IOC Report
PjNMCtS6PN.exe

loading gif

Files

File Path
Type
Category
Malicious
PjNMCtS6PN.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_PjNMCtS6PN.exe_2ac006c9cf8578b35f2f9977ced22494d7dcd6_ad794d0d_39c8f4bf-1393-4d94-96e2-d45f27194a53\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC7C0.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Mar 28 19:12:48 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC86D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC8AC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PjNMCtS6PN.exe
"C:\Users\user\Desktop\PjNMCtS6PN.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7404 -s 456

URLs

Name
IP
Malicious
http://5.42.64.41/40d570f44e84a454.php
malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{87a55225-6fd2-529f-15c3-c3ffcf75b14c}\Root\InventoryApplicationFile\pjnmcts6pn.exe|c0258d53025dafcd
ProgramId
\REGISTRY\A\{87a55225-6fd2-529f-15c3-c3ffcf75b14c}\Root\InventoryApplicationFile\pjnmcts6pn.exe|c0258d53025dafcd
FileId
\REGISTRY\A\{87a55225-6fd2-529f-15c3-c3ffcf75b14c}\Root\InventoryApplicationFile\pjnmcts6pn.exe|c0258d53025dafcd
LowerCaseLongPath
\REGISTRY\A\{87a55225-6fd2-529f-15c3-c3ffcf75b14c}\Root\InventoryApplicationFile\pjnmcts6pn.exe|c0258d53025dafcd
LongPathHash
\REGISTRY\A\{87a55225-6fd2-529f-15c3-c3ffcf75b14c}\Root\InventoryApplicationFile\pjnmcts6pn.exe|c0258d53025dafcd
Name
\REGISTRY\A\{87a55225-6fd2-529f-15c3-c3ffcf75b14c}\Root\InventoryApplicationFile\pjnmcts6pn.exe|c0258d53025dafcd
OriginalFileName
\REGISTRY\A\{87a55225-6fd2-529f-15c3-c3ffcf75b14c}\Root\InventoryApplicationFile\pjnmcts6pn.exe|c0258d53025dafcd
Publisher
\REGISTRY\A\{87a55225-6fd2-529f-15c3-c3ffcf75b14c}\Root\InventoryApplicationFile\pjnmcts6pn.exe|c0258d53025dafcd
Version
\REGISTRY\A\{87a55225-6fd2-529f-15c3-c3ffcf75b14c}\Root\InventoryApplicationFile\pjnmcts6pn.exe|c0258d53025dafcd
BinFileVersion
\REGISTRY\A\{87a55225-6fd2-529f-15c3-c3ffcf75b14c}\Root\InventoryApplicationFile\pjnmcts6pn.exe|c0258d53025dafcd
BinaryType
\REGISTRY\A\{87a55225-6fd2-529f-15c3-c3ffcf75b14c}\Root\InventoryApplicationFile\pjnmcts6pn.exe|c0258d53025dafcd
ProductName
\REGISTRY\A\{87a55225-6fd2-529f-15c3-c3ffcf75b14c}\Root\InventoryApplicationFile\pjnmcts6pn.exe|c0258d53025dafcd
ProductVersion
\REGISTRY\A\{87a55225-6fd2-529f-15c3-c3ffcf75b14c}\Root\InventoryApplicationFile\pjnmcts6pn.exe|c0258d53025dafcd
LinkDate
\REGISTRY\A\{87a55225-6fd2-529f-15c3-c3ffcf75b14c}\Root\InventoryApplicationFile\pjnmcts6pn.exe|c0258d53025dafcd
BinProductVersion
\REGISTRY\A\{87a55225-6fd2-529f-15c3-c3ffcf75b14c}\Root\InventoryApplicationFile\pjnmcts6pn.exe|c0258d53025dafcd
AppxPackageFullName
\REGISTRY\A\{87a55225-6fd2-529f-15c3-c3ffcf75b14c}\Root\InventoryApplicationFile\pjnmcts6pn.exe|c0258d53025dafcd
AppxPackageRelativeId
\REGISTRY\A\{87a55225-6fd2-529f-15c3-c3ffcf75b14c}\Root\InventoryApplicationFile\pjnmcts6pn.exe|c0258d53025dafcd
Size
\REGISTRY\A\{87a55225-6fd2-529f-15c3-c3ffcf75b14c}\Root\InventoryApplicationFile\pjnmcts6pn.exe|c0258d53025dafcd
Language
\REGISTRY\A\{87a55225-6fd2-529f-15c3-c3ffcf75b14c}\Root\InventoryApplicationFile\pjnmcts6pn.exe|c0258d53025dafcd
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00B8FA4A2E4
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
24B0000
direct allocation
page read and write
malicious
990000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
ACE000
stack
page read and write
2645000
heap
page read and write
89A000
heap
page read and write
84C000
unkown
page readonly
2810000
heap
page read and write
860000
heap
page read and write
42B000
unkown
page write copy
400000
unkown
page readonly
89E000
heap
page read and write
C0E000
stack
page read and write
BCE000
stack
page read and write
25A0000
heap
page read and write
84C000
unkown
page readonly
62B000
unkown
page execute and read and write
890000
heap
page read and write
401000
unkown
page execute read
2640000
heap
page read and write
8C3000
heap
page read and write
411000
unkown
page execute read
1F0000
heap
page read and write
19D000
stack
page read and write
880000
heap
page read and write
619000
unkown
page execute and read and write
427000
unkown
page readonly
8AD000
heap
page execute and read and write
9C000
stack
page read and write
D0F000
stack
page read and write
9B0000
heap
page read and write
There are 21 hidden memdumps, click here to show them.