IOC Report
7GXKafhbnD.exe

loading gif

Files

File Path
Type
Category
Malicious
7GXKafhbnD.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7GXKafhbnD.exe_17664c7d7e239f5f4c8c8e5e8a5c7dd6414cea4_0465960d_0aead8bd-3d69-471e-88d4-9d281264b63e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7GXKafhbnD.exe_17664c7d7e239f5f4c8c8e5e8a5c7dd6414cea4_0465960d_2071ee8d-b7b5-4580-802a-4d51b6c53b0d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7GXKafhbnD.exe_17664c7d7e239f5f4c8c8e5e8a5c7dd6414cea4_0465960d_31a3bfa8-276c-45f5-900e-ff34cdff71dc\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7GXKafhbnD.exe_17664c7d7e239f5f4c8c8e5e8a5c7dd6414cea4_0465960d_5c5ac96f-d7e2-4949-80e3-2909ce5346b1\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7GXKafhbnD.exe_17664c7d7e239f5f4c8c8e5e8a5c7dd6414cea4_0465960d_7f753e3f-3102-41ca-ade0-19e5c0e39648\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7GXKafhbnD.exe_17664c7d7e239f5f4c8c8e5e8a5c7dd6414cea4_0465960d_807cc0ca-2485-4f33-9f4a-dfce8bfb587c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7GXKafhbnD.exe_17664c7d7e239f5f4c8c8e5e8a5c7dd6414cea4_0465960d_92628ab3-bdbe-4a55-ae04-f985aafaaeec\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7GXKafhbnD.exe_17664c7d7e239f5f4c8c8e5e8a5c7dd6414cea4_0465960d_c878b971-1e7f-4be1-90e3-8a1ccd8f2f2c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7GXKafhbnD.exe_f059f8719164c84f855d378d9bb8bb5244bf721d_0465960d_2553eece-d477-4481-9dc0-ee4e029d95cd\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1064.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Mar 29 10:16:52 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER11DC.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER11FD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1381.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Mar 29 10:16:52 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER13F0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1400.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1585.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Mar 29 10:16:53 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1613.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1652.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER17D7.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Mar 29 10:16:53 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1835.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1856.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A57.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Mar 29 10:16:54 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1AC6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1AE6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1CB9.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Mar 29 10:16:55 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D75.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D95.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER265D.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Mar 29 10:16:57 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER26EB.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER270B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER29A9.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Mar 29 10:16:58 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B02.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B32.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDA5.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Mar 29 10:16:51 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREB0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERED0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\ping[1].htm
very short file (no magic)
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 29 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\7GXKafhbnD.exe
"C:\Users\user\Desktop\7GXKafhbnD.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7392 -s 740
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7392 -s 732
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7392 -s 744
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7392 -s 776
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7392 -s 996
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7392 -s 1016
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7392 -s 1084
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7392 -s 1368
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /im "7GXKafhbnD.exe" /f & erase "C:\Users\user\Desktop\7GXKafhbnD.exe" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /im "7GXKafhbnD.exe" /f
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7392 -s 1324
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.172.128.90/cpa/ping.php?substr=one&s=two
185.172.128.90
malicious
http://upx.sf.net
unknown

IPs

IP
Domain
Country
Malicious
185.172.128.90
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{1195bbf6-494b-7d10-2771-e454918228fd}\Root\InventoryApplicationFile\7gxkafhbnd.exe|66db53a6ceec10ea
ProgramId
\REGISTRY\A\{1195bbf6-494b-7d10-2771-e454918228fd}\Root\InventoryApplicationFile\7gxkafhbnd.exe|66db53a6ceec10ea
FileId
\REGISTRY\A\{1195bbf6-494b-7d10-2771-e454918228fd}\Root\InventoryApplicationFile\7gxkafhbnd.exe|66db53a6ceec10ea
LowerCaseLongPath
\REGISTRY\A\{1195bbf6-494b-7d10-2771-e454918228fd}\Root\InventoryApplicationFile\7gxkafhbnd.exe|66db53a6ceec10ea
LongPathHash
\REGISTRY\A\{1195bbf6-494b-7d10-2771-e454918228fd}\Root\InventoryApplicationFile\7gxkafhbnd.exe|66db53a6ceec10ea
Name
\REGISTRY\A\{1195bbf6-494b-7d10-2771-e454918228fd}\Root\InventoryApplicationFile\7gxkafhbnd.exe|66db53a6ceec10ea
OriginalFileName
\REGISTRY\A\{1195bbf6-494b-7d10-2771-e454918228fd}\Root\InventoryApplicationFile\7gxkafhbnd.exe|66db53a6ceec10ea
Publisher
\REGISTRY\A\{1195bbf6-494b-7d10-2771-e454918228fd}\Root\InventoryApplicationFile\7gxkafhbnd.exe|66db53a6ceec10ea
Version
\REGISTRY\A\{1195bbf6-494b-7d10-2771-e454918228fd}\Root\InventoryApplicationFile\7gxkafhbnd.exe|66db53a6ceec10ea
BinFileVersion
\REGISTRY\A\{1195bbf6-494b-7d10-2771-e454918228fd}\Root\InventoryApplicationFile\7gxkafhbnd.exe|66db53a6ceec10ea
BinaryType
\REGISTRY\A\{1195bbf6-494b-7d10-2771-e454918228fd}\Root\InventoryApplicationFile\7gxkafhbnd.exe|66db53a6ceec10ea
ProductName
\REGISTRY\A\{1195bbf6-494b-7d10-2771-e454918228fd}\Root\InventoryApplicationFile\7gxkafhbnd.exe|66db53a6ceec10ea
ProductVersion
\REGISTRY\A\{1195bbf6-494b-7d10-2771-e454918228fd}\Root\InventoryApplicationFile\7gxkafhbnd.exe|66db53a6ceec10ea
LinkDate
\REGISTRY\A\{1195bbf6-494b-7d10-2771-e454918228fd}\Root\InventoryApplicationFile\7gxkafhbnd.exe|66db53a6ceec10ea
BinProductVersion
\REGISTRY\A\{1195bbf6-494b-7d10-2771-e454918228fd}\Root\InventoryApplicationFile\7gxkafhbnd.exe|66db53a6ceec10ea
AppxPackageFullName
\REGISTRY\A\{1195bbf6-494b-7d10-2771-e454918228fd}\Root\InventoryApplicationFile\7gxkafhbnd.exe|66db53a6ceec10ea
AppxPackageRelativeId
\REGISTRY\A\{1195bbf6-494b-7d10-2771-e454918228fd}\Root\InventoryApplicationFile\7gxkafhbnd.exe|66db53a6ceec10ea
Size
\REGISTRY\A\{1195bbf6-494b-7d10-2771-e454918228fd}\Root\InventoryApplicationFile\7gxkafhbnd.exe|66db53a6ceec10ea
Language
\REGISTRY\A\{1195bbf6-494b-7d10-2771-e454918228fd}\Root\InventoryApplicationFile\7gxkafhbnd.exe|66db53a6ceec10ea
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
710000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
6E0000
direct allocation
page execute and read and write
malicious
29DE000
stack
page read and write
2EB2000
heap
page read and write
27CF000
unkown
page read and write
235D000
stack
page read and write
22D0000
heap
page read and write
229D000
stack
page read and write
2EB6000
heap
page read and write
600000
heap
page read and write
32AC000
stack
page read and write
21D000
stack
page read and write
28DE000
stack
page read and write
53C000
unkown
page readonly
59E000
stack
page read and write
231D000
stack
page read and write
314C000
stack
page read and write
19A000
stack
page read and write
29CF000
stack
page read and write
400000
unkown
page readonly
27F3000
heap
page read and write
2D9D000
stack
page read and write
2B1D000
stack
page read and write
225D000
stack
page read and write
550000
heap
page read and write
97F000
stack
page read and write
439000
unkown
page read and write
78E000
heap
page read and write
232E000
unkown
page read and write
27DC000
heap
page read and write
83B000
heap
page read and write
A7E000
stack
page read and write
2390000
heap
page read and write
2EA2000
heap
page read and write
9B000
stack
page read and write
31A0000
heap
page read and write
730000
heap
page read and write
605000
heap
page read and write
437000
unkown
page write copy
27D0000
heap
page read and write
27DE000
stack
page read and write
2E9E000
stack
page read and write
27F5000
heap
page read and write
401000
unkown
page execute read
42F000
unkown
page readonly
2D5B000
stack
page read and write
7BB000
heap
page read and write
2C1E000
stack
page read and write
27F2000
heap
page read and write
5DE000
stack
page read and write
854000
heap
page read and write
411000
unkown
page readonly
22E0000
heap
page read and write
53C000
unkown
page readonly
760000
heap
page read and write
236E000
stack
page read and write
437000
unkown
page read and write
1F0000
heap
page read and write
780000
heap
page read and write
41A000
unkown
page readonly
2ADE000
stack
page read and write
23B0000
heap
page read and write
11D000
stack
page read and write
2ED1000
heap
page read and write
2370000
heap
page read and write
2ECF000
heap
page read and write
2B70000
heap
page read and write
438000
unkown
page write copy
867000
heap
page read and write
2B72000
heap
page read and write
79F000
heap
page execute and read and write
86F000
heap
page read and write
789000
heap
page read and write
2C5D000
stack
page read and write
There are 65 hidden memdumps, click here to show them.