IOC Report
xXO3Bx1Gtv

loading gif

Files

File Path
Type
Category
Malicious
xXO3Bx1Gtv.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_xXO3Bx1Gtv.exe_b9154763bcedd46a6db4586a931bedddd56ff80_f1e767b5_e85d00cd-1196-428b-9568-1792ead1eaee\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1C06.tmp.dmp
Mini DuMP crash report, 14 streams, Fri May 3 11:49:13 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER26D4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER26F5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\xXO3Bx1Gtv.exe
"C:\Users\user\Desktop\xXO3Bx1Gtv.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 340

URLs

Name
IP
Malicious
keewoolas.pw
malicious
revivalsecularas.pw
malicious
killredls.pw
malicious
bloockflad.pw
malicious
barbecueappledos.pw
malicious
steycools.pw
malicious
bookgames.pw
malicious
moskhoods.pw
malicious
dayzilons.pw
malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{b74c33db-8842-8b13-d4dc-4506bf40572a}\Root\InventoryApplicationFile\xxo3bx1gtv.exe|c29a363cc5a326b1
ProgramId
\REGISTRY\A\{b74c33db-8842-8b13-d4dc-4506bf40572a}\Root\InventoryApplicationFile\xxo3bx1gtv.exe|c29a363cc5a326b1
FileId
\REGISTRY\A\{b74c33db-8842-8b13-d4dc-4506bf40572a}\Root\InventoryApplicationFile\xxo3bx1gtv.exe|c29a363cc5a326b1
LowerCaseLongPath
\REGISTRY\A\{b74c33db-8842-8b13-d4dc-4506bf40572a}\Root\InventoryApplicationFile\xxo3bx1gtv.exe|c29a363cc5a326b1
LongPathHash
\REGISTRY\A\{b74c33db-8842-8b13-d4dc-4506bf40572a}\Root\InventoryApplicationFile\xxo3bx1gtv.exe|c29a363cc5a326b1
Name
\REGISTRY\A\{b74c33db-8842-8b13-d4dc-4506bf40572a}\Root\InventoryApplicationFile\xxo3bx1gtv.exe|c29a363cc5a326b1
OriginalFileName
\REGISTRY\A\{b74c33db-8842-8b13-d4dc-4506bf40572a}\Root\InventoryApplicationFile\xxo3bx1gtv.exe|c29a363cc5a326b1
Publisher
\REGISTRY\A\{b74c33db-8842-8b13-d4dc-4506bf40572a}\Root\InventoryApplicationFile\xxo3bx1gtv.exe|c29a363cc5a326b1
Version
\REGISTRY\A\{b74c33db-8842-8b13-d4dc-4506bf40572a}\Root\InventoryApplicationFile\xxo3bx1gtv.exe|c29a363cc5a326b1
BinFileVersion
\REGISTRY\A\{b74c33db-8842-8b13-d4dc-4506bf40572a}\Root\InventoryApplicationFile\xxo3bx1gtv.exe|c29a363cc5a326b1
BinaryType
\REGISTRY\A\{b74c33db-8842-8b13-d4dc-4506bf40572a}\Root\InventoryApplicationFile\xxo3bx1gtv.exe|c29a363cc5a326b1
ProductName
\REGISTRY\A\{b74c33db-8842-8b13-d4dc-4506bf40572a}\Root\InventoryApplicationFile\xxo3bx1gtv.exe|c29a363cc5a326b1
ProductVersion
\REGISTRY\A\{b74c33db-8842-8b13-d4dc-4506bf40572a}\Root\InventoryApplicationFile\xxo3bx1gtv.exe|c29a363cc5a326b1
LinkDate
\REGISTRY\A\{b74c33db-8842-8b13-d4dc-4506bf40572a}\Root\InventoryApplicationFile\xxo3bx1gtv.exe|c29a363cc5a326b1
BinProductVersion
\REGISTRY\A\{b74c33db-8842-8b13-d4dc-4506bf40572a}\Root\InventoryApplicationFile\xxo3bx1gtv.exe|c29a363cc5a326b1
AppxPackageFullName
\REGISTRY\A\{b74c33db-8842-8b13-d4dc-4506bf40572a}\Root\InventoryApplicationFile\xxo3bx1gtv.exe|c29a363cc5a326b1
AppxPackageRelativeId
\REGISTRY\A\{b74c33db-8842-8b13-d4dc-4506bf40572a}\Root\InventoryApplicationFile\xxo3bx1gtv.exe|c29a363cc5a326b1
Size
\REGISTRY\A\{b74c33db-8842-8b13-d4dc-4506bf40572a}\Root\InventoryApplicationFile\xxo3bx1gtv.exe|c29a363cc5a326b1
Language
\REGISTRY\A\{b74c33db-8842-8b13-d4dc-4506bf40572a}\Root\InventoryApplicationFile\xxo3bx1gtv.exe|c29a363cc5a326b1
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
481000
unkown
page write copy
474000
unkown
page readonly
574000
unkown
page read and write
CAF000
stack
page read and write
A1000
stack
page read and write
810000
heap
page read and write
BAE000
stack
page read and write
574000
unkown
page write copy
2520000
heap
page read and write
A6E000
stack
page read and write
84E000
heap
page read and write
400000
unkown
page readonly
840000
heap
page read and write
401000
unkown
page execute read
401000
unkown
page execute read
575000
unkown
page execute read
7D7000
unkown
page readonly
486000
unkown
page execute read
84A000
heap
page read and write
800000
heap
page read and write
400000
unkown
page readonly
486000
unkown
page execute read
9C000
stack
page read and write
B6F000
stack
page read and write
481000
unkown
page write copy
474000
unkown
page readonly
7D7000
unkown
page readonly
575000
unkown
page execute read
950000
heap
page read and write
There are 19 hidden memdumps, click here to show them.