IOC Report
OHkRFujs2m.exe

loading gif

Files

File Path
Type
Category
Malicious
OHkRFujs2m.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_OHkRFujs2m.exe_ccc029e7440f42aaa9a3f96c2c528b459f2262_e7b9045b_0cdb27ff-1fd0-4065-a5fe-5b576051abb5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7ACB.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 24 00:47:53 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7B2A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7B5A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\OHkRFujs2m.exe
"C:\Users\user\Desktop\OHkRFujs2m.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6552 -s 232

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

IPs

IP
Domain
Country
Malicious
104.208.16.94
unknown
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{abf90bf1-a852-a27f-157f-d2dd8cd91225}\Root\InventoryApplicationFile\ohkrfujs2m.exe|94b8617e864521a5
ProgramId
\REGISTRY\A\{abf90bf1-a852-a27f-157f-d2dd8cd91225}\Root\InventoryApplicationFile\ohkrfujs2m.exe|94b8617e864521a5
FileId
\REGISTRY\A\{abf90bf1-a852-a27f-157f-d2dd8cd91225}\Root\InventoryApplicationFile\ohkrfujs2m.exe|94b8617e864521a5
LowerCaseLongPath
\REGISTRY\A\{abf90bf1-a852-a27f-157f-d2dd8cd91225}\Root\InventoryApplicationFile\ohkrfujs2m.exe|94b8617e864521a5
LongPathHash
\REGISTRY\A\{abf90bf1-a852-a27f-157f-d2dd8cd91225}\Root\InventoryApplicationFile\ohkrfujs2m.exe|94b8617e864521a5
Name
\REGISTRY\A\{abf90bf1-a852-a27f-157f-d2dd8cd91225}\Root\InventoryApplicationFile\ohkrfujs2m.exe|94b8617e864521a5
OriginalFileName
\REGISTRY\A\{abf90bf1-a852-a27f-157f-d2dd8cd91225}\Root\InventoryApplicationFile\ohkrfujs2m.exe|94b8617e864521a5
Publisher
\REGISTRY\A\{abf90bf1-a852-a27f-157f-d2dd8cd91225}\Root\InventoryApplicationFile\ohkrfujs2m.exe|94b8617e864521a5
Version
\REGISTRY\A\{abf90bf1-a852-a27f-157f-d2dd8cd91225}\Root\InventoryApplicationFile\ohkrfujs2m.exe|94b8617e864521a5
BinFileVersion
\REGISTRY\A\{abf90bf1-a852-a27f-157f-d2dd8cd91225}\Root\InventoryApplicationFile\ohkrfujs2m.exe|94b8617e864521a5
BinaryType
\REGISTRY\A\{abf90bf1-a852-a27f-157f-d2dd8cd91225}\Root\InventoryApplicationFile\ohkrfujs2m.exe|94b8617e864521a5
ProductName
\REGISTRY\A\{abf90bf1-a852-a27f-157f-d2dd8cd91225}\Root\InventoryApplicationFile\ohkrfujs2m.exe|94b8617e864521a5
ProductVersion
\REGISTRY\A\{abf90bf1-a852-a27f-157f-d2dd8cd91225}\Root\InventoryApplicationFile\ohkrfujs2m.exe|94b8617e864521a5
LinkDate
\REGISTRY\A\{abf90bf1-a852-a27f-157f-d2dd8cd91225}\Root\InventoryApplicationFile\ohkrfujs2m.exe|94b8617e864521a5
BinProductVersion
\REGISTRY\A\{abf90bf1-a852-a27f-157f-d2dd8cd91225}\Root\InventoryApplicationFile\ohkrfujs2m.exe|94b8617e864521a5
AppxPackageFullName
\REGISTRY\A\{abf90bf1-a852-a27f-157f-d2dd8cd91225}\Root\InventoryApplicationFile\ohkrfujs2m.exe|94b8617e864521a5
AppxPackageRelativeId
\REGISTRY\A\{abf90bf1-a852-a27f-157f-d2dd8cd91225}\Root\InventoryApplicationFile\ohkrfujs2m.exe|94b8617e864521a5
Size
\REGISTRY\A\{abf90bf1-a852-a27f-157f-d2dd8cd91225}\Root\InventoryApplicationFile\ohkrfujs2m.exe|94b8617e864521a5
Language
\REGISTRY\A\{abf90bf1-a852-a27f-157f-d2dd8cd91225}\Root\InventoryApplicationFile\ohkrfujs2m.exe|94b8617e864521a5
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
19D000
stack
page read and write
412000
unkown
page write copy
400000
unkown
page readonly
4AE000
heap
page read and write
410000
unkown
page execute and write copy
424000
unkown
page write copy
401000
unkown
page write copy
401000
unkown
page write copy
440000
heap
page read and write
400000
unkown
page readonly
9D000
stack
page read and write
425000
unkown
page execute and read and write
424000
unkown
page write copy
430000
heap
page read and write
1D0000
heap
page read and write
410000
unkown
page execute and write copy
4A0000
heap
page read and write
4AA000
heap
page read and write
425000
unkown
page execute and write copy
412000
unkown
page write copy
There are 10 hidden memdumps, click here to show them.