IOC Report
tVXXRNG1av.exe

loading gif

Files

File Path
Type
Category
Malicious
tVXXRNG1av.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_tVXXRNG1av.exe_d371d1368bc7911b65534aa0257e3ccf45a7e6ff_198f1779_16cc991d-2181-47c8-ba86-aace3d55b103\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER133D.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 24 00:46:53 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER139B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER13BC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\tVXXRNG1av.exe
"C:\Users\user\Desktop\tVXXRNG1av.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 232

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{c69be583-8a52-1bd4-e658-8f54ad0e20a1}\Root\InventoryApplicationFile\tvxxrng1av.exe|5dc1c215316d1697
ProgramId
\REGISTRY\A\{c69be583-8a52-1bd4-e658-8f54ad0e20a1}\Root\InventoryApplicationFile\tvxxrng1av.exe|5dc1c215316d1697
FileId
\REGISTRY\A\{c69be583-8a52-1bd4-e658-8f54ad0e20a1}\Root\InventoryApplicationFile\tvxxrng1av.exe|5dc1c215316d1697
LowerCaseLongPath
\REGISTRY\A\{c69be583-8a52-1bd4-e658-8f54ad0e20a1}\Root\InventoryApplicationFile\tvxxrng1av.exe|5dc1c215316d1697
LongPathHash
\REGISTRY\A\{c69be583-8a52-1bd4-e658-8f54ad0e20a1}\Root\InventoryApplicationFile\tvxxrng1av.exe|5dc1c215316d1697
Name
\REGISTRY\A\{c69be583-8a52-1bd4-e658-8f54ad0e20a1}\Root\InventoryApplicationFile\tvxxrng1av.exe|5dc1c215316d1697
OriginalFileName
\REGISTRY\A\{c69be583-8a52-1bd4-e658-8f54ad0e20a1}\Root\InventoryApplicationFile\tvxxrng1av.exe|5dc1c215316d1697
Publisher
\REGISTRY\A\{c69be583-8a52-1bd4-e658-8f54ad0e20a1}\Root\InventoryApplicationFile\tvxxrng1av.exe|5dc1c215316d1697
Version
\REGISTRY\A\{c69be583-8a52-1bd4-e658-8f54ad0e20a1}\Root\InventoryApplicationFile\tvxxrng1av.exe|5dc1c215316d1697
BinFileVersion
\REGISTRY\A\{c69be583-8a52-1bd4-e658-8f54ad0e20a1}\Root\InventoryApplicationFile\tvxxrng1av.exe|5dc1c215316d1697
BinaryType
\REGISTRY\A\{c69be583-8a52-1bd4-e658-8f54ad0e20a1}\Root\InventoryApplicationFile\tvxxrng1av.exe|5dc1c215316d1697
ProductName
\REGISTRY\A\{c69be583-8a52-1bd4-e658-8f54ad0e20a1}\Root\InventoryApplicationFile\tvxxrng1av.exe|5dc1c215316d1697
ProductVersion
\REGISTRY\A\{c69be583-8a52-1bd4-e658-8f54ad0e20a1}\Root\InventoryApplicationFile\tvxxrng1av.exe|5dc1c215316d1697
LinkDate
\REGISTRY\A\{c69be583-8a52-1bd4-e658-8f54ad0e20a1}\Root\InventoryApplicationFile\tvxxrng1av.exe|5dc1c215316d1697
BinProductVersion
\REGISTRY\A\{c69be583-8a52-1bd4-e658-8f54ad0e20a1}\Root\InventoryApplicationFile\tvxxrng1av.exe|5dc1c215316d1697
AppxPackageFullName
\REGISTRY\A\{c69be583-8a52-1bd4-e658-8f54ad0e20a1}\Root\InventoryApplicationFile\tvxxrng1av.exe|5dc1c215316d1697
AppxPackageRelativeId
\REGISTRY\A\{c69be583-8a52-1bd4-e658-8f54ad0e20a1}\Root\InventoryApplicationFile\tvxxrng1av.exe|5dc1c215316d1697
Size
\REGISTRY\A\{c69be583-8a52-1bd4-e658-8f54ad0e20a1}\Root\InventoryApplicationFile\tvxxrng1av.exe|5dc1c215316d1697
Language
\REGISTRY\A\{c69be583-8a52-1bd4-e658-8f54ad0e20a1}\Root\InventoryApplicationFile\tvxxrng1av.exe|5dc1c215316d1697
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page readonly
74E000
heap
page read and write
424000
unkown
page readonly
412000
unkown
page readonly
74A000
heap
page read and write
410000
unkown
page execute and write copy
19D000
stack
page read and write
740000
heap
page read and write
9D000
stack
page read and write
410000
unkown
page execute and write copy
580000
heap
page read and write
412000
unkown
page readonly
1F0000
heap
page read and write
500000
heap
page read and write
424000
unkown
page readonly
400000
unkown
page readonly
There are 6 hidden memdumps, click here to show them.