IOC Report
adEHIudJGb.exe

loading gif

Files

File Path
Type
Category
Malicious
adEHIudJGb.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_adEHIudJGb.exe_88f5ee299657cd886959496a81d085468cca591b_deb79f96_d5912164-c91f-4c0f-a0b9-e3d305f75ca8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4687.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Nov 1 14:55:08 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4724.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4764.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\adEHIudJGb.exe
"C:\Users\user\Desktop\adEHIudJGb.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7300 -s 416

URLs

Name
IP
Malicious
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://upx.sf.net
unknown
https://sectigo.com/CPS0
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
There are 1 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
\REGISTRY\A\{6ee3b851-b430-21b7-d367-296d19c221a0}\Root\InventoryApplicationFile\adehiudjgb.exe|41220970553f53b3
ProgramId
\REGISTRY\A\{6ee3b851-b430-21b7-d367-296d19c221a0}\Root\InventoryApplicationFile\adehiudjgb.exe|41220970553f53b3
FileId
\REGISTRY\A\{6ee3b851-b430-21b7-d367-296d19c221a0}\Root\InventoryApplicationFile\adehiudjgb.exe|41220970553f53b3
LowerCaseLongPath
\REGISTRY\A\{6ee3b851-b430-21b7-d367-296d19c221a0}\Root\InventoryApplicationFile\adehiudjgb.exe|41220970553f53b3
LongPathHash
\REGISTRY\A\{6ee3b851-b430-21b7-d367-296d19c221a0}\Root\InventoryApplicationFile\adehiudjgb.exe|41220970553f53b3
Name
\REGISTRY\A\{6ee3b851-b430-21b7-d367-296d19c221a0}\Root\InventoryApplicationFile\adehiudjgb.exe|41220970553f53b3
OriginalFileName
\REGISTRY\A\{6ee3b851-b430-21b7-d367-296d19c221a0}\Root\InventoryApplicationFile\adehiudjgb.exe|41220970553f53b3
Publisher
\REGISTRY\A\{6ee3b851-b430-21b7-d367-296d19c221a0}\Root\InventoryApplicationFile\adehiudjgb.exe|41220970553f53b3
Version
\REGISTRY\A\{6ee3b851-b430-21b7-d367-296d19c221a0}\Root\InventoryApplicationFile\adehiudjgb.exe|41220970553f53b3
BinFileVersion
\REGISTRY\A\{6ee3b851-b430-21b7-d367-296d19c221a0}\Root\InventoryApplicationFile\adehiudjgb.exe|41220970553f53b3
BinaryType
\REGISTRY\A\{6ee3b851-b430-21b7-d367-296d19c221a0}\Root\InventoryApplicationFile\adehiudjgb.exe|41220970553f53b3
ProductName
\REGISTRY\A\{6ee3b851-b430-21b7-d367-296d19c221a0}\Root\InventoryApplicationFile\adehiudjgb.exe|41220970553f53b3
ProductVersion
\REGISTRY\A\{6ee3b851-b430-21b7-d367-296d19c221a0}\Root\InventoryApplicationFile\adehiudjgb.exe|41220970553f53b3
LinkDate
\REGISTRY\A\{6ee3b851-b430-21b7-d367-296d19c221a0}\Root\InventoryApplicationFile\adehiudjgb.exe|41220970553f53b3
BinProductVersion
\REGISTRY\A\{6ee3b851-b430-21b7-d367-296d19c221a0}\Root\InventoryApplicationFile\adehiudjgb.exe|41220970553f53b3
AppxPackageFullName
\REGISTRY\A\{6ee3b851-b430-21b7-d367-296d19c221a0}\Root\InventoryApplicationFile\adehiudjgb.exe|41220970553f53b3
AppxPackageRelativeId
\REGISTRY\A\{6ee3b851-b430-21b7-d367-296d19c221a0}\Root\InventoryApplicationFile\adehiudjgb.exe|41220970553f53b3
Size
\REGISTRY\A\{6ee3b851-b430-21b7-d367-296d19c221a0}\Root\InventoryApplicationFile\adehiudjgb.exe|41220970553f53b3
Language
\REGISTRY\A\{6ee3b851-b430-21b7-d367-296d19c221a0}\Root\InventoryApplicationFile\adehiudjgb.exe|41220970553f53b3
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
140001000
unkown
page execute read
malicious
140001000
unkown
page execute read
malicious
140131000
unkown
page readonly
5A0000
heap
page read and write
1400EA000
unkown
page readonly
1A0000
heap
page read and write
5AB000
heap
page read and write
140139000
unkown
page readonly
1400EA000
unkown
page readonly
14013D000
unkown
page readonly
14012B000
unkown
page write copy
14012B000
unkown
page read and write
2160000
heap
page read and write
140000000
unkown
page readonly
140131000
unkown
page readonly
14013D000
unkown
page readonly
140139000
unkown
page readonly
14C000
stack
page read and write
190000
heap
page read and write
89F000
stack
page read and write
79E000
stack
page read and write
1D0000
heap
page read and write
140000000
unkown
page readonly
There are 13 hidden memdumps, click here to show them.