IOC Report
o7b91j8vnJ.exe

loading gif

Files

File Path
Type
Category
Malicious
o7b91j8vnJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_o7b91j8vnJ.exe_dfc5acfeaf57144235ca737a897d40b288f6a0b4_c3f06f9e_887bb615-5d50-4f8c-b092-fcd390f7cce2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER17B9.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 25 00:00:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1894.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER18B5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\o7b91j8vnJ.exe
"C:\Users\user\Desktop\o7b91j8vnJ.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6856 -s 1516

URLs

Name
IP
Malicious
shortsvelventysjo.shop
malicious
tolerateilusidjukl.shop
malicious
https://strollheavengwu.shop/api
172.67.163.209
malicious
shatterbreathepsw.shop
malicious
demonstationfukewko.shop
malicious
productivelookewr.shop
malicious
strollheavengwu.shop
malicious
alcojoldwograpciw.shop
malicious
incredibleextedwj.shop
malicious
liabilitynighstjsko.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://strollheavengwu.shop/y
unknown
https://duckduckgo.com/ac/?q=
unknown
https://strollheavengwu.shop/apib2
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://strollheavengwu.shop/apime
unknown
https://strollheavengwu.shop/apih02
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://strollheavengwu.shop/apie
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://strollheavengwu.shop/v
unknown
https://strollheavengwu.shop/apis
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://strollheavengwu.shop/d
unknown
https://strollheavengwu.shop/e
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://strollheavengwu.shop/9
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://strollheavengwu.shop/D
unknown
https://strollheavengwu.shop/apior
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://upx.sf.net
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://strollheavengwu.shop/7
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://support.microsof
unknown
https://strollheavengwu.shop/apiIF3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://strollheavengwu.shop/apiN
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://strollheavengwu.shop/
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
strollheavengwu.shop
172.67.163.209
malicious

IPs

IP
Domain
Country
Malicious
172.67.163.209
strollheavengwu.shop
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
ProgramId
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
FileId
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
LowerCaseLongPath
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
LongPathHash
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
Name
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
OriginalFileName
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
Publisher
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
Version
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
BinFileVersion
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
BinaryType
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
ProductName
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
ProductVersion
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
LinkDate
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
BinProductVersion
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
AppxPackageFullName
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
AppxPackageRelativeId
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
Size
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
Language
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
41D0000
direct allocation
page execute and read and write
malicious
433F000
heap
page read and write
6892000
trusted library allocation
page read and write
6895000
trusted library allocation
page read and write
4326000
heap
page read and write
6BB3000
trusted library allocation
page read and write
6874000
trusted library allocation
page read and write
433E000
heap
page read and write
400000
unkown
page readonly
6829000
trusted library allocation
page read and write
42C9000
heap
page read and write
42E8000
heap
page read and write
66CF000
stack
page read and write
433E000
heap
page read and write
6842000
trusted library allocation
page read and write
6826000
trusted library allocation
page read and write
6826000
trusted library allocation
page read and write
6895000
trusted library allocation
page read and write
6836000
trusted library allocation
page read and write
5D90000
remote allocation
page read and write
6842000
trusted library allocation
page read and write
433E000
heap
page read and write
682B000
trusted library allocation
page read and write
418E000
stack
page read and write
4324000
heap
page read and write
685B000
trusted library allocation
page read and write
683B000
trusted library allocation
page read and write
6835000
trusted library allocation
page read and write
685C000
trusted library allocation
page read and write
6887000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
4332000
heap
page read and write
682C000
trusted library allocation
page read and write
42CC000
heap
page read and write
6854000
trusted library allocation
page read and write
5FAD000
stack
page read and write
6835000
trusted library allocation
page read and write
686B000
trusted library allocation
page read and write
682E000
trusted library allocation
page read and write
42CC000
heap
page read and write
686D000
trusted library allocation
page read and write
6887000
trusted library allocation
page read and write
684D000
trusted library allocation
page read and write
433A000
heap
page read and write
686B000
trusted library allocation
page read and write
6864000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
6921000
heap
page read and write
6830000
trusted library allocation
page read and write
6843000
trusted library allocation
page read and write
682C000
trusted library allocation
page read and write
69F8000
trusted library allocation
page read and write
6921000
trusted library allocation
page read and write
4340000
heap
page read and write
6826000
trusted library allocation
page read and write
42A3000
heap
page read and write
6830000
trusted library allocation
page read and write
6836000
trusted library allocation
page read and write
434A000
heap
page read and write
6821000
trusted library allocation
page read and write
4346000
heap
page read and write
4265000
heap
page execute and read and write
682F000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
433A000
heap
page read and write
433E000
heap
page read and write
6B7F000
stack
page read and write
6826000
trusted library allocation
page read and write
418000
unkown
page write copy
6895000
trusted library allocation
page read and write
686D000
trusted library allocation
page read and write
683B000
trusted library allocation
page read and write
683C000
trusted library allocation
page read and write
4147000
heap
page read and write
6830000
trusted library allocation
page read and write
4325000
heap
page read and write
4335000
heap
page read and write
6864000
trusted library allocation
page read and write
6835000
trusted library allocation
page read and write
5CF0000
direct allocation
page read and write
5FEE000
stack
page read and write
6865000
trusted library allocation
page read and write
4145000
heap
page read and write
4346000
heap
page read and write
6843000
trusted library allocation
page read and write
6822000
trusted library allocation
page read and write
6821000
trusted library allocation
page read and write
5D8E000
stack
page read and write
5D90000
remote allocation
page read and write
6850000
trusted library allocation
page read and write
6826000
trusted library allocation
page read and write
6C60000
heap
page read and write
433E000
heap
page read and write
6824000
trusted library allocation
page read and write
6864000
trusted library allocation
page read and write
6881000
trusted library allocation
page read and write
42B2000
heap
page read and write
685E000
trusted library allocation
page read and write
5D2D000
stack
page read and write
684D000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
433A000
heap
page read and write
60EF000
stack
page read and write
6830000
trusted library allocation
page read and write
68CA000
trusted library allocation
page read and write
6853000
trusted library allocation
page read and write
68C2000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
6978000
trusted library allocation
page read and write
425E000
heap
page read and write
6830000
trusted library allocation
page read and write
683E000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
68BB000
trusted library allocation
page read and write
1F0000
heap
page read and write
6830000
trusted library allocation
page read and write
684E000
trusted library allocation
page read and write
6843000
trusted library allocation
page read and write
68A3000
trusted library allocation
page read and write
434C000
heap
page read and write
6886000
trusted library allocation
page read and write
683C000
trusted library allocation
page read and write
4326000
heap
page read and write
6940000
trusted library allocation
page read and write
433E000
heap
page read and write
433E000
heap
page read and write
6835000
trusted library allocation
page read and write
6C74000
trusted library allocation
page read and write
433A000
heap
page read and write
6875000
trusted library allocation
page read and write
6859000
trusted library allocation
page read and write
4038000
unkown
page readonly
4338000
heap
page read and write
6883000
trusted library allocation
page read and write
688A000
trusted library allocation
page read and write
68B5000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
683C000
trusted library allocation
page read and write
4346000
heap
page read and write
411000
unkown
page readonly
6835000
trusted library allocation
page read and write
683A000
trusted library allocation
page read and write
717D000
trusted library allocation
page read and write
6889000
trusted library allocation
page read and write
6826000
trusted library allocation
page read and write
6887000
trusted library allocation
page read and write
4349000
heap
page read and write
6826000
trusted library allocation
page read and write
42AD000
heap
page read and write
6927000
trusted library allocation
page read and write
684E000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
622F000
stack
page read and write
6830000
trusted library allocation
page read and write
4340000
heap
page read and write
6854000
trusted library allocation
page read and write
686D000
trusted library allocation
page read and write
612E000
stack
page read and write
683C000
trusted library allocation
page read and write
6885000
trusted library allocation
page read and write
42C9000
heap
page read and write
4038000
unkown
page readonly
449000
unkown
page execute and read and write
6920000
heap
page read and write
686E000
trusted library allocation
page read and write
6881000
trusted library allocation
page read and write
4325000
heap
page read and write
686C000
trusted library allocation
page read and write
4250000
heap
page read and write
6A00000
trusted library allocation
page read and write
685E000
trusted library allocation
page read and write
682C000
trusted library allocation
page read and write
4347000
heap
page read and write
6853000
trusted library allocation
page read and write
686D000
trusted library allocation
page read and write
6874000
trusted library allocation
page read and write
6A7E000
stack
page read and write
6830000
trusted library allocation
page read and write
6882000
trusted library allocation
page read and write
685F000
trusted library allocation
page read and write
6871000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
685C000
trusted library allocation
page read and write
686D000
trusted library allocation
page read and write
4220000
heap
page read and write
68CA000
trusted library allocation
page read and write
6854000
trusted library allocation
page read and write
686D000
trusted library allocation
page read and write
425A000
heap
page read and write
686D000
trusted library allocation
page read and write
68C2000
trusted library allocation
page read and write
683B000
trusted library allocation
page read and write
6871000
trusted library allocation
page read and write
6826000
trusted library allocation
page read and write
5CEF000
stack
page read and write
433E000
heap
page read and write
670E000
stack
page read and write
6855000
trusted library allocation
page read and write
6826000
trusted library allocation
page read and write
683D000
trusted library allocation
page read and write
4324000
heap
page read and write
6825000
trusted library allocation
page read and write
4036000
unkown
page read and write
6858000
trusted library allocation
page read and write
68BA000
trusted library allocation
page read and write
433E000
heap
page read and write
682D000
trusted library allocation
page read and write
4340000
heap
page read and write
401000
unkown
page execute read
4332000
heap
page read and write
4325000
heap
page read and write
6895000
trusted library allocation
page read and write
196000
stack
page read and write
6830000
trusted library allocation
page read and write
683C000
trusted library allocation
page read and write
6841000
trusted library allocation
page read and write
4140000
heap
page read and write
433F000
heap
page read and write
68AD000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
685E000
trusted library allocation
page read and write
6836000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
686C000
trusted library allocation
page read and write
68C2000
trusted library allocation
page read and write
9B000
stack
page read and write
431F000
heap
page read and write
6821000
trusted library allocation
page read and write
6842000
trusted library allocation
page read and write
5D90000
remote allocation
page read and write
6858000
trusted library allocation
page read and write
686C000
trusted library allocation
page read and write
685B000
trusted library allocation
page read and write
6895000
trusted library allocation
page read and write
41CE000
stack
page read and write
686C000
trusted library allocation
page read and write
686C000
trusted library allocation
page read and write
6828000
trusted library allocation
page read and write
6826000
trusted library allocation
page read and write
683C000
trusted library allocation
page read and write
6869000
trusted library allocation
page read and write
4335000
heap
page read and write
683D000
trusted library allocation
page read and write
682F000
trusted library allocation
page read and write
6857000
trusted library allocation
page read and write
6852000
trusted library allocation
page read and write
6858000
trusted library allocation
page read and write
683B000
trusted library allocation
page read and write
6821000
trusted library allocation
page read and write
688A000
trusted library allocation
page read and write
5EAD000
stack
page read and write
4332000
heap
page read and write
6839000
trusted library allocation
page read and write
687C000
trusted library allocation
page read and write
683C000
trusted library allocation
page read and write
6847000
trusted library allocation
page read and write
686A000
trusted library allocation
page read and write
6835000
trusted library allocation
page read and write
683D000
trusted library allocation
page read and write
6839000
trusted library allocation
page read and write
683A000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
685B000
trusted library allocation
page read and write
688A000
trusted library allocation
page read and write
444F000
stack
page read and write
6893000
trusted library allocation
page read and write
6872000
trusted library allocation
page read and write
4291000
heap
page read and write
400000
unkown
page execute and read and write
686D000
trusted library allocation
page read and write
6826000
trusted library allocation
page read and write
42B2000
heap
page read and write
5D40000
heap
page read and write
6829000
trusted library allocation
page read and write
6882000
trusted library allocation
page read and write
4332000
heap
page read and write
433E000
heap
page read and write
684D000
trusted library allocation
page read and write
6889000
trusted library allocation
page read and write
682F000
trusted library allocation
page read and write
6843000
trusted library allocation
page read and write
433A000
heap
page read and write
42BF000
heap
page read and write
6837000
trusted library allocation
page read and write
6853000
trusted library allocation
page read and write
682F000
trusted library allocation
page read and write
685B000
trusted library allocation
page read and write
6821000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
683D000
trusted library allocation
page read and write
6821000
trusted library allocation
page read and write
6854000
trusted library allocation
page read and write
4120000
heap
page read and write
685E000
trusted library allocation
page read and write
4343000
heap
page read and write
4327000
heap
page read and write
6830000
trusted library allocation
page read and write
4340000
heap
page read and write
68C3000
trusted library allocation
page read and write
680E000
stack
page read and write
41E000
unkown
page write copy
65CE000
stack
page read and write
6830000
trusted library allocation
page read and write
685F000
trusted library allocation
page read and write
433E000
heap
page read and write
6830000
trusted library allocation
page read and write
683C000
trusted library allocation
page read and write
685C000
trusted library allocation
page read and write
6843000
trusted library allocation
page read and write
68CA000
trusted library allocation
page read and write
6826000
trusted library allocation
page read and write
6884000
trusted library allocation
page read and write
686D000
trusted library allocation
page read and write
4335000
heap
page read and write
6A90000
trusted library allocation
page read and write
685C000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
6865000
trusted library allocation
page read and write
6825000
trusted library allocation
page read and write
5DA0000
heap
page read and write
6958000
trusted library allocation
page read and write
682C000
trusted library allocation
page read and write
684E000
trusted library allocation
page read and write
6821000
trusted library allocation
page read and write
686C000
trusted library allocation
page read and write
42A9000
heap
page read and write
6826000
trusted library allocation
page read and write
7683000
trusted library allocation
page read and write
4335000
heap
page read and write
6875000
trusted library allocation
page read and write
687C000
trusted library allocation
page read and write
6843000
trusted library allocation
page read and write
69C8000
trusted library allocation
page read and write
433E000
heap
page read and write
6835000
trusted library allocation
page read and write
4347000
heap
page read and write
6830000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
6839000
trusted library allocation
page read and write
68C2000
trusted library allocation
page read and write
6829000
trusted library allocation
page read and write
6871000
trusted library allocation
page read and write
686D000
trusted library allocation
page read and write
68CA000
trusted library allocation
page read and write
6843000
trusted library allocation
page read and write
6880000
trusted library allocation
page read and write
6826000
trusted library allocation
page read and write
4347000
heap
page read and write
685E000
trusted library allocation
page read and write
6835000
trusted library allocation
page read and write
6885000
trusted library allocation
page read and write
433A000
heap
page read and write
There are 343 hidden memdumps, click here to show them.