IOC Report
iPUk65i3yI.exe

loading gif

Files

File Path
Type
Category
Malicious
iPUk65i3yI.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_iPUk65i3yI.exe_2ec5395f16112ba3e812158ee989f8fd32d1fc_6086caad_64945b72-550f-47ce-b2ed-fb2dd609c044\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE13.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Apr 22 20:27:11 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF2E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF5D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\iPUk65i3yI.exe
"C:\Users\user\Desktop\iPUk65i3yI.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7352 -s 1548

URLs

Name
IP
Malicious
incredibleextedwj.shop
malicious
shortsvelventysjo.shop
malicious
tolerateilusidjukl.shop
malicious
liabilitynighstjsko.shop
malicious
shatterbreathepsw.shop
malicious
demonstationfukewko.shop
malicious
productivelookewr.shop
malicious
strollheavengwu.shop
malicious
alcojoldwograpciw.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://strollheavengwu.shop/apif
unknown
https://strollheavengwu.shop/api
104.21.15.198
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://strollheavengwu.shop/.
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://strollheavengwu.shop/a
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://strollheavengwu.shop/apipp
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://strollheavengwu.shop/
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
strollheavengwu.shop
104.21.15.198
malicious

IPs

IP
Domain
Country
Malicious
104.21.15.198
strollheavengwu.shop
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
ProgramId
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
FileId
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
LowerCaseLongPath
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
LongPathHash
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
Name
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
OriginalFileName
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
Publisher
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
Version
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
BinFileVersion
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
BinaryType
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
ProductName
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
ProductVersion
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
LinkDate
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
BinProductVersion
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
AppxPackageFullName
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
AppxPackageRelativeId
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
Size
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
Language
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page execute and read and write
malicious
2C8E000
stack
page read and write
30EE000
stack
page read and write
5575000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
5575000
trusted library allocation
page read and write
5564000
trusted library allocation
page read and write
552D000
trusted library allocation
page read and write
54FF000
trusted library allocation
page read and write
2C40000
heap
page read and write
5519000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
54FC000
trusted library allocation
page read and write
5528000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
2D6A000
heap
page read and write
556B000
trusted library allocation
page read and write
2E49000
heap
page read and write
54EA000
trusted library allocation
page read and write
2E41000
heap
page read and write
551B000
trusted library allocation
page read and write
54EB000
trusted library allocation
page read and write
5573000
trusted library allocation
page read and write
550B000
trusted library allocation
page read and write
54E4000
trusted library allocation
page read and write
550E000
trusted library allocation
page read and write
2DF6000
heap
page read and write
54DE000
stack
page read and write
557B000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
2E56000
heap
page read and write
2E47000
heap
page read and write
557A000
trusted library allocation
page read and write
555C000
trusted library allocation
page read and write
3110000
heap
page read and write
55A9000
trusted library allocation
page read and write
2E49000
heap
page read and write
54EB000
trusted library allocation
page read and write
551B000
trusted library allocation
page read and write
2DC3000
heap
page read and write
56F9000
trusted library allocation
page read and write
5506000
trusted library allocation
page read and write
2DA3000
heap
page read and write
2DC9000
heap
page read and write
558C000
trusted library allocation
page read and write
550D000
trusted library allocation
page read and write
5516000
trusted library allocation
page read and write
55C8000
trusted library allocation
page read and write
4B2E000
stack
page read and write
2E4D000
heap
page read and write
556E000
trusted library allocation
page read and write
5519000
trusted library allocation
page read and write
54EA000
trusted library allocation
page read and write
5719000
trusted library allocation
page read and write
2E41000
heap
page read and write
55B2000
trusted library allocation
page read and write
557B000
trusted library allocation
page read and write
5B2E000
trusted library allocation
page read and write
30AD000
stack
page read and write
558B000
trusted library allocation
page read and write
2C2F000
unkown
page readonly
55C0000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
5516000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
2D77000
heap
page execute and read and write
55C9000
trusted library allocation
page read and write
9B000
stack
page read and write
553C000
trusted library allocation
page read and write
2CD5000
heap
page read and write
54FD000
trusted library allocation
page read and write
54EB000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
54EB000
trusted library allocation
page read and write
54F3000
trusted library allocation
page read and write
2DC3000
heap
page read and write
5570000
trusted library allocation
page read and write
44C000
unkown
page write copy
54F2000
trusted library allocation
page read and write
550B000
trusted library allocation
page read and write
4D9E000
stack
page read and write
5543000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
54F4000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
555C000
trusted library allocation
page read and write
2DBC000
heap
page read and write
56E8000
trusted library allocation
page read and write
54E6000
trusted library allocation
page read and write
557F000
trusted library allocation
page read and write
2E0B000
heap
page read and write
54EE000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
574F000
trusted library allocation
page read and write
5528000
trusted library allocation
page read and write
2DBD000
heap
page read and write
2E4D000
heap
page read and write
54FF000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
54E4000
trusted library allocation
page read and write
5518000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
54F2000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
2CD7000
heap
page read and write
55E1000
heap
page read and write
2DC3000
heap
page read and write
3160000
remote allocation
page read and write
5581000
trusted library allocation
page read and write
551B000
trusted library allocation
page read and write
55FF000
trusted library allocation
page read and write
5517000
trusted library allocation
page read and write
54F6000
trusted library allocation
page read and write
5514000
trusted library allocation
page read and write
5575000
trusted library allocation
page read and write
6539000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
2E41000
heap
page read and write
558C000
trusted library allocation
page read and write
55D1000
trusted library allocation
page read and write
198000
stack
page read and write
55C0000
trusted library allocation
page read and write
56E1000
trusted library allocation
page read and write
315E000
stack
page read and write
5719000
trusted library allocation
page read and write
55E0000
heap
page read and write
2DF6000
heap
page read and write
5545000
trusted library allocation
page read and write
56E1000
trusted library allocation
page read and write
54FC000
trusted library allocation
page read and write
55AB000
trusted library allocation
page read and write
55C4000
trusted library allocation
page read and write
54EB000
trusted library allocation
page read and write
2DC9000
heap
page read and write
55A2000
trusted library allocation
page read and write
2E41000
heap
page read and write
54E4000
trusted library allocation
page read and write
551B000
trusted library allocation
page read and write
54FB000
trusted library allocation
page read and write
54F2000
trusted library allocation
page read and write
54E1000
trusted library allocation
page read and write
553D000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
553E000
trusted library allocation
page read and write
2D40000
heap
page read and write
2CD0000
heap
page read and write
56E8000
trusted library allocation
page read and write
2CF0000
direct allocation
page execute and read and write
4AEE000
stack
page read and write
5535000
trusted library allocation
page read and write
2E53000
heap
page read and write
55A4000
trusted library allocation
page read and write
54EA000
trusted library allocation
page read and write
54FF000
trusted library allocation
page read and write
449000
unkown
page execute and read and write
5585000
trusted library allocation
page read and write
4E9F000
stack
page read and write
55C0000
trusted library allocation
page read and write
55D1000
trusted library allocation
page read and write
5577000
trusted library allocation
page read and write
302F000
stack
page read and write
54E8000
trusted library allocation
page read and write
55CF000
trusted library allocation
page read and write
41F000
unkown
page readonly
56AF000
trusted library allocation
page read and write
306E000
stack
page read and write
55E6000
trusted library allocation
page read and write
55A9000
trusted library allocation
page read and write
5517000
trusted library allocation
page read and write
5578000
trusted library allocation
page read and write
55D1000
trusted library allocation
page read and write
56EF000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
3160000
remote allocation
page read and write
55A2000
trusted library allocation
page read and write
5B10000
heap
page read and write
55B2000
trusted library allocation
page read and write
570A000
trusted library allocation
page read and write
2DE6000
heap
page read and write
55A3000
trusted library allocation
page read and write
5581000
trusted library allocation
page read and write
4C9D000
stack
page read and write
602A000
trusted library allocation
page read and write
55AB000
trusted library allocation
page read and write
557A000
trusted library allocation
page read and write
4F9F000
stack
page read and write
5581000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
4B90000
heap
page read and write
55D1000
trusted library allocation
page read and write
550F000
trusted library allocation
page read and write
2CCE000
stack
page read and write
551E000
trusted library allocation
page read and write
54EA000
trusted library allocation
page read and write
554F000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
2E57000
heap
page read and write
55CF000
trusted library allocation
page read and write
557B000
trusted library allocation
page read and write
56B7000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
5517000
trusted library allocation
page read and write
59DF000
stack
page read and write
5513000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
2D6E000
heap
page read and write
557A000
trusted library allocation
page read and write
5637000
trusted library allocation
page read and write
56EB000
trusted library allocation
page read and write
2DE6000
heap
page read and write
55C0000
trusted library allocation
page read and write
401000
unkown
page execute read
54EF000
trusted library allocation
page read and write
2DE6000
heap
page read and write
55C4000
trusted library allocation
page read and write
2E47000
heap
page read and write
5711000
trusted library allocation
page read and write
56E1000
trusted library allocation
page read and write
559D000
trusted library allocation
page read and write
2E41000
heap
page read and write
56E1000
trusted library allocation
page read and write
56BF000
trusted library allocation
page read and write
59E7000
trusted library allocation
page read and write
54EB000
trusted library allocation
page read and write
55A9000
trusted library allocation
page read and write
5514000
trusted library allocation
page read and write
557C000
trusted library allocation
page read and write
55D1000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
54EB000
trusted library allocation
page read and write
53DF000
stack
page read and write
44E000
unkown
page read and write
5538000
trusted library allocation
page read and write
2E0C000
heap
page read and write
2D60000
heap
page read and write
557A000
trusted library allocation
page read and write
55AB000
trusted library allocation
page read and write
5578000
trusted library allocation
page read and write
5526000
trusted library allocation
page read and write
5573000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
54E5000
trusted library allocation
page read and write
2DE8000
heap
page read and write
5574000
trusted library allocation
page read and write
1F0000
heap
page read and write
3160000
remote allocation
page read and write
5526000
trusted library allocation
page read and write
59ED000
trusted library allocation
page read and write
5573000
trusted library allocation
page read and write
55D1000
trusted library allocation
page read and write
54EC000
trusted library allocation
page read and write
5577000
trusted library allocation
page read and write
2DC9000
heap
page read and write
550D000
trusted library allocation
page read and write
555C000
trusted library allocation
page read and write
40C000
unkown
page readonly
556E000
trusted library allocation
page read and write
54F6000
trusted library allocation
page read and write
55B2000
trusted library allocation
page read and write
400000
unkown
page readonly
54EF000
trusted library allocation
page read and write
2C2F000
unkown
page readonly
5617000
trusted library allocation
page read and write
5517000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
55C9000
trusted library allocation
page read and write
54FB000
trusted library allocation
page read and write
3030000
direct allocation
page read and write
5528000
trusted library allocation
page read and write
5687000
trusted library allocation
page read and write
5592000
trusted library allocation
page read and write
55C9000
trusted library allocation
page read and write
3200000
heap
page read and write
2DBC000
heap
page read and write
55D1000
trusted library allocation
page read and write
31CE000
stack
page read and write
330F000
stack
page read and write
54FE000
trusted library allocation
page read and write
5573000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
There are 275 hidden memdumps, click here to show them.