRelativeId
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
Size
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
Language
\REGISTRY\A\{ec61d3c4-2d82-0b3b-bc37-215e1ec730e7}\Root\InventoryApplicationFile\24v3hhtwia.exe|11b9e4140c544d41
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3F155FE000
stack
page read and write
3F149FE000
stack
page read and write
14073FB4000
unkown
page readonly
14010001000
trusted library allocation
page read and write
3F141FE000
stack
page read and write
140741D6000
heap
page read and write
14073F60000
unkown
page readonly
14010011000
trusted library allocation
page read and write
7FFB4B350000
trusted library allocation
page read and write
14074230000
heap
page read and write
7FFB4B34D000
trusted library allocation
page execute and read and write
1407416F000
heap
page read and write
3F151FD000
stack
page read and write
7FFB4B35A000
trusted library allocation
page read and write
3F14DFF000
stack
page read and write
14075B40000
heap
page read and write
140744B5000
heap
page read and write
7FFB4B3F0000
trusted library allocation
page read and write
1407416C000
heap
page read and write
14076530000
heap
page read and write
14074270000
heap
page read and write
14000001000
trusted library allocation
page read and write
14074160000
heap
page read and write
14074158000
heap
page read and write
1407419E000
heap
page read and write
14074305000
heap
page read and write
7FF4B7EA0000
trusted library allocation
page execute and read and write
7FFB4B344000
trusted library allocation
page read and write
14074040000
heap
page read and write
7FFB4B36D000
trusted library allocation
page execute and read and write
14075B70000
heap
page execute and read and write
140742E3000
trusted library allocation
page read and write
14074156000
heap
page read and write
7FFB4B4E0000
trusted library allocation
page read and write
14010008000
trusted library allocation
page read and write
140742D0000
trusted library allocation
page read and write
7FFB4B4F0000
trusted library allocation
page read and write
14074130000
heap
page read and write
1401000D000
trusted library allocation
page read and write
14074250000
heap
page read and write
14075BC0000
heap
page read and write
140742E0000
trusted library allocation
page read and write
3F15DFE000
stack
page read and write
7FFB4B39C000
trusted library allocation
page execute and read and write
14073F62000
unkown
page readonly
140744B0000
heap
page read and write
14074300000
heap
page read and write
7FFB4B426000
trusted library allocation
page execute and read and write
7FFB4B460000
trusted library allocation
page execute and read and write
7FFB4B343000
trusted library allocation
page execute and read and write
3F13DF0000
stack
page read and write
7FFB4B400000
trusted library allocation
page execute and read and write
7FFB4B357000
trusted library allocation
page read and write
14075B80000
heap
page execute and read and write
3F159FE000
stack
page read and write
7FFB4B342000
trusted library allocation
page read and write
14074199000
heap
page read and write
7FFB4B352000
trusted library allocation
page read and write
140742B0000
trusted library allocation
page read and write
7FFB4B3FC000
trusted library allocation
page execute and read and write
14074139000
heap
page read and write
14075BC8000
heap
page read and write
14010003000
trusted library allocation
page read and write
3F145FE000
stack
page read and write
There are 54 hidden memdumps, click here to show them.