IOC Report
vy3mvlAaCZ.exe

loading gif

Files

File Path
Type
Category
Malicious
vy3mvlAaCZ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_vy3mvlAaCZ.exe_6074d93d852c1785169ec71e797e6a243c122_d0e789f3_15f13808\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2C8E.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Sep 1 06:51:57 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2EB2.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER300B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\vy3mvlAaCZ.exe
"C:\Users\user\Desktop\vy3mvlAaCZ.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 244

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
ProgramId
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
FileId
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
LowerCaseLongPath
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
LongPathHash
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
Name
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
Publisher
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
Version
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
BinFileVersion
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
BinaryType
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
ProductName
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
ProductVersion
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
LinkDate
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
BinProductVersion
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
Size
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
Language
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
IsPeFile
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1164000
unkown
page write copy
malicious
1164000
unkown
page write copy
malicious
1163000
unkown
page write copy
malicious
1164000
unkown
page write copy
malicious
19489D60000
trusted library allocation
page read and write
1B01486C000
heap
page read and write
6D965FB000
stack
page read and write
19489EFC000
heap
page read and write
1B602B00000
heap
page read and write
1B014800000
heap
page read and write
8FB2FA000
stack
page read and write
8D73E7A000
stack
page read and write
DF746FF000
stack
page read and write
194857E0000
trusted library section
page readonly
C3C000
stack
page read and write
19484677000
heap
page read and write
1C7C0A00000
heap
page read and write
1163000
unkown
page read and write
1B014869000
heap
page read and write
1C7C0A3C000
heap
page read and write
1C7C1202000
trusted library allocation
page read and write
DFA000
heap
page read and write
1B602B5B000
heap
page read and write
1C7C0A43000
heap
page read and write
19489E2C000
heap
page read and write
1B602B66000
heap
page read and write
1B6020A5000
heap
page read and write
1B6020A6000
heap
page read and write
23A4B580000
trusted library allocation
page read and write
4FEBF7D000
stack
page read and write
1B01487C000
heap
page read and write
1B602089000
heap
page read and write
19485000000
heap
page read and write
1B602B55000
heap
page read and write
1151000
unkown
page execute read
19489E64000
heap
page read and write
19484530000
heap
page read and write
1B602B57000
heap
page read and write
19485BA0000
trusted library allocation
page read and write
1B602B5A000
heap
page read and write
1B6020A3000
heap
page read and write
23A4B4F0000
heap
page read and write
1948B000000
heap
page read and write
1B01486B000
heap
page read and write
85986FE000
stack
page read and write
1B014885000
heap
page read and write
4FEC27E000
stack
page read and write
8598B7F000
stack
page read and write
1B014902000
heap
page read and write
1B014849000
heap
page read and write
10FE000
stack
page read and write
1B014845000
heap
page read and write
194857D0000
trusted library section
page readonly
1B602B5A000
heap
page read and write
23A4B65C000
heap
page read and write
1948463D000
heap
page read and write
1C7C0990000
trusted library allocation
page read and write
23A4B629000
heap
page read and write
19484626000
heap
page read and write
1B015002000
trusted library allocation
page read and write
1B602B72000
heap
page read and write
1B014670000
heap
page read and write
19489E00000
heap
page read and write
194846FD000
heap
page read and write
10FE000
stack
page read and write
23A4B613000
heap
page read and write
1B601FC0000
heap
page read and write
250E3829000
heap
page read and write
1B014843000
heap
page read and write
19489C30000
trusted library allocation
page read and write
1B602B2A000
heap
page read and write
1B01487B000
heap
page read and write
1B602B56000
heap
page read and write
19489E8A000
heap
page read and write
19489EA1000
heap
page read and write
1B602B72000
heap
page read and write
6D9687E000
stack
page read and write
DF73CFC000
stack
page read and write
194856F0000
trusted library allocation
page read and write
4FEC0FD000
stack
page read and write
8D7407E000
stack
page read and write
19489D40000
trusted library allocation
page read and write
1B014875000
heap
page read and write
4FEBE7E000
stack
page read and write
1C7C0B00000
heap
page read and write
1177000
unkown
page read and write
19484600000
heap
page read and write
23A4B602000
heap
page read and write
1948A010000
trusted library allocation
page read and write
1B602B30000
heap
page read and write
1B014876000
heap
page read and write
DAE000
stack
page read and write
4FEBCFE000
stack
page read and write
D3C000
stack
page read and write
85987F9000
stack
page read and write
1C7C0820000
heap
page read and write
19484613000
heap
page read and write
1B602B32000
heap
page read and write
19485B93000
trusted library allocation
page read and write
1B602013000
heap
page read and write
1B602B73000
heap
page read and write
19489D84000
trusted library allocation
page read and write
859887F000
stack
page read and write
859897A000
stack
page read and write
1C7C0A5C000
heap
page read and write
1B602B13000
heap
page read and write
1C7C09B0000
trusted library allocation
page read and write
19489EE0000
heap
page read and write
19489E20000
heap
page read and write
19489EDA000
heap
page read and write
1C7C0B13000
heap
page read and write
1C7C0A53000
heap
page read and write
1B602082000
heap
page read and write
1B602097000
heap
page read and write
19485118000
heap
page read and write
1B603002000
heap
page read and write
1100000
remote allocation
page read and write
19485800000
trusted library section
page readonly
6D96B7F000
stack
page read and write
19489EE8000
heap
page read and write
6D96A7E000
stack
page read and write
1B014862000
heap
page read and write
19489EA0000
trusted library allocation
page read and write
859857F000
stack
page read and write
19489EA8000
heap
page read and write
1B60202A000
heap
page read and write
1B602074000
heap
page read and write
19485015000
heap
page read and write
23A4C002000
trusted library allocation
page read and write
1B602B02000
heap
page read and write
1B602B59000
heap
page read and write
23A4B550000
heap
page read and write
115E000
unkown
page readonly
1B602B7E000
heap
page read and write
10BF000
stack
page read and write
23A4B5B0000
remote allocation
page read and write
1B602B76000
heap
page read and write
4FEBFFF000
stack
page read and write
23A4B600000
heap
page read and write
250E3720000
heap
page read and write
1B602B55000
heap
page read and write
1B014866000
heap
page read and write
DF740FB000
stack
page read and write
1179000
unkown
page read and write
1B01487E000
heap
page read and write
8597FFB000
stack
page read and write
1177000
unkown
page read and write
1B014858000
heap
page read and write
1B01485D000
heap
page read and write
1B602B58000
heap
page read and write
19484694000
heap
page read and write
1B602B57000
heap
page read and write
19489BB0000
trusted library allocation
page read and write
1B014860000
heap
page read and write
19484671000
heap
page read and write
19484679000
heap
page read and write
10FE000
stack
page read and write
1B602113000
heap
page read and write
194846A1000
heap
page read and write
1C7C0B02000
heap
page read and write
1B602B63000
heap
page read and write
1B014660000
heap
page read and write
DF745FE000
stack
page read and write
10BF000
stack
page read and write
4FEBD7E000
stack
page read and write
1179000
unkown
page read and write
1B01483E000
heap
page read and write
250E3876000
heap
page read and write
1100000
remote allocation
page read and write
85982FF000
stack
page read and write
1B602B80000
heap
page read and write
1B602B6F000
heap
page read and write
1B602B32000
heap
page read and write
1B014865000
heap
page read and write
250E3856000
heap
page read and write
1948A0A0000
remote allocation
page read and write
6D96C7E000
stack
page read and write
1B014847000
heap
page read and write
85984FC000
stack
page read and write
194845A0000
heap
page read and write
19484713000
heap
page read and write
117A000
unkown
page readonly
115E000
unkown
page readonly
1B602B52000
heap
page read and write
1B01482A000
heap
page read and write
1B601F50000
heap
page read and write
1B602B72000
heap
page read and write
250E37B0000
trusted library allocation
page read and write
1B602100000
heap
page read and write
19489D48000
trusted library allocation
page read and write
1948469F000
heap
page read and write
1B602B64000
heap
page read and write
8D738FF000
stack
page read and write
1179000
unkown
page read and write
DAE000
stack
page read and write
1B602086000
heap
page read and write
1B602102000
heap
page read and write
8D73BFC000
stack
page read and write
1150000
unkown
page readonly
2A1F000
stack
page read and write
1B601F60000
heap
page read and write
1150000
unkown
page readonly
1B014830000
heap
page read and write
250E3902000
heap
page read and write
250E3913000
heap
page read and write
DF749FF000
stack
page read and write
DF747FE000
stack
page read and write
1B602B53000
heap
page read and write
1C7C0A43000
heap
page read and write
1151000
unkown
page execute read
1C7C0830000
heap
page read and write
6D96D7F000
stack
page read and write
1948A070000
trusted library allocation
page read and write
1B602B6B000
heap
page read and write
19489E3F000
heap
page read and write
1163000
unkown
page read and write
8D7357C000
stack
page read and write
1B602093000
heap
page read and write
1B602B7E000
heap
page read and write
1B602B2A000
heap
page read and write
85980FF000
stack
page read and write
1B602B2C000
heap
page read and write
19485B90000
trusted library allocation
page read and write
1B014846000
heap
page read and write
1C7C0A2A000
heap
page read and write
8FB57C000
stack
page read and write
19484629000
heap
page read and write
19489D64000
trusted library allocation
page read and write
194857F0000
trusted library section
page readonly
1B602026000
heap
page read and write
1B014813000
heap
page read and write
250E3780000
heap
page read and write
1B602B56000
heap
page read and write
19489D40000
trusted library allocation
page read and write
DB0000
heap
page read and write
1B602B5B000
heap
page read and write
1B602B52000
heap
page read and write
859799B000
stack
page read and write
19485118000
heap
page read and write
1948A060000
trusted library allocation
page read and write
DF743FF000
stack
page read and write
1B014859000
heap
page read and write
1948A080000
trusted library allocation
page read and write
1B602B57000
heap
page read and write
DF0000
heap
page read and write
19489E4C000
heap
page read and write
1B603000000
heap
page read and write
1B01486E000
heap
page read and write
1B602B30000
heap
page read and write
1B01484E000
heap
page read and write
2A1F000
stack
page read and write
1B602000000
heap
page read and write
115E000
unkown
page readonly
1B602A15000
heap
page read and write
D3C000
stack
page read and write
1151000
unkown
page execute read
250E3854000
heap
page read and write
250E385A000
heap
page read and write
8D73D7F000
stack
page read and write
D60000
trusted library allocation
page read and write
1B602B40000
heap
page read and write
194845E0000
trusted library section
page read and write
1B01482E000
heap
page read and write
19489D70000
trusted library allocation
page read and write
23A4B640000
heap
page read and write
1B0147D0000
trusted library allocation
page read and write
1B014825000
heap
page read and write
8FB77E000
stack
page read and write
19485820000
trusted library section
page readonly
1948468F000
heap
page read and write
250E3802000
heap
page read and write
19484540000
heap
page read and write
8D73F7F000
stack
page read and write
DFA000
heap
page read and write
1B602079000
heap
page read and write
D3C000
stack
page read and write
C3C000
stack
page read and write
4FEC1FD000
stack
page read and write
85983FF000
stack
page read and write
1B601FF0000
trusted library allocation
page read and write
DF744FD000
stack
page read and write
1B01485A000
heap
page read and write
1C7C0890000
heap
page read and write
1948A0A0000
remote allocation
page read and write
1B602B56000
heap
page read and write
1948467B000
heap
page read and write
23A4B4E0000
heap
page read and write
1150000
unkown
page readonly
D60000
trusted library allocation
page read and write
C3C000
stack
page read and write
1B602B37000
heap
page read and write
8D73C7E000
stack
page read and write
1B60203F000
heap
page read and write
19485201000
trusted library allocation
page read and write
4FEBA7B000
stack
page read and write
250E4202000
trusted library allocation
page read and write
2A1F000
stack
page read and write
DF0000
heap
page read and write
1177000
unkown
page read and write
DAE000
stack
page read and write
1B602B6D000
heap
page read and write
1B602B6A000
heap
page read and write
8FAE8C000
stack
page read and write
1B603012000
heap
page read and write
9A0000
heap
page read and write
1B602B52000
heap
page read and write
6D968FE000
stack
page read and write
9A0000
unkown
page read and write
DB0000
heap
page read and write
19489EFC000
heap
page read and write
19489C20000
trusted library allocation
page read and write
117A000
unkown
page readonly
1B014863000
heap
page read and write
1B602B74000
heap
page read and write
19489E0F000
heap
page read and write
19484702000
heap
page read and write
23A4B702000
heap
page read and write
19485113000
heap
page read and write
250E3710000
heap
page read and write
1C7C0A64000
heap
page read and write
23A4B5B0000
remote allocation
page read and write
250E3800000
heap
page read and write
19489D70000
trusted library allocation
page read and write
DB0000
heap
page read and write
1B602B72000
heap
page read and write
19485810000
trusted library section
page readonly
8FB67E000
stack
page read and write
1B602B80000
heap
page read and write
19485002000
heap
page read and write
9A0000
unkown
page read and write
1B014861000
heap
page read and write
19489BA0000
trusted library allocation
page read and write
DF748FF000
stack
page read and write
DF0000
heap
page read and write
1B602B78000
heap
page read and write
1B602A02000
heap
page read and write
8D73AFF000
stack
page read and write
1B602B64000
heap
page read and write
DF742FC000
stack
page read and write
1B60205E000
heap
page read and write
10BF000
stack
page read and write
859867E000
stack
page read and write
1B01485B000
heap
page read and write
1B01483B000
heap
page read and write
19489EF3000
heap
page read and write
8FB37E000
stack
page read and write
117A000
unkown
page readonly
DFA000
heap
page read and write
8D7417B000
stack
page read and write
19489D80000
trusted library allocation
page read and write
1B014864000
heap
page read and write
85981FB000
stack
page read and write
19485100000
heap
page read and write
859837E000
stack
page read and write
1B014878000
heap
page read and write
1B602A00000
heap
page read and write
1B0146D0000
heap
page read and write
19484656000
heap
page read and write
117A000
unkown
page readonly
1150000
unkown
page readonly
8FB479000
stack
page read and write
8597EFC000
stack
page read and write
D60000
trusted library allocation
page read and write
19489D61000
trusted library allocation
page read and write
1B014841000
heap
page read and write
1B014831000
heap
page read and write
1B602B56000
heap
page read and write
1B602B29000
heap
page read and write
19489E90000
trusted library allocation
page read and write
250E3841000
heap
page read and write
1B014842000
heap
page read and write
1948468D000
heap
page read and write
19485B71000
trusted library allocation
page read and write
1B602B62000
heap
page read and write
8597DF8000
stack
page read and write
DF741FF000
stack
page read and write
1B602093000
heap
page read and write
1C7C0A13000
heap
page read and write
1B602095000
heap
page read and write
1C7C0A02000
heap
page read and write
115E000
unkown
page readonly
1B602B53000
heap
page read and write
1163000
unkown
page read and write
1948A050000
trusted library allocation
page read and write
250E3813000
heap
page read and write
19485102000
heap
page read and write
19489D4E000
trusted library allocation
page read and write
1B602B5F000
heap
page read and write
8FB87F000
stack
page read and write
1948A0A0000
remote allocation
page read and write
194845D0000
trusted library allocation
page read and write
1151000
unkown
page execute read
23A4B5B0000
remote allocation
page read and write
There are 383 hidden memdumps, click here to show them.