IOC Report
97NT8DO3JB.exe

loading gif

Files

File Path
Type
Category
Malicious
97NT8DO3JB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_97NT8DO3JB.exe_504654aafbb45967f4acb4ca8e5b93132f2f_1bd0a4a3_1630c49f-2354-49a2-9ab8-dc030df3b2ee\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_97NT8DO3JB.exe_504654aafbb45967f4acb4ca8e5b93132f2f_1bd0a4a3_3a48af57-569b-4ab4-b9ea-256268bf1ad0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_97NT8DO3JB.exe_504654aafbb45967f4acb4ca8e5b93132f2f_1bd0a4a3_5c38cd1d-3bce-4550-bdcf-bb046d0ffe19\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_97NT8DO3JB.exe_504654aafbb45967f4acb4ca8e5b93132f2f_1bd0a4a3_8fd0dd96-51df-4555-aa5e-8b9425c46166\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_97NT8DO3JB.exe_504654aafbb45967f4acb4ca8e5b93132f2f_1bd0a4a3_acc9e967-ff41-4224-90bc-0f98e5eb772f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_97NT8DO3JB.exe_504654aafbb45967f4acb4ca8e5b93132f2f_1bd0a4a3_cdb61ca0-0229-40fc-b9c9-8fe9029a2de5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_97NT8DO3JB.exe_504654aafbb45967f4acb4ca8e5b93132f2f_1bd0a4a3_ef6f7bd1-c393-4e57-b46f-a509222f2e19\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_97NT8DO3JB.exe_6be156e7f6408b6a57b6e7c3a2ce735a1cd81ea8_1bd0a4a3_0ed49d18-13ae-42ea-852a-2af280a287d7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2FC7.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 19 20:35:54 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3055.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3084.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3219.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 19 20:35:54 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3268.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3288.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER34F7.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 19 20:35:55 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3556.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3566.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER36EB.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 19 20:35:55 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3759.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER377A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER393D.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 19 20:35:56 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER399C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER39CB.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3B7F.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 19 20:35:57 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3BED.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3C4C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER44F5.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 19 20:35:59 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER45B1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER45D2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4821.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 19 20:36:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER489F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER48DF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\ping[1].htm
very short file (no magic)
dropped
C:\Windows\Logs\SIH\SIH.20240419.223612.085.1.etl
data
dropped
C:\Windows\SoftwareDistribution\SLS\522D76A4-93E1-47F8-B8CE-07C937AD1A1E\TMP7B18.tmp
Microsoft Cabinet archive data, single, 462 bytes, 1 file, at 0x44 +Utf "environment.xml", flags 0x4, ID 31944, number 1, extra bytes 20 in head, 1 datablock, 0x1 compression
dropped
C:\Windows\SoftwareDistribution\SLS\522D76A4-93E1-47F8-B8CE-07C937AD1A1E\sls.cab
Microsoft Cabinet archive data, single, 7826 bytes, 1 file, at 0x44 +Utf "environment.cab", flags 0x4, ID 53283, number 1, extra bytes 20 in head, 1 datablock, 0x1 compression
dropped
C:\Windows\SoftwareDistribution\SLS\E7A50285-D08D-499D-9FF8-180FDC2332BC\TMP841D.tmp
Microsoft Cabinet archive data, single, 283 bytes, 1 file, at 0x44 +Utf "environment.xml", flags 0x4, ID 18148, number 1, extra bytes 20 in head, 1 datablock, 0x1 compression
dropped
C:\Windows\SoftwareDistribution\SLS\E7A50285-D08D-499D-9FF8-180FDC2332BC\sls.cab
Microsoft Cabinet archive data, single, 8785 bytes, 1 file, at 0x44 +Utf "environment.cab", flags 0x4, ID 36571, number 1, extra bytes 20 in head, 1 datablock, 0x1 compression
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\97NT8DO3JB.exe
"C:\Users\user\Desktop\97NT8DO3JB.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6640 -s 744
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6640 -s 764
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6640 -s 780
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6640 -s 772
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6640 -s 904
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6640 -s 912
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6640 -s 1376
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /im "97NT8DO3JB.exe" /f & erase "C:\Users\user\Desktop\97NT8DO3JB.exe" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /im "97NT8DO3JB.exe" /f
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6640 -s 1336
C:\Windows\System32\SIHClient.exe
C:\Windows\System32\sihclient.exe /cv mYxTU7XVgUSOC2w2/zVglw.0.2
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.172.128.90/cpa/ping.php?substr=one&s=two
185.172.128.90
malicious
http://upx.sf.net
unknown

IPs

IP
Domain
Country
Malicious
185.172.128.90
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{9b44aa7a-71ee-9ef5-07ad-902c53db772c}\Root\InventoryApplicationFile\97nt8do3jb.exe|4030b72866cea4ea
ProgramId
\REGISTRY\A\{9b44aa7a-71ee-9ef5-07ad-902c53db772c}\Root\InventoryApplicationFile\97nt8do3jb.exe|4030b72866cea4ea
FileId
\REGISTRY\A\{9b44aa7a-71ee-9ef5-07ad-902c53db772c}\Root\InventoryApplicationFile\97nt8do3jb.exe|4030b72866cea4ea
LowerCaseLongPath
\REGISTRY\A\{9b44aa7a-71ee-9ef5-07ad-902c53db772c}\Root\InventoryApplicationFile\97nt8do3jb.exe|4030b72866cea4ea
LongPathHash
\REGISTRY\A\{9b44aa7a-71ee-9ef5-07ad-902c53db772c}\Root\InventoryApplicationFile\97nt8do3jb.exe|4030b72866cea4ea
Name
\REGISTRY\A\{9b44aa7a-71ee-9ef5-07ad-902c53db772c}\Root\InventoryApplicationFile\97nt8do3jb.exe|4030b72866cea4ea
OriginalFileName
\REGISTRY\A\{9b44aa7a-71ee-9ef5-07ad-902c53db772c}\Root\InventoryApplicationFile\97nt8do3jb.exe|4030b72866cea4ea
Publisher
\REGISTRY\A\{9b44aa7a-71ee-9ef5-07ad-902c53db772c}\Root\InventoryApplicationFile\97nt8do3jb.exe|4030b72866cea4ea
Version
\REGISTRY\A\{9b44aa7a-71ee-9ef5-07ad-902c53db772c}\Root\InventoryApplicationFile\97nt8do3jb.exe|4030b72866cea4ea
BinFileVersion
\REGISTRY\A\{9b44aa7a-71ee-9ef5-07ad-902c53db772c}\Root\InventoryApplicationFile\97nt8do3jb.exe|4030b72866cea4ea
BinaryType
\REGISTRY\A\{9b44aa7a-71ee-9ef5-07ad-902c53db772c}\Root\InventoryApplicationFile\97nt8do3jb.exe|4030b72866cea4ea
ProductName
\REGISTRY\A\{9b44aa7a-71ee-9ef5-07ad-902c53db772c}\Root\InventoryApplicationFile\97nt8do3jb.exe|4030b72866cea4ea
ProductVersion
\REGISTRY\A\{9b44aa7a-71ee-9ef5-07ad-902c53db772c}\Root\InventoryApplicationFile\97nt8do3jb.exe|4030b72866cea4ea
LinkDate
\REGISTRY\A\{9b44aa7a-71ee-9ef5-07ad-902c53db772c}\Root\InventoryApplicationFile\97nt8do3jb.exe|4030b72866cea4ea
BinProductVersion
\REGISTRY\A\{9b44aa7a-71ee-9ef5-07ad-902c53db772c}\Root\InventoryApplicationFile\97nt8do3jb.exe|4030b72866cea4ea
AppxPackageFullName
\REGISTRY\A\{9b44aa7a-71ee-9ef5-07ad-902c53db772c}\Root\InventoryApplicationFile\97nt8do3jb.exe|4030b72866cea4ea
AppxPackageRelativeId
\REGISTRY\A\{9b44aa7a-71ee-9ef5-07ad-902c53db772c}\Root\InventoryApplicationFile\97nt8do3jb.exe|4030b72866cea4ea
Size
\REGISTRY\A\{9b44aa7a-71ee-9ef5-07ad-902c53db772c}\Root\InventoryApplicationFile\97nt8do3jb.exe|4030b72866cea4ea
Language
\REGISTRY\A\{9b44aa7a-71ee-9ef5-07ad-902c53db772c}\Root\InventoryApplicationFile\97nt8do3jb.exe|4030b72866cea4ea
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3670000
direct allocation
page execute and read and write
malicious
36A0000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
45FC000
stack
page read and write
280E000
stack
page read and write
1C5E000
stack
page read and write
401000
unkown
page execute read
4310000
heap
page read and write
1C10000
heap
page read and write
3B6E000
stack
page read and write
17B2189E000
heap
page read and write
3BAD000
stack
page read and write
17B2196E000
heap
page read and write
17B218BA000
heap
page read and write
17B20F46000
heap
page read and write
17B21867000
heap
page read and write
232D000
stack
page read and write
17B218BD000
heap
page read and write
17B20E70000
heap
page read and write
1B1E000
heap
page read and write
17B21898000
heap
page read and write
17B21960000
heap
page read and write
448000
unkown
page read and write
17B20E9F000
heap
page read and write
23DE000
unkown
page read and write
17B20E77000
heap
page read and write
410D000
stack
page read and write
1B9C27C000
stack
page read and write
17B20F15000
heap
page read and write
17B21963000
heap
page read and write
17B20DA0000
heap
page read and write
2A52000
heap
page read and write
4510000
heap
page read and write
17B20E74000
heap
page read and write
9B000
stack
page read and write
17B2196A000
heap
page read and write
17B20ED3000
heap
page read and write
17B21AC8000
heap
page read and write
17B2184F000
heap
page read and write
17B218A6000
heap
page read and write
17B21860000
heap
page read and write
17B2196E000
heap
page read and write
17B2187D000
heap
page read and write
42C000
unkown
page write copy
17B20F61000
heap
page read and write
17B21863000
heap
page read and write
17B20F55000
heap
page read and write
1A30000
heap
page read and write
17B21897000
heap
page read and write
17B20EEA000
heap
page read and write
1BEB000
heap
page read and write
17B20E81000
heap
page read and write
17B20EED000
heap
page read and write
426000
unkown
page write copy
17B21898000
heap
page read and write
17B21AC1000
heap
page read and write
17B21879000
heap
page read and write
17B21840000
heap
page read and write
17B20F67000
heap
page read and write
420B000
stack
page read and write
422D000
heap
page read and write
1B2F000
heap
page execute and read and write
17B20DB0000
heap
page read and write
17B21965000
heap
page read and write
17B20ED3000
heap
page read and write
17B21853000
heap
page read and write
1A10000
unkown
page read and write
400000
unkown
page readonly
26FD000
stack
page read and write
36B0000
heap
page read and write
17B21AB0000
heap
page read and write
17B21883000
heap
page read and write
3A6D000
stack
page read and write
17B21897000
heap
page read and write
17B21871000
heap
page read and write
23E0000
heap
page read and write
1B4A000
heap
page read and write
17B218B2000
heap
page read and write
1B9C2FF000
stack
page read and write
2390000
heap
page read and write
17B21848000
heap
page read and write
17B21867000
heap
page read and write
17B21165000
heap
page read and write
1B9C37B000
stack
page read and write
17B20EBE000
heap
page read and write
17B2196A000
heap
page read and write
3CAE000
stack
page read and write
17B2186D000
heap
page read and write
17B20F02000
heap
page read and write
17B21967000
heap
page read and write
4231000
heap
page read and write
17B21AB8000
heap
page read and write
17B21967000
heap
page read and write
17B2196B000
heap
page read and write
3FAD000
stack
page read and write
17B21876000
heap
page read and write
17B20F46000
heap
page read and write
29CF000
unkown
page read and write
17B20F67000
heap
page read and write
1BF9000
heap
page read and write
1D5F000
stack
page read and write
3F6E000
stack
page read and write
4218000
heap
page read and write
17B2196A000
heap
page read and write
17B20F02000
heap
page read and write
3CED000
stack
page read and write
17B21BB0000
heap
page read and write
41B000
unkown
page readonly
1B9BE87000
stack
page read and write
2A3C000
heap
page read and write
17B2185B000
heap
page read and write
2C2F000
stack
page read and write
17B20E79000
heap
page read and write
17B21ACC000
heap
page read and write
17B21861000
heap
page read and write
2CF0000
heap
page read and write
17B20E78000
heap
page read and write
1B9C4FF000
stack
page read and write
17B20EB3000
heap
page read and write
17B218A7000
heap
page read and write
17B20F46000
heap
page read and write
1A11000
unkown
page readonly
3A10000
heap
page read and write
46FC000
stack
page read and write
3E6D000
stack
page read and write
4210000
heap
page read and write
17B21ABC000
heap
page read and write
17B20F60000
heap
page read and write
1B9C3FE000
stack
page read and write
1D0000
heap
page read and write
17B21160000
heap
page read and write
17B20E7B000
heap
page read and write
1BCD000
heap
page read and write
40AE000
stack
page read and write
3DEE000
stack
page read and write
17B20E8A000
heap
page read and write
17B20D80000
heap
page read and write
17B21AC6000
heap
page read and write
42F000
unkown
page write copy
1B9C47F000
stack
page read and write
2CF2000
heap
page read and write
3560000
heap
page read and write
17B21940000
heap
page read and write
1B9BF0F000
stack
page read and write
17B21876000
heap
page read and write
1B9BF8E000
stack
page read and write
17B21842000
heap
page read and write
17B21962000
heap
page read and write
17B21964000
heap
page read and write
17B21ACC000
heap
page read and write
17B2184C000
heap
page read and write
17B21AB7000
heap
page read and write
1B19000
heap
page read and write
1A11000
unkown
page readonly
1B10000
heap
page read and write
1BE9000
heap
page read and write
1BE3000
heap
page read and write
17B20ECC000
heap
page read and write
17B20F67000
heap
page read and write
17B21883000
heap
page read and write
2A30000
heap
page read and write
354E000
stack
page read and write
1D5000
heap
page read and write
366F000
stack
page read and write
19A000
stack
page read and write
17B218A6000
heap
page read and write
17B21ABF000
heap
page read and write
28C0000
heap
page read and write
There are 158 hidden memdumps, click here to show them.