IOC Report
lfY08S61Ig.exe

loading gif

Files

File Path
Type
Category
Malicious
lfY08S61Ig.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_lfY08S61Ig.exe_4632ea77af8f117533587a7775e3a3f93d8dba_f70cea56_1dfe1d1e-84e7-4010-8d4f-0d39fd6fcc47\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8633.tmp.dmp
Mini DuMP crash report, 15 streams, Wed May 1 14:43:15 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER871F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER873F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\lfY08S61Ig.exe
"C:\Users\user\Desktop\lfY08S61Ig.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7580 -s 1504

URLs

Name
IP
Malicious
plaintediousidowsko.shop
malicious
acceptabledcooeprs.shop
malicious
zippyfinickysofwps.shop
malicious
boredimperissvieos.shop
malicious
obsceneclassyjuwks.shop
malicious
stiffraspyofkwsl.shop
malicious
sweetsquarediaslw.shop
malicious
holicisticscrarws.shop
malicious
miniaturefinerninewjs.shop
malicious
https://stiffraspyofkwsl.shop/b
unknown
https://stiffraspyofkwsl.shop/h
unknown
https://stiffraspyofkwsl.shop/p
unknown
https://stiffraspyofkwsl.shop/
unknown
http://upx.sf.net
unknown
https://stiffraspyofkwsl.shop/api
104.21.81.139
https://stiffraspyofkwsl.shop/api6X
unknown
https://stiffraspyofkwsl.shop/apieO
unknown
https://stiffraspyofkwsl.shop/jOT
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
stiffraspyofkwsl.shop
104.21.81.139
malicious

IPs

IP
Domain
Country
Malicious
104.21.81.139
stiffraspyofkwsl.shop
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{14af6a9d-e19c-c092-163b-fbeeab8841ca}\Root\InventoryApplicationFile\lfy08s61ig.exe|edfae5bc0ef313bb
ProgramId
\REGISTRY\A\{14af6a9d-e19c-c092-163b-fbeeab8841ca}\Root\InventoryApplicationFile\lfy08s61ig.exe|edfae5bc0ef313bb
FileId
\REGISTRY\A\{14af6a9d-e19c-c092-163b-fbeeab8841ca}\Root\InventoryApplicationFile\lfy08s61ig.exe|edfae5bc0ef313bb
LowerCaseLongPath
\REGISTRY\A\{14af6a9d-e19c-c092-163b-fbeeab8841ca}\Root\InventoryApplicationFile\lfy08s61ig.exe|edfae5bc0ef313bb
LongPathHash
\REGISTRY\A\{14af6a9d-e19c-c092-163b-fbeeab8841ca}\Root\InventoryApplicationFile\lfy08s61ig.exe|edfae5bc0ef313bb
Name
\REGISTRY\A\{14af6a9d-e19c-c092-163b-fbeeab8841ca}\Root\InventoryApplicationFile\lfy08s61ig.exe|edfae5bc0ef313bb
OriginalFileName
\REGISTRY\A\{14af6a9d-e19c-c092-163b-fbeeab8841ca}\Root\InventoryApplicationFile\lfy08s61ig.exe|edfae5bc0ef313bb
Publisher
\REGISTRY\A\{14af6a9d-e19c-c092-163b-fbeeab8841ca}\Root\InventoryApplicationFile\lfy08s61ig.exe|edfae5bc0ef313bb
Version
\REGISTRY\A\{14af6a9d-e19c-c092-163b-fbeeab8841ca}\Root\InventoryApplicationFile\lfy08s61ig.exe|edfae5bc0ef313bb
BinFileVersion
\REGISTRY\A\{14af6a9d-e19c-c092-163b-fbeeab8841ca}\Root\InventoryApplicationFile\lfy08s61ig.exe|edfae5bc0ef313bb
BinaryType
\REGISTRY\A\{14af6a9d-e19c-c092-163b-fbeeab8841ca}\Root\InventoryApplicationFile\lfy08s61ig.exe|edfae5bc0ef313bb
ProductName
\REGISTRY\A\{14af6a9d-e19c-c092-163b-fbeeab8841ca}\Root\InventoryApplicationFile\lfy08s61ig.exe|edfae5bc0ef313bb
ProductVersion
\REGISTRY\A\{14af6a9d-e19c-c092-163b-fbeeab8841ca}\Root\InventoryApplicationFile\lfy08s61ig.exe|edfae5bc0ef313bb
LinkDate
\REGISTRY\A\{14af6a9d-e19c-c092-163b-fbeeab8841ca}\Root\InventoryApplicationFile\lfy08s61ig.exe|edfae5bc0ef313bb
BinProductVersion
\REGISTRY\A\{14af6a9d-e19c-c092-163b-fbeeab8841ca}\Root\InventoryApplicationFile\lfy08s61ig.exe|edfae5bc0ef313bb
AppxPackageFullName
\REGISTRY\A\{14af6a9d-e19c-c092-163b-fbeeab8841ca}\Root\InventoryApplicationFile\lfy08s61ig.exe|edfae5bc0ef313bb
AppxPackageRelativeId
\REGISTRY\A\{14af6a9d-e19c-c092-163b-fbeeab8841ca}\Root\InventoryApplicationFile\lfy08s61ig.exe|edfae5bc0ef313bb
Size
\REGISTRY\A\{14af6a9d-e19c-c092-163b-fbeeab8841ca}\Root\InventoryApplicationFile\lfy08s61ig.exe|edfae5bc0ef313bb
Language
\REGISTRY\A\{14af6a9d-e19c-c092-163b-fbeeab8841ca}\Root\InventoryApplicationFile\lfy08s61ig.exe|edfae5bc0ef313bb
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00B8F8B0D2B
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
36D0000
direct allocation
page read and write
malicious
1BBE000
stack
page read and write
37C0000
remote allocation
page read and write
1A11000
unkown
page read and write
1F0000
heap
page read and write
1C3E000
heap
page read and write
1C75000
heap
page read and write
1A13000
unkown
page readonly
1B7E000
stack
page read and write
36F0000
heap
page read and write
3AEF000
stack
page read and write
37BE000
stack
page read and write
1CAB000
heap
page read and write
36CF000
stack
page read and write
37C0000
remote allocation
page read and write
411000
unkown
page readonly
400000
unkown
page readonly
40FE000
stack
page read and write
1B30000
heap
page read and write
37E0000
heap
page read and write
1B00000
heap
page read and write
36D0000
heap
page read and write
39ED000
stack
page read and write
9C000
stack
page read and write
3FBE000
stack
page read and write
1E2F000
stack
page read and write
401000
unkown
page execute read
3C2F000
stack
page read and write
38ED000
stack
page read and write
1B35000
heap
page read and write
1C30000
heap
page read and write
1BC0000
direct allocation
page execute and read and write
377E000
stack
page read and write
457000
unkown
page execute and read and write
1C45000
heap
page execute and read and write
419000
unkown
page write copy
3B2E000
stack
page read and write
40BF000
stack
page read and write
19A000
stack
page read and write
400000
unkown
page execute and read and write
41FE000
stack
page read and write
1A13000
unkown
page readonly
373D000
stack
page read and write
1C3A000
heap
page read and write
37C0000
remote allocation
page read and write
There are 35 hidden memdumps, click here to show them.