IOC Report
LHA9oUEAwZ.exe

loading gif

Files

File Path
Type
Category
Malicious
LHA9oUEAwZ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\testnt.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_LHA9oUEAwZ.exe_7062d95b25b19cadb9259966c0d1ce298fffcd9_694179a5_37dded76-bd19-4478-840b-4d209993f4c2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8909.tmp.dmp
Mini DuMP crash report, 16 streams, Tue Mar 26 19:08:39 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8B7B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8BAB.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\testnt.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 26 16:23:18 2024, mtime=Tue Mar 26 16:23:18 2024, atime=Tue Mar 26 16:23:18 2024, length=72192, window=hide
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LHA9oUEAwZ.exe
"C:\Users\user\Desktop\LHA9oUEAwZ.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6384 -s 844

URLs

Name
IP
Malicious
win-britain.gl.at.ply.gg
malicious
http://upx.sf.net
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1

Domains

Name
IP
Malicious
win-britain.gl.at.ply.gg
147.185.221.18
malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
147.185.221.18
win-britain.gl.at.ply.gg
United States
malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LHA9oUEAwZ_RASMANCS
FileDirectory
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
ProgramId
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
FileId
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
LowerCaseLongPath
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
LongPathHash
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
Name
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
OriginalFileName
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
Publisher
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
Version
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
BinFileVersion
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
BinaryType
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
ProductName
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
ProductVersion
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
LinkDate
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
BinProductVersion
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
AppxPackageFullName
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
AppxPackageRelativeId
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
Size
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
Language
\REGISTRY\A\{9265de07-4533-bb7b-e661-ff5ca8c232d0}\Root\InventoryApplicationFile\lha9oueawz.exe|5fb71754b43a82ab
Usn
There are 23 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
DC2000
unkown
page readonly
malicious
3111000
trusted library allocation
page read and write
malicious
12D5000
heap
page read and write
7FFAAC4E0000
trusted library allocation
page execute and read and write
1B69D000
stack
page read and write
7FFAAC500000
trusted library allocation
page read and write
1160000
heap
page read and write
7FFAAC38C000
trusted library allocation
page execute and read and write
30D0000
heap
page read and write
7FFAAC33D000
trusted library allocation
page execute and read and write
1C715000
stack
page read and write
7FFAAC34D000
trusted library allocation
page execute and read and write
137F000
heap
page read and write
DC0000
unkown
page readonly
1C31E000
stack
page read and write
138B000
heap
page read and write
1C918000
stack
page read and write
DC0000
unkown
page readonly
2FA0000
heap
page read and write
3677000
trusted library allocation
page read and write
1C032000
heap
page read and write
150E000
stack
page read and write
7FFAAC354000
trusted library allocation
page read and write
1111000
stack
page read and write
1BAC3000
heap
page read and write
7FFAAC4D0000
trusted library allocation
page read and write
3100000
heap
page execute and read and write
140E000
heap
page read and write
7FFAAC3E0000
trusted library allocation
page read and write
7FFAAC343000
trusted library allocation
page read and write
12D0000
heap
page read and write
160F000
stack
page read and write
7FFAAC416000
trusted library allocation
page execute and read and write
1260000
heap
page read and write
13111000
trusted library allocation
page read and write
1352000
heap
page read and write
7FFAAC333000
trusted library allocation
page execute and read and write
1710000
trusted library allocation
page read and write
7FFB08321000
unkown
page execute read
7FFB08342000
unkown
page readonly
1240000
heap
page read and write
7FFAAC334000
trusted library allocation
page read and write
7FFAAC3F0000
trusted library allocation
page execute and read and write
7FFAAC3EC000
trusted library allocation
page execute and read and write
1310000
heap
page read and write
133E000
heap
page read and write
7FFB08345000
unkown
page readonly
13121000
trusted library allocation
page read and write
1381000
heap
page read and write
7FFB08340000
unkown
page read and write
7FFAAC450000
trusted library allocation
page execute and read and write
7FFAAC35D000
trusted library allocation
page execute and read and write
1750000
heap
page read and write
1BBD0000
heap
page execute and read and write
7FF47C220000
trusted library allocation
page execute and read and write
7FFAAC4F0000
trusted library allocation
page execute and read and write
7FFB08336000
unkown
page readonly
13D6000
heap
page read and write
1280000
heap
page read and write
12E0000
trusted library allocation
page read and write
7FFAAC340000
trusted library allocation
page read and write
1713000
trusted library allocation
page read and write
1755000
heap
page read and write
DD4000
unkown
page readonly
1BBCB000
stack
page read and write
1300000
trusted library allocation
page read and write
13118000
trusted library allocation
page read and write
7FFAAC4D2000
trusted library allocation
page read and write
1C818000
stack
page read and write
1C029000
heap
page read and write
1BFE3000
heap
page read and write
7FFAAC330000
trusted library allocation
page read and write
1CAA0000
heap
page read and write
1BFE0000
heap
page read and write
7FFB08320000
unkown
page readonly
13D0000
heap
page read and write
7FFAAC3E6000
trusted library allocation
page read and write
1BCDE000
stack
page read and write
1311E000
trusted library allocation
page read and write
30AE000
stack
page read and write
7FFAAC350000
trusted library allocation
page read and write
7FFAAC35B000
trusted library allocation
page execute and read and write
1B492000
heap
page read and write
1355000
heap
page read and write
1BAC0000
heap
page read and write
There are 75 hidden memdumps, click here to show them.