IOC Report
7gA40t6M1y.exe

loading gif

Files

File Path
Type
Category
Malicious
7gA40t6M1y.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7gA40t6M1y.exe_d1143dfa83185f7ef81f4d243cc317ef368e41f6_a6f7c61e_762a87b1-1674-4a5a-8e2a-3eaf72c9bf2d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER42E0.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Mar 28 08:09:58 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER438D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER43CC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\7gA40t6M1y.exe
"C:\Users\user\Desktop\7gA40t6M1y.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 1620

URLs

Name
IP
Malicious
paintercrutcheniw.shop
malicious
communicationgenerwo.shop
malicious
pillowbrocccolipe.shop
malicious
enthusiasimtitleow.shop
malicious
worryfillvolcawoi.shop
malicious
dismissalcylinderhostw.shop
malicious
diskretainvigorousiw.shop
malicious
cleartotalfisherwo.shop
malicious
affordcharmcropwo.shop
malicious
https://paintercrutcheniw.shop/api
172.67.187.135
https://paintercrutcheniw.shop/D
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://paintercrutcheniw.shop:443/api
unknown
https://paintercrutcheniw.shop/apie
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://paintercrutcheniw.shop/apiyhnncjkhggdhalmcnfklkD
unknown
https://paintercrutcheniw.shop/api;C
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://paintercrutcheniw.shop/y
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://paintercrutcheniw.shop/R
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://paintercrutcheniw.shop/Y
unknown
https://paintercrutcheniw.shop/
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
paintercrutcheniw.shop
172.67.187.135
malicious

IPs

IP
Domain
Country
Malicious
172.67.187.135
paintercrutcheniw.shop
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
ProgramId
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
FileId
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
LowerCaseLongPath
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
LongPathHash
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
Name
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
OriginalFileName
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
Publisher
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
Version
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
BinFileVersion
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
BinaryType
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
ProductName
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
ProductVersion
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
LinkDate
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
BinProductVersion
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
AppxPackageFullName
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
AppxPackageRelativeId
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
Size
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
Language
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
27C0000
direct allocation
page read and write
malicious
D4B000
heap
page read and write
32EF000
trusted library allocation
page read and write
33C4000
trusted library allocation
page read and write
D8E000
stack
page read and write
33E8000
trusted library allocation
page read and write
32EE000
trusted library allocation
page read and write
331B000
trusted library allocation
page read and write
3409000
trusted library allocation
page read and write
361F000
trusted library allocation
page read and write
3920000
heap
page read and write
318F000
stack
page read and write
3303000
trusted library allocation
page read and write
27FD000
stack
page read and write
32E7000
trusted library allocation
page read and write
338F000
trusted library allocation
page read and write
338B000
trusted library allocation
page read and write
D46000
heap
page read and write
D4B000
heap
page read and write
CF9000
heap
page read and write
D47000
heap
page read and write
35F0000
heap
page read and write
32E8000
trusted library allocation
page read and write
3377000
trusted library allocation
page read and write
3335000
trusted library allocation
page read and write
3305000
trusted library allocation
page read and write
D2E000
heap
page read and write
D47000
heap
page read and write
3411000
trusted library allocation
page read and write
3409000
trusted library allocation
page read and write
3303000
trusted library allocation
page read and write
AF5000
unkown
page read and write
33AF000
trusted library allocation
page read and write
33F9000
trusted library allocation
page read and write
32FA000
trusted library allocation
page read and write
D44000
heap
page read and write
3303000
trusted library allocation
page read and write
1F0000
heap
page read and write
3377000
trusted library allocation
page read and write
32E9000
trusted library allocation
page read and write
32E8000
trusted library allocation
page read and write
32F8000
trusted library allocation
page read and write
D47000
heap
page read and write
32E8000
trusted library allocation
page read and write
3757000
trusted library allocation
page read and write
387A000
trusted library allocation
page read and write
32F7000
trusted library allocation
page read and write
3419000
trusted library allocation
page read and write
338F000
trusted library allocation
page read and write
2ACE000
stack
page read and write
33A7000
trusted library allocation
page read and write
3304000
trusted library allocation
page read and write
33C4000
trusted library allocation
page read and write
32E5000
trusted library allocation
page read and write
2900000
heap
page read and write
400000
unkown
page readonly
33AE000
trusted library allocation
page read and write
33A7000
trusted library allocation
page read and write
3303000
trusted library allocation
page read and write
32E5000
trusted library allocation
page read and write
D47000
heap
page read and write
337E000
trusted library allocation
page read and write
383F000
stack
page read and write
3331000
trusted library allocation
page read and write
E8F000
stack
page read and write
3307000
trusted library allocation
page read and write
33F3000
trusted library allocation
page read and write
33A0000
trusted library allocation
page read and write
D4B000
heap
page read and write
332E000
trusted library allocation
page read and write
D4B000
heap
page read and write
3303000
trusted library allocation
page read and write
CB6000
heap
page read and write
3302000
trusted library allocation
page read and write
337E000
trusted library allocation
page read and write
3326000
trusted library allocation
page read and write
33A3000
trusted library allocation
page read and write
33F1000
trusted library allocation
page read and write
339C000
trusted library allocation
page read and write
D24000
heap
page read and write
ECE000
stack
page read and write
3307000
trusted library allocation
page read and write
33F1000
trusted library allocation
page read and write
3329000
trusted library allocation
page read and write
3416000
trusted library allocation
page read and write
3305000
trusted library allocation
page read and write
3419000
trusted library allocation
page read and write
33F9000
trusted library allocation
page read and write
3300000
trusted library allocation
page read and write
3305000
trusted library allocation
page read and write
32E6000
trusted library allocation
page read and write
32E6000
trusted library allocation
page read and write
CCA000
heap
page read and write
3303000
trusted library allocation
page read and write
D4B000
heap
page read and write
3303000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
CCA000
heap
page read and write
3419000
trusted library allocation
page read and write
D2F000
heap
page read and write
3311000
trusted library allocation
page read and write
3384000
trusted library allocation
page read and write
3303000
trusted library allocation
page read and write
373E000
stack
page read and write
D2D000
heap
page read and write
D29000
heap
page read and write
3409000
trusted library allocation
page read and write
3419000
trusted library allocation
page read and write
D4B000
heap
page read and write
32FD000
trusted library allocation
page read and write
CEB000
heap
page read and write
D4B000
heap
page read and write
32FD000
trusted library allocation
page read and write
36BF000
trusted library allocation
page read and write
AF7000
unkown
page readonly
FCF000
stack
page read and write
C5A000
heap
page read and write
3481000
trusted library allocation
page read and write
342E000
trusted library allocation
page read and write
D47000
heap
page read and write
3305000
trusted library allocation
page read and write
450000
unkown
page read and write
33E8000
trusted library allocation
page read and write
32F5000
trusted library allocation
page read and write
3397000
trusted library allocation
page read and write
340B000
trusted library allocation
page read and write
3335000
trusted library allocation
page read and write
3328000
trusted library allocation
page read and write
32E0000
trusted library allocation
page read and write
D47000
heap
page read and write
33E8000
trusted library allocation
page read and write
33B2000
trusted library allocation
page read and write
3305000
trusted library allocation
page read and write
D4B000
heap
page read and write
CAB000
heap
page read and write
33E8000
trusted library allocation
page read and write
3416000
trusted library allocation
page read and write
3301000
trusted library allocation
page read and write
32EE000
trusted library allocation
page read and write
330A000
trusted library allocation
page read and write
2CE0000
remote allocation
page read and write
3305000
trusted library allocation
page read and write
33BC000
trusted library allocation
page read and write
3325000
trusted library allocation
page read and write
D4B000
heap
page read and write
C00000
heap
page read and write
2AD0000
heap
page read and write
3389000
trusted library allocation
page read and write
D4B000
heap
page read and write
32EC000
trusted library allocation
page read and write
CEB000
heap
page read and write
3306000
trusted library allocation
page read and write
335E000
trusted library allocation
page read and write
32EF000
trusted library allocation
page read and write
3303000
trusted library allocation
page read and write
D47000
heap
page read and write
32F8000
trusted library allocation
page read and write
32E5000
trusted library allocation
page read and write
C5E000
heap
page read and write
32E5000
trusted library allocation
page read and write
3375000
trusted library allocation
page read and write
32EF000
trusted library allocation
page read and write
3304000
trusted library allocation
page read and write
3375000
trusted library allocation
page read and write
D3F000
heap
page read and write
D4B000
heap
page read and write
D4B000
heap
page read and write
3373000
trusted library allocation
page read and write
D4B000
heap
page read and write
32FF000
trusted library allocation
page read and write
D46000
heap
page read and write
3303000
trusted library allocation
page read and write
339C000
trusted library allocation
page read and write
340B000
trusted library allocation
page read and write
401000
unkown
page execute read
3416000
trusted library allocation
page read and write
2BDF000
stack
page read and write
32EE000
trusted library allocation
page read and write
D47000
heap
page read and write
33B8000
trusted library allocation
page read and write
D47000
heap
page read and write
D4B000
heap
page read and write
C50000
heap
page read and write
3316000
trusted library allocation
page read and write
338B000
trusted library allocation
page read and write
32E8000
trusted library allocation
page read and write
342E000
trusted library allocation
page read and write
3514000
trusted library allocation
page read and write
D24000
heap
page read and write
32FC000
trusted library allocation
page read and write
33E1000
trusted library allocation
page read and write
33E8000
trusted library allocation
page read and write
33A0000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
D42000
heap
page read and write
340B000
trusted library allocation
page read and write
330A000
trusted library allocation
page read and write
D2E000
heap
page read and write
339C000
trusted library allocation
page read and write
D40000
heap
page read and write
387F000
trusted library allocation
page read and write
D4B000
heap
page read and write
CCC000
heap
page read and write
3304000
trusted library allocation
page read and write
CA2000
heap
page read and write
3416000
trusted library allocation
page read and write
3311000
trusted library allocation
page read and write
D2B000
heap
page read and write
D47000
heap
page read and write
337E000
trusted library allocation
page read and write
36B7000
trusted library allocation
page read and write
3419000
trusted library allocation
page read and write
3375000
trusted library allocation
page read and write
3373000
trusted library allocation
page read and write
CAF000
heap
page read and write
CB1000
heap
page read and write
32EE000
trusted library allocation
page read and write
C27000
heap
page read and write
3306000
trusted library allocation
page read and write
32E5000
trusted library allocation
page read and write
33E8000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
CA1000
heap
page read and write
D2D000
heap
page read and write
32EE000
trusted library allocation
page read and write
3337000
trusted library allocation
page read and write
446000
unkown
page execute and read and write
32FD000
trusted library allocation
page read and write
BE0000
heap
page read and write
3375000
trusted library allocation
page read and write
D48000
heap
page read and write
2A4D000
stack
page read and write
D47000
heap
page read and write
CB6000
heap
page read and write
D2D000
heap
page read and write
C6E000
heap
page execute and read and write
D3F000
heap
page read and write
363F000
trusted library allocation
page read and write
31CE000
stack
page read and write
33BA000
trusted library allocation
page read and write
35F1000
heap
page read and write
339A000
trusted library allocation
page read and write
335C000
trusted library allocation
page read and write
3316000
trusted library allocation
page read and write
417000
unkown
page write copy
3373000
trusted library allocation
page read and write
C25000
heap
page read and write
339A000
trusted library allocation
page read and write
D29000
heap
page read and write
3409000
trusted library allocation
page read and write
33E8000
trusted library allocation
page read and write
D46000
heap
page read and write
CB6000
heap
page read and write
36C7000
trusted library allocation
page read and write
3305000
trusted library allocation
page read and write
3317000
trusted library allocation
page read and write
3414000
trusted library allocation
page read and write
D4A000
heap
page read and write
32EE000
trusted library allocation
page read and write
3419000
trusted library allocation
page read and write
CAF000
heap
page read and write
D4B000
heap
page read and write
CA8000
heap
page read and write
CCC000
heap
page read and write
D29000
heap
page read and write
33D1000
trusted library allocation
page read and write
3318000
trusted library allocation
page read and write
D47000
heap
page read and write
9B000
stack
page read and write
339C000
trusted library allocation
page read and write
D4B000
heap
page read and write
D43000
heap
page read and write
3326000
trusted library allocation
page read and write
3305000
trusted library allocation
page read and write
CCD000
heap
page read and write
3E3D000
trusted library allocation
page read and write
3419000
trusted library allocation
page read and write
32FD000
trusted library allocation
page read and write
2CE0000
remote allocation
page read and write
393B000
trusted library allocation
page read and write
CCA000
heap
page read and write
D4B000
heap
page read and write
195000
stack
page read and write
D4B000
heap
page read and write
33A9000
trusted library allocation
page read and write
32FD000
trusted library allocation
page read and write
33EA000
trusted library allocation
page read and write
3384000
trusted library allocation
page read and write
3607000
trusted library allocation
page read and write
32EF000
trusted library allocation
page read and write
32F7000
trusted library allocation
page read and write
33AC000
trusted library allocation
page read and write
3303000
trusted library allocation
page read and write
3300000
trusted library allocation
page read and write
33F9000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
3409000
trusted library allocation
page read and write
368F000
trusted library allocation
page read and write
C9C000
heap
page read and write
33E8000
trusted library allocation
page read and write
33BA000
trusted library allocation
page read and write
3337000
trusted library allocation
page read and write
32E8000
trusted library allocation
page read and write
33B6000
trusted library allocation
page read and write
28FE000
stack
page read and write
4347000
trusted library allocation
page read and write
308E000
stack
page read and write
3373000
trusted library allocation
page read and write
2770000
direct allocation
page execute and read and write
3305000
trusted library allocation
page read and write
3305000
trusted library allocation
page read and write
410000
unkown
page readonly
41C000
unkown
page write copy
3300000
trusted library allocation
page read and write
D47000
heap
page read and write
3387000
trusted library allocation
page read and write
3419000
trusted library allocation
page read and write
32F8000
trusted library allocation
page read and write
32CE000
stack
page read and write
3327000
trusted library allocation
page read and write
35EE000
trusted library allocation
page read and write
D43000
heap
page read and write
C20000
heap
page read and write
3419000
trusted library allocation
page read and write
D2D000
heap
page read and write
CC4000
heap
page read and write
2A8E000
stack
page read and write
3303000
trusted library allocation
page read and write
D2D000
heap
page read and write
33F9000
trusted library allocation
page read and write
D47000
heap
page read and write
33F1000
trusted library allocation
page read and write
D4B000
heap
page read and write
C99000
heap
page read and write
3316000
trusted library allocation
page read and write
3377000
trusted library allocation
page read and write
32E9000
trusted library allocation
page read and write
340B000
trusted library allocation
page read and write
338A000
trusted library allocation
page read and write
33EB000
trusted library allocation
page read and write
33D1000
trusted library allocation
page read and write
3316000
trusted library allocation
page read and write
D2D000
heap
page read and write
D47000
heap
page read and write
35E8000
trusted library allocation
page read and write
3375000
trusted library allocation
page read and write
3325000
trusted library allocation
page read and write
33A2000
trusted library allocation
page read and write
333E000
trusted library allocation
page read and write
D44000
heap
page read and write
3305000
trusted library allocation
page read and write
D2B000
heap
page read and write
400000
unkown
page execute and read and write
2CDF000
stack
page read and write
D4B000
heap
page read and write
33A6000
trusted library allocation
page read and write
3409000
trusted library allocation
page read and write
33BC000
trusted library allocation
page read and write
CB6000
heap
page read and write
33AF000
trusted library allocation
page read and write
294E000
stack
page read and write
331D000
trusted library allocation
page read and write
D47000
heap
page read and write
32EC000
trusted library allocation
page read and write
32F8000
trusted library allocation
page read and write
32FC000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
32F8000
trusted library allocation
page read and write
D4B000
heap
page read and write
D47000
heap
page read and write
33E8000
trusted library allocation
page read and write
3300000
trusted library allocation
page read and write
32E5000
trusted library allocation
page read and write
3306000
trusted library allocation
page read and write
CCA000
heap
page read and write
32FF000
trusted library allocation
page read and write
3317000
trusted library allocation
page read and write
33C5000
trusted library allocation
page read and write
D29000
heap
page read and write
CB2000
heap
page read and write
3319000
trusted library allocation
page read and write
D4B000
heap
page read and write
2CE0000
remote allocation
page read and write
AF7000
unkown
page readonly
D46000
heap
page read and write
3375000
trusted library allocation
page read and write
32F5000
trusted library allocation
page read and write
There are 377 hidden memdumps, click here to show them.