IOC Report
17300326286fc6e1e6890015b3b51edbcffbeeeb53d18d19cce1fb289d5f0a36124f682a1d474.dat-decoded.exe

loading gif

Files

File Path
Type
Category
Malicious
17300326286fc6e1e6890015b3b51edbcffbeeeb53d18d19cce1fb289d5f0a36124f682a1d474.dat-decoded.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_17300326286fc6e1_9c17626045119e4db7ef6b6a89c127892c86282e_b2fb50dc_e1af0300-b3b6-4015-946d-1c64423a659c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER40A8.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Oct 27 12:39:35 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER40E7.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4136.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\17300326286fc6e1e6890015b3b51edbcffbeeeb53d18d19cce1fb289d5f0a36124f682a1d474.dat-decoded.exe
"C:\Users\user\Desktop\17300326286fc6e1e6890015b3b51edbcffbeeeb53d18d19cce1fb289d5f0a36124f682a1d474.dat-decoded.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3500 -s 224

URLs

Name
IP
Malicious
presticitpo.store
malicious
founpiuer.store
malicious
scriptyprefej.store
malicious
thumbystriw.store
malicious
withdrwblon.cyou
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
crisiwarny.store
malicious
navygenerayk.store
malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{1150b737-b20c-ce03-acb0-026b61f944a2}\Root\InventoryApplicationFile\17300326286fc6e1|d0de804077b580a2
ProgramId
\REGISTRY\A\{1150b737-b20c-ce03-acb0-026b61f944a2}\Root\InventoryApplicationFile\17300326286fc6e1|d0de804077b580a2
FileId
\REGISTRY\A\{1150b737-b20c-ce03-acb0-026b61f944a2}\Root\InventoryApplicationFile\17300326286fc6e1|d0de804077b580a2
LowerCaseLongPath
\REGISTRY\A\{1150b737-b20c-ce03-acb0-026b61f944a2}\Root\InventoryApplicationFile\17300326286fc6e1|d0de804077b580a2
LongPathHash
\REGISTRY\A\{1150b737-b20c-ce03-acb0-026b61f944a2}\Root\InventoryApplicationFile\17300326286fc6e1|d0de804077b580a2
Name
\REGISTRY\A\{1150b737-b20c-ce03-acb0-026b61f944a2}\Root\InventoryApplicationFile\17300326286fc6e1|d0de804077b580a2
OriginalFileName
\REGISTRY\A\{1150b737-b20c-ce03-acb0-026b61f944a2}\Root\InventoryApplicationFile\17300326286fc6e1|d0de804077b580a2
Publisher
\REGISTRY\A\{1150b737-b20c-ce03-acb0-026b61f944a2}\Root\InventoryApplicationFile\17300326286fc6e1|d0de804077b580a2
Version
\REGISTRY\A\{1150b737-b20c-ce03-acb0-026b61f944a2}\Root\InventoryApplicationFile\17300326286fc6e1|d0de804077b580a2
BinFileVersion
\REGISTRY\A\{1150b737-b20c-ce03-acb0-026b61f944a2}\Root\InventoryApplicationFile\17300326286fc6e1|d0de804077b580a2
BinaryType
\REGISTRY\A\{1150b737-b20c-ce03-acb0-026b61f944a2}\Root\InventoryApplicationFile\17300326286fc6e1|d0de804077b580a2
ProductName
\REGISTRY\A\{1150b737-b20c-ce03-acb0-026b61f944a2}\Root\InventoryApplicationFile\17300326286fc6e1|d0de804077b580a2
ProductVersion
\REGISTRY\A\{1150b737-b20c-ce03-acb0-026b61f944a2}\Root\InventoryApplicationFile\17300326286fc6e1|d0de804077b580a2
LinkDate
\REGISTRY\A\{1150b737-b20c-ce03-acb0-026b61f944a2}\Root\InventoryApplicationFile\17300326286fc6e1|d0de804077b580a2
BinProductVersion
\REGISTRY\A\{1150b737-b20c-ce03-acb0-026b61f944a2}\Root\InventoryApplicationFile\17300326286fc6e1|d0de804077b580a2
AppxPackageFullName
\REGISTRY\A\{1150b737-b20c-ce03-acb0-026b61f944a2}\Root\InventoryApplicationFile\17300326286fc6e1|d0de804077b580a2
AppxPackageRelativeId
\REGISTRY\A\{1150b737-b20c-ce03-acb0-026b61f944a2}\Root\InventoryApplicationFile\17300326286fc6e1|d0de804077b580a2
Size
\REGISTRY\A\{1150b737-b20c-ce03-acb0-026b61f944a2}\Root\InventoryApplicationFile\17300326286fc6e1|d0de804077b580a2
Language
\REGISTRY\A\{1150b737-b20c-ce03-acb0-026b61f944a2}\Root\InventoryApplicationFile\17300326286fc6e1|d0de804077b580a2
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4DE000
heap
page read and write
400000
unkown
page readonly
9D000
stack
page read and write
19D000
stack
page read and write
449000
unkown
page write copy
446000
unkown
page readonly
446000
unkown
page readonly
459000
unkown
page readonly
460000
heap
page read and write
4D0000
heap
page read and write
4B0000
heap
page read and write
459000
unkown
page readonly
401000
unkown
page execute read
4DA000
heap
page read and write
400000
unkown
page readonly
1F0000
heap
page read and write
449000
unkown
page write copy
448000
unkown
page read and write
401000
unkown
page execute read
There are 9 hidden memdumps, click here to show them.