IOC Report
1732382826559c62d8b84c02e95636f46212b9f803082b7868187644fff4926ca8a53349c1874.dat-decoded.exe

loading gif

Files

File Path
Type
Category
Malicious
1732382826559c62d8b84c02e95636f46212b9f803082b7868187644fff4926ca8a53349c1874.dat-decoded.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_1732382826559c62_c9e6802a6b8064fb6ff81fe4b92118b45f1fd583_4ee20893_e28f43ba-ed04-47fb-bb23-c9b07e6ae222\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\ProgramData\Microsoft\Windows\WER\Temp\WER49BA.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Nov 23 17:29:09 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4A09.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4A29.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1732382826559c62d8b84c02e95636f46212b9f803082b7868187644fff4926ca8a53349c1874.dat-decoded.exe
"C:\Users\user\Desktop\1732382826559c62d8b84c02e95636f46212b9f803082b7868187644fff4926ca8a53349c1874.dat-decoded.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6648 -s 224

URLs

Name
IP
Malicious
thicktoys.sbs
http://upx.sf.net
unknown
300snails.sbs
faintbl0w.sbs
3xc1aimbl0w.sbs

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
84.201.211.34

Registry

Path
Value
Malicious
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
ProgramId
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
FileId
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
LowerCaseLongPath
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
LongPathHash
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
Name
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
OriginalFileName
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
Publisher
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
Version
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
BinFileVersion
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
BinaryType
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
ProductName
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
ProductVersion
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
LinkDate
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
BinProductVersion
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
AppxPackageFullName
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
AppxPackageRelativeId
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
Size
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
Language
\REGISTRY\A\{53e17b1d-01ed-0692-67ea-f58c1343b17e}\Root\InventoryApplicationFile\1732382826559c62|a03f180e600aa3d5
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
441000
unkown
page readonly
453000
unkown
page readonly
460000
heap
page read and write
43F000
unkown
page readonly
401000
unkown
page execute read
440000
unkown
page read and write
400000
unkown
page readonly
43F000
unkown
page readonly
1E0000
heap
page read and write
442000
unkown
page write copy
640000
heap
page read and write
442000
unkown
page write copy
47E000
heap
page read and write
400000
unkown
page readonly
47A000
heap
page read and write
19D000
stack
page read and write
401000
unkown
page execute read
453000
unkown
page readonly
9D000
stack
page read and write
470000
heap
page read and write
There are 10 hidden memdumps, click here to show them.