IOC Report
qeUaxJCA3FO.exe

loading gif

Files

File Path
Type
Category
Malicious
qeUaxJCA3FO.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_qeUaxJCA3FO.exe_26ced5a8273fce98aa9021c21fb0fef74efa7d5c_dc1fb231_c6be8ca1-2306-40fb-9124-95b6fa544bbf\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A8A.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Jul 4 19:48:54 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6B08.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6B57.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\qeUaxJCA3FO.exe
"C:\Users\user\Desktop\qeUaxJCA3FO.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7528 -s 304

URLs

Name
IP
Malicious
benchillppwo.shop
malicious
bargainnykwo.shop
malicious
bouncedgowp.shop
malicious
radiationnopp.shop
malicious
bannngwko.shop
malicious
bitchsafettyudjwu.shop
malicious
publicitttyps.shop
malicious
affecthorsedpo.shop
malicious
answerrsdo.shop
malicious
https://bitchsafettyudjwu.shop/apie
unknown
https://bitchsafettyudjwu.shop/on
unknown
https://bitchsafettyudjwu.shop/
unknown
https://bitchsafettyudjwu.shop/PR
unknown
http://upx.sf.net
unknown
https://bitchsafettyudjwu.shop/apix
unknown
https://bitchsafettyudjwu.shop:443/api
unknown
https://bitchsafettyudjwu.shop/api
104.21.27.50
https://bitchsafettyudjwu.shop/pa
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bitchsafettyudjwu.shop
104.21.27.50
malicious
206.23.85.13.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
104.21.27.50
bitchsafettyudjwu.shop
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{911d2f7f-11f0-5d3d-22de-8ccf86c767f9}\Root\InventoryApplicationFile\qeuaxjca3fo.exe|bb9c9a3450b4205a
ProgramId
\REGISTRY\A\{911d2f7f-11f0-5d3d-22de-8ccf86c767f9}\Root\InventoryApplicationFile\qeuaxjca3fo.exe|bb9c9a3450b4205a
FileId
\REGISTRY\A\{911d2f7f-11f0-5d3d-22de-8ccf86c767f9}\Root\InventoryApplicationFile\qeuaxjca3fo.exe|bb9c9a3450b4205a
LowerCaseLongPath
\REGISTRY\A\{911d2f7f-11f0-5d3d-22de-8ccf86c767f9}\Root\InventoryApplicationFile\qeuaxjca3fo.exe|bb9c9a3450b4205a
LongPathHash
\REGISTRY\A\{911d2f7f-11f0-5d3d-22de-8ccf86c767f9}\Root\InventoryApplicationFile\qeuaxjca3fo.exe|bb9c9a3450b4205a
Name
\REGISTRY\A\{911d2f7f-11f0-5d3d-22de-8ccf86c767f9}\Root\InventoryApplicationFile\qeuaxjca3fo.exe|bb9c9a3450b4205a
OriginalFileName
\REGISTRY\A\{911d2f7f-11f0-5d3d-22de-8ccf86c767f9}\Root\InventoryApplicationFile\qeuaxjca3fo.exe|bb9c9a3450b4205a
Publisher
\REGISTRY\A\{911d2f7f-11f0-5d3d-22de-8ccf86c767f9}\Root\InventoryApplicationFile\qeuaxjca3fo.exe|bb9c9a3450b4205a
Version
\REGISTRY\A\{911d2f7f-11f0-5d3d-22de-8ccf86c767f9}\Root\InventoryApplicationFile\qeuaxjca3fo.exe|bb9c9a3450b4205a
BinFileVersion
\REGISTRY\A\{911d2f7f-11f0-5d3d-22de-8ccf86c767f9}\Root\InventoryApplicationFile\qeuaxjca3fo.exe|bb9c9a3450b4205a
BinaryType
\REGISTRY\A\{911d2f7f-11f0-5d3d-22de-8ccf86c767f9}\Root\InventoryApplicationFile\qeuaxjca3fo.exe|bb9c9a3450b4205a
ProductName
\REGISTRY\A\{911d2f7f-11f0-5d3d-22de-8ccf86c767f9}\Root\InventoryApplicationFile\qeuaxjca3fo.exe|bb9c9a3450b4205a
ProductVersion
\REGISTRY\A\{911d2f7f-11f0-5d3d-22de-8ccf86c767f9}\Root\InventoryApplicationFile\qeuaxjca3fo.exe|bb9c9a3450b4205a
LinkDate
\REGISTRY\A\{911d2f7f-11f0-5d3d-22de-8ccf86c767f9}\Root\InventoryApplicationFile\qeuaxjca3fo.exe|bb9c9a3450b4205a
BinProductVersion
\REGISTRY\A\{911d2f7f-11f0-5d3d-22de-8ccf86c767f9}\Root\InventoryApplicationFile\qeuaxjca3fo.exe|bb9c9a3450b4205a
AppxPackageFullName
\REGISTRY\A\{911d2f7f-11f0-5d3d-22de-8ccf86c767f9}\Root\InventoryApplicationFile\qeuaxjca3fo.exe|bb9c9a3450b4205a
AppxPackageRelativeId
\REGISTRY\A\{911d2f7f-11f0-5d3d-22de-8ccf86c767f9}\Root\InventoryApplicationFile\qeuaxjca3fo.exe|bb9c9a3450b4205a
Size
\REGISTRY\A\{911d2f7f-11f0-5d3d-22de-8ccf86c767f9}\Root\InventoryApplicationFile\qeuaxjca3fo.exe|bb9c9a3450b4205a
Language
\REGISTRY\A\{911d2f7f-11f0-5d3d-22de-8ccf86c767f9}\Root\InventoryApplicationFile\qeuaxjca3fo.exe|bb9c9a3450b4205a
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
1411000
heap
page read and write
1370000
heap
page read and write
140E000
heap
page read and write
13C0000
heap
page read and write
451000
remote allocation
page execute and read and write
BDD000
heap
page read and write
2870000
direct allocation
page execute and read and write
DBF000
stack
page read and write
305E000
stack
page read and write
376E000
stack
page read and write
B6F000
stack
page read and write
13CA000
heap
page read and write
1419000
heap
page read and write
286D000
stack
page read and write
1500000
heap
page read and write
8FC000
stack
page read and write
1380000
heap
page read and write
1499000
heap
page read and write
147A000
heap
page read and write
315F000
stack
page read and write
319D000
stack
page read and write
14AE000
heap
page read and write
386E000
stack
page read and write
1012000
unkown
page readonly
38F0000
trusted library allocation
page read and write
FC5000
unkown
page write copy
14FE000
stack
page read and write
3919000
trusted library allocation
page read and write
1525000
heap
page read and write
1495000
heap
page read and write
13E5000
heap
page read and write
1012000
unkown
page readonly
133A000
stack
page read and write
146E000
heap
page read and write
A10000
heap
page read and write
362E000
stack
page read and write
329D000
stack
page read and write
BCA000
heap
page read and write
F91000
unkown
page execute read
28E0000
heap
page read and write
13F7000
heap
page read and write
38B2000
trusted library allocation
page read and write
F90000
unkown
page readonly
F8E000
stack
page read and write
FC5000
unkown
page read and write
148F000
heap
page read and write
3924000
trusted library allocation
page read and write
3880000
trusted library allocation
page read and write
123B000
stack
page read and write
F90000
unkown
page readonly
301D000
stack
page read and write
1520000
heap
page read and write
BAE000
stack
page read and write
930000
heap
page read and write
146C000
heap
page read and write
38C5000
trusted library allocation
page read and write
A6E000
stack
page read and write
3CF0000
heap
page read and write
148C000
heap
page read and write
272E000
stack
page read and write
FBA000
unkown
page readonly
2EDE000
stack
page read and write
3BDF000
stack
page read and write
BCE000
heap
page read and write
3ADE000
stack
page read and write
3890000
trusted library allocation
page read and write
2F1D000
stack
page read and write
392C000
trusted library allocation
page read and write
372F000
stack
page read and write
3980000
heap
page read and write
FBA000
unkown
page readonly
BC0000
heap
page read and write
276D000
stack
page read and write
17C0000
heap
page read and write
3882000
trusted library allocation
page read and write
F91000
unkown
page execute read
A20000
heap
page read and write
5CC000
stack
page read and write
There are 69 hidden memdumps, click here to show them.