IOC Report
XJQkTVvJ3I.exe

loading gif

Files

File Path
Type
Category
Malicious
XJQkTVvJ3I.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_XJQkTVvJ3I.exe_f5d3fb8a9d5d48a109cbda4e8feebb5f948f95a_e5070e2e_ac075564-9e75-4fc0-a002-559ed5ca0241\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER15C8.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 31 23:27:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER16B3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER16E3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\XJQkTVvJ3I.exe
"C:\Users\user\Desktop\XJQkTVvJ3I.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6588 -s 1332

URLs

Name
IP
Malicious
http://185.235.128.16
unknown
malicious
http://185.235.128.16/
185.235.128.16
malicious
http://185.235.128.16/562c1eb14955c897.php
185.235.128.16
malicious
http://185.235.128.16/562c1eb14955c897.php~M
unknown
http://185.235.128.16/562c1eb14955c897.phpk
unknown
http://upx.sf.net
unknown
http://185.235.128.16/562c1eb14955c897.phpx
unknown
http://185.235.128.16/562c1eb14955c897.php4
unknown
http://185.235.128.16/562c1eb14955c897.phpQ
unknown
http://185.235.128.16/ws
unknown
http://185.235.128.16e
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.235.128.16
unknown
Ukraine
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{217fe961-c407-911d-2552-4c264ebe0fab}\Root\InventoryApplicationFile\xjqktvvj3i.exe|5727a0238e94fa6d
ProgramId
\REGISTRY\A\{217fe961-c407-911d-2552-4c264ebe0fab}\Root\InventoryApplicationFile\xjqktvvj3i.exe|5727a0238e94fa6d
FileId
\REGISTRY\A\{217fe961-c407-911d-2552-4c264ebe0fab}\Root\InventoryApplicationFile\xjqktvvj3i.exe|5727a0238e94fa6d
LowerCaseLongPath
\REGISTRY\A\{217fe961-c407-911d-2552-4c264ebe0fab}\Root\InventoryApplicationFile\xjqktvvj3i.exe|5727a0238e94fa6d
LongPathHash
\REGISTRY\A\{217fe961-c407-911d-2552-4c264ebe0fab}\Root\InventoryApplicationFile\xjqktvvj3i.exe|5727a0238e94fa6d
Name
\REGISTRY\A\{217fe961-c407-911d-2552-4c264ebe0fab}\Root\InventoryApplicationFile\xjqktvvj3i.exe|5727a0238e94fa6d
OriginalFileName
\REGISTRY\A\{217fe961-c407-911d-2552-4c264ebe0fab}\Root\InventoryApplicationFile\xjqktvvj3i.exe|5727a0238e94fa6d
Publisher
\REGISTRY\A\{217fe961-c407-911d-2552-4c264ebe0fab}\Root\InventoryApplicationFile\xjqktvvj3i.exe|5727a0238e94fa6d
Version
\REGISTRY\A\{217fe961-c407-911d-2552-4c264ebe0fab}\Root\InventoryApplicationFile\xjqktvvj3i.exe|5727a0238e94fa6d
BinFileVersion
\REGISTRY\A\{217fe961-c407-911d-2552-4c264ebe0fab}\Root\InventoryApplicationFile\xjqktvvj3i.exe|5727a0238e94fa6d
BinaryType
\REGISTRY\A\{217fe961-c407-911d-2552-4c264ebe0fab}\Root\InventoryApplicationFile\xjqktvvj3i.exe|5727a0238e94fa6d
ProductName
\REGISTRY\A\{217fe961-c407-911d-2552-4c264ebe0fab}\Root\InventoryApplicationFile\xjqktvvj3i.exe|5727a0238e94fa6d
ProductVersion
\REGISTRY\A\{217fe961-c407-911d-2552-4c264ebe0fab}\Root\InventoryApplicationFile\xjqktvvj3i.exe|5727a0238e94fa6d
LinkDate
\REGISTRY\A\{217fe961-c407-911d-2552-4c264ebe0fab}\Root\InventoryApplicationFile\xjqktvvj3i.exe|5727a0238e94fa6d
BinProductVersion
\REGISTRY\A\{217fe961-c407-911d-2552-4c264ebe0fab}\Root\InventoryApplicationFile\xjqktvvj3i.exe|5727a0238e94fa6d
AppxPackageFullName
\REGISTRY\A\{217fe961-c407-911d-2552-4c264ebe0fab}\Root\InventoryApplicationFile\xjqktvvj3i.exe|5727a0238e94fa6d
AppxPackageRelativeId
\REGISTRY\A\{217fe961-c407-911d-2552-4c264ebe0fab}\Root\InventoryApplicationFile\xjqktvvj3i.exe|5727a0238e94fa6d
Size
\REGISTRY\A\{217fe961-c407-911d-2552-4c264ebe0fab}\Root\InventoryApplicationFile\xjqktvvj3i.exe|5727a0238e94fa6d
Language
\REGISTRY\A\{217fe961-c407-911d-2552-4c264ebe0fab}\Root\InventoryApplicationFile\xjqktvvj3i.exe|5727a0238e94fa6d
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2450000
direct allocation
page execute and read and write
malicious
2530000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
9BE000
heap
page read and write
malicious
497000
unkown
page write copy
400000
unkown
page readonly
82E000
stack
page read and write
8FE000
stack
page read and write
194000
stack
page read and write
BAF000
stack
page read and write
A20000
heap
page read and write
262E000
stack
page read and write
1AA2F000
stack
page read and write
1AA6E000
stack
page read and write
401000
unkown
page execute read
549000
unkown
page execute and read and write
9B0000
heap
page read and write
930000
heap
page read and write
9C000
stack
page read and write
9BA000
heap
page read and write
25AE000
stack
page read and write
7C0000
heap
page read and write
4A4000
unkown
page readonly
1AB6D000
stack
page read and write
A03000
heap
page read and write
7E5000
heap
page read and write
25EE000
stack
page read and write
6EB000
unkown
page readonly
1A72F000
stack
page read and write
1ABAE000
stack
page read and write
6D6000
unkown
page execute and read and write
960000
heap
page read and write
420000
unkown
page execute read
53D000
unkown
page execute and read and write
2650000
heap
page read and write
19E000
stack
page read and write
1ADFE000
stack
page read and write
56E000
unkown
page execute and read and write
CAF000
stack
page read and write
1ACAE000
stack
page read and write
840000
direct allocation
page execute and read and write
933000
heap
page read and write
1F0000
heap
page read and write
1A92F000
stack
page read and write
6E8000
unkown
page execute and read and write
830000
heap
page read and write
256E000
stack
page read and write
1ACFE000
stack
page read and write
1A82F000
stack
page read and write
7E0000
heap
page read and write
There are 40 hidden memdumps, click here to show them.