IOC Report
S34C65xU.exe

loading gif

Files

File Path
Type
Category
Malicious
S34C65xU.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
initial sample
C:\Driver\Samsung_Driver_Installer.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Driver\Manual_S34C65xU\S34C65xU.cat
data
dropped
C:\Driver\Manual_S34C65xU\S34C65xU.icm
Microsoft color profile 2.2, RGB/XYZ-mntr device by SEC, 536 bytes, 14-3-2017 13:56:00, PCS, 0x3030303030303030 MD5 "Samsung S27C90xP"
dropped
C:\Driver\Manual_S34C65xU\S34C65xU.inf
Windows setup INFormation
dropped
C:\Driver\S34C65xU.cat
data
dropped
C:\Driver\S34C65xU.icm
Microsoft color profile 2.2, RGB/XYZ-mntr device by SEC, 536 bytes, 14-3-2017 13:56:00, PCS, 0x3030303030303030 MD5 "Samsung S27C90xP"
dropped
C:\Driver\S34C65xU.inf
Windows setup INFormation
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Samsung_Driver_I_8eed55e27c43b9c57636aa58c88d2e557d153d1_0cdd0738_c03bf17d-4e1a-409e-83ae-3bc1cc2052fe\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3508.tmp.mdmp
Mini DuMP crash report, 15 streams, Fri Apr 19 15:00:44 2024, 0x260521 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER38E1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER394F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\S34C65xU.exe
"C:\Users\user\Desktop\S34C65xU.exe"
malicious
C:\Driver\Samsung_Driver_Installer.exe
"C:\Driver\Samsung_Driver_Installer.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4560 -s 1800

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://upx.sf.net
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://fontfabrik.com
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-jones.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
There are 17 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
\REGISTRY\A\{c9f68713-5e4d-8ca6-f919-9e87f3855f5d}\Root\InventoryApplicationFile\samsung_driver_i|2c0667a1a55b5e67
ProgramId
\REGISTRY\A\{c9f68713-5e4d-8ca6-f919-9e87f3855f5d}\Root\InventoryApplicationFile\samsung_driver_i|2c0667a1a55b5e67
FileId
\REGISTRY\A\{c9f68713-5e4d-8ca6-f919-9e87f3855f5d}\Root\InventoryApplicationFile\samsung_driver_i|2c0667a1a55b5e67
LowerCaseLongPath
\REGISTRY\A\{c9f68713-5e4d-8ca6-f919-9e87f3855f5d}\Root\InventoryApplicationFile\samsung_driver_i|2c0667a1a55b5e67
LongPathHash
\REGISTRY\A\{c9f68713-5e4d-8ca6-f919-9e87f3855f5d}\Root\InventoryApplicationFile\samsung_driver_i|2c0667a1a55b5e67
Name
\REGISTRY\A\{c9f68713-5e4d-8ca6-f919-9e87f3855f5d}\Root\InventoryApplicationFile\samsung_driver_i|2c0667a1a55b5e67
OriginalFileName
\REGISTRY\A\{c9f68713-5e4d-8ca6-f919-9e87f3855f5d}\Root\InventoryApplicationFile\samsung_driver_i|2c0667a1a55b5e67
Publisher
\REGISTRY\A\{c9f68713-5e4d-8ca6-f919-9e87f3855f5d}\Root\InventoryApplicationFile\samsung_driver_i|2c0667a1a55b5e67
Version
\REGISTRY\A\{c9f68713-5e4d-8ca6-f919-9e87f3855f5d}\Root\InventoryApplicationFile\samsung_driver_i|2c0667a1a55b5e67
BinFileVersion
\REGISTRY\A\{c9f68713-5e4d-8ca6-f919-9e87f3855f5d}\Root\InventoryApplicationFile\samsung_driver_i|2c0667a1a55b5e67
BinaryType
\REGISTRY\A\{c9f68713-5e4d-8ca6-f919-9e87f3855f5d}\Root\InventoryApplicationFile\samsung_driver_i|2c0667a1a55b5e67
ProductName
\REGISTRY\A\{c9f68713-5e4d-8ca6-f919-9e87f3855f5d}\Root\InventoryApplicationFile\samsung_driver_i|2c0667a1a55b5e67
ProductVersion
\REGISTRY\A\{c9f68713-5e4d-8ca6-f919-9e87f3855f5d}\Root\InventoryApplicationFile\samsung_driver_i|2c0667a1a55b5e67
LinkDate
\REGISTRY\A\{c9f68713-5e4d-8ca6-f919-9e87f3855f5d}\Root\InventoryApplicationFile\samsung_driver_i|2c0667a1a55b5e67
BinProductVersion
\REGISTRY\A\{c9f68713-5e4d-8ca6-f919-9e87f3855f5d}\Root\InventoryApplicationFile\samsung_driver_i|2c0667a1a55b5e67
AppxPackageFullName
\REGISTRY\A\{c9f68713-5e4d-8ca6-f919-9e87f3855f5d}\Root\InventoryApplicationFile\samsung_driver_i|2c0667a1a55b5e67
AppxPackageRelativeId
\REGISTRY\A\{c9f68713-5e4d-8ca6-f919-9e87f3855f5d}\Root\InventoryApplicationFile\samsung_driver_i|2c0667a1a55b5e67
Size
\REGISTRY\A\{c9f68713-5e4d-8ca6-f919-9e87f3855f5d}\Root\InventoryApplicationFile\samsung_driver_i|2c0667a1a55b5e67
Language
\REGISTRY\A\{c9f68713-5e4d-8ca6-f919-9e87f3855f5d}\Root\InventoryApplicationFile\samsung_driver_i|2c0667a1a55b5e67
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00B92EA0FCD
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5F8000
heap
page read and write
60E000
unkown
page readonly
618000
heap
page read and write
5F4000
heap
page read and write
2908000
heap
page read and write
459000
unkown
page execute and write copy
2C92000
trusted library allocation
page read and write
60F000
heap
page read and write
2909000
heap
page read and write
2C9A000
trusted library allocation
page read and write
7B0000
heap
page read and write
400000
unkown
page readonly
64E000
heap
page read and write
499C000
stack
page read and write
1B9EC000
stack
page read and write
80E000
stack
page read and write
1F74B000
stack
page read and write
5F8000
heap
page read and write
4AC0000
trusted library allocation
page read and write
F2E000
stack
page read and write
1D0EA000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
46DF000
stack
page read and write
28BE000
stack
page read and write
AD3000
heap
page read and write
2306000
heap
page read and write
1B893000
heap
page read and write
F86000
heap
page read and write
7FF9D1C72000
trusted library allocation
page execute and read and write
7FF9D1D2A000
trusted library allocation
page execute and read and write
2911000
heap
page read and write
7FF9D1D35000
trusted library allocation
page read and write
2E0000
unkown
page readonly
640000
heap
page read and write
436E000
stack
page read and write
1D3FE000
stack
page read and write
7A0000
heap
page read and write
7FF9D1DAC000
trusted library allocation
page read and write
627000
heap
page read and write
7FF9D1C62000
trusted library allocation
page execute and read and write
446F000
stack
page read and write
AFA000
heap
page read and write
AB5000
heap
page read and write
2404000
heap
page read and write
1B610000
heap
page read and write
9A000
stack
page read and write
ADB000
heap
page read and write
2912000
heap
page read and write
659000
heap
page read and write
401000
unkown
page execute and read and write
605000
heap
page read and write
7FF9D1D3A000
trusted library allocation
page execute and read and write
2908000
heap
page read and write
1F220000
trusted library allocation
page read and write
70E000
stack
page read and write
FD5000
heap
page read and write
7FF9D1C86000
trusted library allocation
page read and write
283E000
stack
page read and write
611000
heap
page read and write
1CEE8000
trusted library allocation
page read and write
20000
trusted library allocation
page read and write
94F000
stack
page read and write
400000
unkown
page readonly
1BAD5000
heap
page read and write
1B720000
heap
page read and write
5F4000
heap
page read and write
7FF9D1E00000
trusted library allocation
page execute and read and write
7FF9D1CC4000
trusted library allocation
page execute and read and write
1F010000
trusted library allocation
page read and write
617000
heap
page read and write
B45000
heap
page read and write
1F020000
heap
page read and write
7FF9D1D3D000
trusted library allocation
page execute and read and write
1D4FE000
stack
page read and write
84E000
stack
page read and write
2909000
heap
page read and write
1BA90000
heap
page read and write
7FF9D1D30000
trusted library allocation
page read and write
1BAE0000
heap
page read and write
7FF9D1C6A000
trusted library allocation
page execute and read and write
1CEE1000
trusted library allocation
page read and write
1BB62000
heap
page read and write
1F79B000
trusted library allocation
page read and write
287E000
stack
page read and write
1D5000
heap
page read and write
1F340000
trusted library section
page read and write
60B000
heap
page read and write
644000
heap
page read and write
12C05000
trusted library allocation
page read and write
A60000
heap
page read and write
632000
heap
page read and write
7FF9D1C70000
trusted library allocation
page read and write
1B4DE000
stack
page read and write
AD5000
heap
page read and write
47C000
unkown
page execute and read and write
5DA000
heap
page read and write
98E000
stack
page read and write
1BAB0000
heap
page execute and read and write
1B743000
heap
page read and write
1F7E0000
trusted library allocation
page read and write
2C96000
trusted library allocation
page read and write
7FF9D1E40000
trusted library allocation
page read and write
485E000
stack
page read and write
A55000
heap
page read and write
647000
heap
page read and write
7FF4724C0000
trusted library allocation
page execute and read and write
1CBE0000
heap
page read and write
1D0E0000
trusted library allocation
page read and write
AD0000
heap
page read and write
AC0000
heap
page read and write
62B000
heap
page read and write
1B880000
trusted library allocation
page read and write
2912000
heap
page read and write
4A9C000
stack
page read and write
A9A000
heap
page read and write
E2E000
stack
page read and write
495F000
stack
page read and write
1BB30000
heap
page read and write
481F000
stack
page read and write
1F790000
trusted library allocation
page read and write
650000
heap
page read and write
7FF4724D0000
trusted library allocation
page execute and read and write
19B000
stack
page read and write
64B000
heap
page read and write
2900000
heap
page read and write
1D2FE000
stack
page read and write
12C07000
trusted library allocation
page read and write
65C000
heap
page read and write
A20000
heap
page read and write
488000
unkown
page write copy
1F0D0000
heap
page read and write
1CEC6000
trusted library allocation
page read and write
2911000
heap
page read and write
7FF9D1DB0000
trusted library allocation
page execute and read and write
486000
unkown
page execute and read and write
609000
heap
page read and write
471E000
stack
page read and write
7D0000
heap
page read and write
45DE000
stack
page read and write
2911000
heap
page read and write
F80000
heap
page read and write
2911000
heap
page read and write
A6D000
heap
page read and write
2912000
heap
page read and write
1B8D0000
trusted library section
page readonly
495000
unkown
page read and write
4B0000
heap
page read and write
11A3000
heap
page execute and read and write
1D1FB000
stack
page read and write
1D0F0000
trusted library allocation
page read and write
645000
heap
page read and write
28F0000
heap
page read and write
B4F000
heap
page read and write
2908000
heap
page read and write
11A0000
heap
page execute and read and write
7FF9D1C93000
trusted library allocation
page execute and read and write
1B71E000
stack
page read and write
590000
heap
page read and write
1B890000
heap
page read and write
27C0000
heap
page read and write
7FF9D1E20000
trusted library allocation
page execute and read and write
61C000
heap
page read and write
2400000
heap
page read and write
2907000
heap
page read and write
A8F000
stack
page read and write
F83000
heap
page read and write
2911000
heap
page read and write
A00000
heap
page read and write
7FF9D1C80000
trusted library allocation
page read and write
B56000
heap
page read and write
7FF9D1E30000
trusted library allocation
page execute and read and write
1BAF0000
heap
page read and write
2E2000
unkown
page readonly
1CD02000
trusted library allocation
page read and write
2300000
heap
page read and write
5D0000
heap
page read and write
7FF9D1E10000
trusted library allocation
page read and write
1BAD0000
heap
page read and write
7FF9D1DA0000
trusted library allocation
page read and write
1D510000
heap
page read and write
12C01000
trusted library allocation
page read and write
2760000
heap
page read and write
1B8E0000
trusted library allocation
page read and write
FD0000
heap
page read and write
638000
heap
page read and write
1D0000
heap
page read and write
1F7E4000
trusted library allocation
page read and write
B2D000
heap
page read and write
7FF9D1C8F000
trusted library allocation
page execute and read and write
A50000
heap
page read and write
1D0E4000
trusted library allocation
page read and write
7FF9D1D62000
trusted library allocation
page execute and read and write
7FF9D1DF0000
trusted library allocation
page execute and read and write
7FF9D1D22000
trusted library allocation
page execute and read and write
626000
heap
page read and write
1D500000
trusted library allocation
page read and write
D2E000
stack
page read and write
5DE000
heap
page read and write
755000
stack
page read and write
1B748000
heap
page read and write
1CCE0000
trusted library allocation
page read and write
2E0000
unkown
page readonly
1B75C000
heap
page read and write
1B5DE000
stack
page read and write
2909000
heap
page read and write
1CEBE000
trusted library allocation
page read and write
653000
heap
page read and write
There are 197 hidden memdumps, click here to show them.