IOC Report
Scvi1cE64H.exe

loading gif

Files

File Path
Type
Category
Malicious
Scvi1cE64H.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Scvi1cE64H.exe_537799a119593c51a7c98839cb49112e54d5a1_25581918_587c2259-09a0-462d-a0b2-15feb988b233\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\SystemBootComponent.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREE1A.tmp.dmp
Mini DuMP crash report, 16 streams, Sat Nov 23 20:03:21 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF05D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF09D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SystemBootComponent.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Nov 23 19:02:00 2024, mtime=Sat Nov 23 19:02:00 2024, atime=Sat Nov 23 19:02:00 2024, length=71680, window=hide
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Scvi1cE64H.exe
"C:\Users\user\Desktop\Scvi1cE64H.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5016 -s 1936

URLs

Name
IP
Malicious
81.161.238.249
malicious
http://upx.sf.net
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

IPs

IP
Domain
Country
Malicious
81.161.238.249
unknown
Germany
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{d604110f-aae4-378b-0fa4-b859d89c22b0}\Root\InventoryApplicationFile\scvi1ce64h.exe|b552ae84ea5a6a9c
ProgramId
\REGISTRY\A\{d604110f-aae4-378b-0fa4-b859d89c22b0}\Root\InventoryApplicationFile\scvi1ce64h.exe|b552ae84ea5a6a9c
FileId
\REGISTRY\A\{d604110f-aae4-378b-0fa4-b859d89c22b0}\Root\InventoryApplicationFile\scvi1ce64h.exe|b552ae84ea5a6a9c
LowerCaseLongPath
\REGISTRY\A\{d604110f-aae4-378b-0fa4-b859d89c22b0}\Root\InventoryApplicationFile\scvi1ce64h.exe|b552ae84ea5a6a9c
LongPathHash
\REGISTRY\A\{d604110f-aae4-378b-0fa4-b859d89c22b0}\Root\InventoryApplicationFile\scvi1ce64h.exe|b552ae84ea5a6a9c
Name
\REGISTRY\A\{d604110f-aae4-378b-0fa4-b859d89c22b0}\Root\InventoryApplicationFile\scvi1ce64h.exe|b552ae84ea5a6a9c
OriginalFileName
\REGISTRY\A\{d604110f-aae4-378b-0fa4-b859d89c22b0}\Root\InventoryApplicationFile\scvi1ce64h.exe|b552ae84ea5a6a9c
Publisher
\REGISTRY\A\{d604110f-aae4-378b-0fa4-b859d89c22b0}\Root\InventoryApplicationFile\scvi1ce64h.exe|b552ae84ea5a6a9c
Version
\REGISTRY\A\{d604110f-aae4-378b-0fa4-b859d89c22b0}\Root\InventoryApplicationFile\scvi1ce64h.exe|b552ae84ea5a6a9c
BinFileVersion
\REGISTRY\A\{d604110f-aae4-378b-0fa4-b859d89c22b0}\Root\InventoryApplicationFile\scvi1ce64h.exe|b552ae84ea5a6a9c
BinaryType
\REGISTRY\A\{d604110f-aae4-378b-0fa4-b859d89c22b0}\Root\InventoryApplicationFile\scvi1ce64h.exe|b552ae84ea5a6a9c
ProductName
\REGISTRY\A\{d604110f-aae4-378b-0fa4-b859d89c22b0}\Root\InventoryApplicationFile\scvi1ce64h.exe|b552ae84ea5a6a9c
ProductVersion
\REGISTRY\A\{d604110f-aae4-378b-0fa4-b859d89c22b0}\Root\InventoryApplicationFile\scvi1ce64h.exe|b552ae84ea5a6a9c
LinkDate
\REGISTRY\A\{d604110f-aae4-378b-0fa4-b859d89c22b0}\Root\InventoryApplicationFile\scvi1ce64h.exe|b552ae84ea5a6a9c
BinProductVersion
\REGISTRY\A\{d604110f-aae4-378b-0fa4-b859d89c22b0}\Root\InventoryApplicationFile\scvi1ce64h.exe|b552ae84ea5a6a9c
AppxPackageFullName
\REGISTRY\A\{d604110f-aae4-378b-0fa4-b859d89c22b0}\Root\InventoryApplicationFile\scvi1ce64h.exe|b552ae84ea5a6a9c
AppxPackageRelativeId
\REGISTRY\A\{d604110f-aae4-378b-0fa4-b859d89c22b0}\Root\InventoryApplicationFile\scvi1ce64h.exe|b552ae84ea5a6a9c
Size
\REGISTRY\A\{d604110f-aae4-378b-0fa4-b859d89c22b0}\Root\InventoryApplicationFile\scvi1ce64h.exe|b552ae84ea5a6a9c
Language
\REGISTRY\A\{d604110f-aae4-378b-0fa4-b859d89c22b0}\Root\InventoryApplicationFile\scvi1ce64h.exe|b552ae84ea5a6a9c
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5E2000
unkown
page readonly
malicious
28B1000
trusted library allocation
page read and write
malicious
1BB4B000
stack
page read and write
2753000
heap
page read and write
1C41A000
stack
page read and write
5E0000
unkown
page readonly
1BDE0000
heap
page read and write
9FE000
heap
page read and write
A59000
heap
page read and write
1B3CE000
stack
page read and write
7FFD34846000
trusted library allocation
page read and write
128C2000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
99C000
heap
page read and write
1BA05000
stack
page read and write
A08000
heap
page read and write
128B8000
trusted library allocation
page read and write
E20000
heap
page read and write
7FFD347B4000
trusted library allocation
page read and write
28A0000
heap
page read and write
BA5000
heap
page read and write
1B789000
heap
page read and write
BA0000
heap
page read and write
E25000
heap
page read and write
9C1000
heap
page read and write
1B6CD000
stack
page read and write
9D4000
heap
page read and write
B60000
heap
page read and write
990000
heap
page read and write
1B730000
heap
page read and write
2760000
heap
page execute and read and write
26E0000
trusted library allocation
page read and write
7FFD34876000
trusted library allocation
page execute and read and write
1B793000
heap
page read and write
7FFD34793000
trusted library allocation
page execute and read and write
1C31B000
stack
page read and write
1C1DD000
stack
page read and write
1A8E0000
trusted library allocation
page read and write
7FF45E0A0000
trusted library allocation
page execute and read and write
9BB000
heap
page read and write
7FFD34850000
trusted library allocation
page execute and read and write
1C61C000
stack
page read and write
1AE3C000
stack
page read and write
7FFD347EC000
trusted library allocation
page execute and read and write
7FFD348B0000
trusted library allocation
page execute and read and write
1B2C0000
heap
page execute and read and write
931000
stack
page read and write
E00000
trusted library allocation
page read and write
1AC3C000
heap
page read and write
7FFD34840000
trusted library allocation
page read and write
1B4CE000
stack
page read and write
1BA10000
heap
page read and write
1B8CE000
stack
page read and write
7FFD34940000
trusted library allocation
page read and write
9D1000
heap
page read and write
1BD44000
stack
page read and write
1B8FF000
stack
page read and write
7FFD347BD000
trusted library allocation
page execute and read and write
980000
heap
page read and write
286F000
stack
page read and write
7FFD34794000
trusted library allocation
page read and write
7FFD3484C000
trusted library allocation
page execute and read and write
7FFD34950000
trusted library allocation
page execute and read and write
9C3000
heap
page read and write
DB0000
heap
page read and write
26D0000
trusted library allocation
page read and write
7FFD34932000
trusted library allocation
page read and write
1B732000
heap
page read and write
7FFD347B0000
trusted library allocation
page read and write
26E3000
trusted library allocation
page read and write
1BC48000
stack
page read and write
7FFD34790000
trusted library allocation
page read and write
DAC000
stack
page read and write
1B5CE000
stack
page read and write
CAC000
stack
page read and write
1C21F000
stack
page read and write
2750000
heap
page read and write
1B6D0000
heap
page read and write
996000
heap
page read and write
1B790000
heap
page read and write
5F4000
unkown
page readonly
B80000
heap
page read and write
7FFD347A3000
trusted library allocation
page read and write
128B1000
trusted library allocation
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
F2E000
stack
page read and write
1BDAF000
stack
page read and write
5E0000
unkown
page readonly
7FFD3479D000
trusted library allocation
page execute and read and write
There are 79 hidden memdumps, click here to show them.