IOC Report
X4roU7TtF1.exe

loading gif

Files

File Path
Type
Category
Malicious
X4roU7TtF1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_X4roU7TtF1.exe_3536f0aed88ac12918802edacecdcde0e9dcd6_239356dd_6e9b2643-1a1b-4100-a01c-7dd8f3b46af7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4E3F.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Nov 25 23:12:04 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4F1A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4F3B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\X4roU7TtF1.exe
"C:\Users\user\Desktop\X4roU7TtF1.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 1076

URLs

Name
IP
Malicious
http://92.255.57.88
unknown
malicious
http://92.255.57.88/
92.255.57.88
malicious
http://92.255.57.88/7bbacc20a3bd2eb5.php
92.255.57.88
malicious
http://92.255.57.88/7bbacc20a3bd2eb5.phpw#
unknown
http://92.255.57.88/7bbacc20a3bd2eb5.phpj
unknown
http://upx.sf.net
unknown
http://92.255.57.883
unknown
http://92.255.57.88/7bbacc20a3bd2eb5.phpV
unknown
http://92.255.57.88/7bbacc20a3bd2eb5.phpq
unknown
http://92.255.57.88/X
unknown

IPs

IP
Domain
Country
Malicious
92.255.57.88
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{4c4b5fce-eda4-c580-1a82-bc9a4ed07482}\Root\InventoryApplicationFile\x4rou7ttf1.exe|77e5dc28215a5a2d
ProgramId
\REGISTRY\A\{4c4b5fce-eda4-c580-1a82-bc9a4ed07482}\Root\InventoryApplicationFile\x4rou7ttf1.exe|77e5dc28215a5a2d
FileId
\REGISTRY\A\{4c4b5fce-eda4-c580-1a82-bc9a4ed07482}\Root\InventoryApplicationFile\x4rou7ttf1.exe|77e5dc28215a5a2d
LowerCaseLongPath
\REGISTRY\A\{4c4b5fce-eda4-c580-1a82-bc9a4ed07482}\Root\InventoryApplicationFile\x4rou7ttf1.exe|77e5dc28215a5a2d
LongPathHash
\REGISTRY\A\{4c4b5fce-eda4-c580-1a82-bc9a4ed07482}\Root\InventoryApplicationFile\x4rou7ttf1.exe|77e5dc28215a5a2d
Name
\REGISTRY\A\{4c4b5fce-eda4-c580-1a82-bc9a4ed07482}\Root\InventoryApplicationFile\x4rou7ttf1.exe|77e5dc28215a5a2d
OriginalFileName
\REGISTRY\A\{4c4b5fce-eda4-c580-1a82-bc9a4ed07482}\Root\InventoryApplicationFile\x4rou7ttf1.exe|77e5dc28215a5a2d
Publisher
\REGISTRY\A\{4c4b5fce-eda4-c580-1a82-bc9a4ed07482}\Root\InventoryApplicationFile\x4rou7ttf1.exe|77e5dc28215a5a2d
Version
\REGISTRY\A\{4c4b5fce-eda4-c580-1a82-bc9a4ed07482}\Root\InventoryApplicationFile\x4rou7ttf1.exe|77e5dc28215a5a2d
BinFileVersion
\REGISTRY\A\{4c4b5fce-eda4-c580-1a82-bc9a4ed07482}\Root\InventoryApplicationFile\x4rou7ttf1.exe|77e5dc28215a5a2d
BinaryType
\REGISTRY\A\{4c4b5fce-eda4-c580-1a82-bc9a4ed07482}\Root\InventoryApplicationFile\x4rou7ttf1.exe|77e5dc28215a5a2d
ProductName
\REGISTRY\A\{4c4b5fce-eda4-c580-1a82-bc9a4ed07482}\Root\InventoryApplicationFile\x4rou7ttf1.exe|77e5dc28215a5a2d
ProductVersion
\REGISTRY\A\{4c4b5fce-eda4-c580-1a82-bc9a4ed07482}\Root\InventoryApplicationFile\x4rou7ttf1.exe|77e5dc28215a5a2d
LinkDate
\REGISTRY\A\{4c4b5fce-eda4-c580-1a82-bc9a4ed07482}\Root\InventoryApplicationFile\x4rou7ttf1.exe|77e5dc28215a5a2d
BinProductVersion
\REGISTRY\A\{4c4b5fce-eda4-c580-1a82-bc9a4ed07482}\Root\InventoryApplicationFile\x4rou7ttf1.exe|77e5dc28215a5a2d
AppxPackageFullName
\REGISTRY\A\{4c4b5fce-eda4-c580-1a82-bc9a4ed07482}\Root\InventoryApplicationFile\x4rou7ttf1.exe|77e5dc28215a5a2d
AppxPackageRelativeId
\REGISTRY\A\{4c4b5fce-eda4-c580-1a82-bc9a4ed07482}\Root\InventoryApplicationFile\x4rou7ttf1.exe|77e5dc28215a5a2d
Size
\REGISTRY\A\{4c4b5fce-eda4-c580-1a82-bc9a4ed07482}\Root\InventoryApplicationFile\x4rou7ttf1.exe|77e5dc28215a5a2d
Language
\REGISTRY\A\{4c4b5fce-eda4-c580-1a82-bc9a4ed07482}\Root\InventoryApplicationFile\x4rou7ttf1.exe|77e5dc28215a5a2d
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
8FE000
heap
page read and write
malicious
850000
direct allocation
page read and write
malicious
810000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
8F0000
heap
page read and write
2490000
heap
page read and write
24D3000
heap
page read and write
1AC6E000
stack
page read and write
48E000
unkown
page execute and read and write
19D000
stack
page read and write
1A5AF000
stack
page read and write
240E000
stack
page read and write
4AF000
unkown
page execute and read and write
465000
unkown
page readonly
750000
heap
page read and write
1A6AF000
stack
page read and write
42B000
unkown
page execute read
760000
direct allocation
page execute and read and write
890000
heap
page read and write
BEF000
stack
page read and write
964000
heap
page read and write
1A8AF000
stack
page read and write
1A7AF000
stack
page read and write
194000
stack
page read and write
8FA000
heap
page read and write
1F0000
heap
page read and write
7CE000
stack
page read and write
1A9EE000
stack
page read and write
9C000
stack
page read and write
23CE000
stack
page read and write
8A0000
heap
page read and write
496000
unkown
page execute and read and write
244E000
stack
page read and write
1AB2D000
stack
page read and write
AEF000
stack
page read and write
248E000
stack
page read and write
720000
heap
page read and write
80E000
stack
page read and write
401000
unkown
page execute read
400000
unkown
page readonly
638000
unkown
page execute and read and write
1A8EE000
stack
page read and write
1AA2E000
stack
page read and write
92F000
heap
page read and write
24D0000
heap
page read and write
755000
heap
page read and write
458000
unkown
page write copy
945000
heap
page read and write
1AB6E000
stack
page read and write
64A000
unkown
page execute and read and write
There are 40 hidden memdumps, click here to show them.