IOC Report
lxEu3xfjIb.exe

loading gif

Files

File Path
Type
Category
Malicious
lxEu3xfjIb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_lxEu3xfjIb.exe_6a39ec7dc1e69d3743f713aa75b8913c42b9f40_0a061317_b4af8d3d-2408-4610-94bc-e983b4fb00c5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC397.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Nov 1 16:44:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC463.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC4B3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\lxEu3xfjIb.exe
"C:\Users\user\Desktop\lxEu3xfjIb.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 1052

URLs

Name
IP
Malicious
http://95.215.207.176/d8ddb681db736e16.php
95.215.207.176
malicious
http://95.215.207.176
unknown
malicious
http://95.215.207.176/
95.215.207.176
malicious
http://95.215.207.176/d8ddb681db736e16.phpS
unknown
http://95.215.207.176/d8ddb681db736e16.php&
unknown
http://95.215.207.176/d8ddb681db736e16.phpf
unknown
http://95.215.207.176/d8ddb681db736e16.phpH
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
http://95.215.207.176/$
unknown
http://95.215.207.176/ws
unknown
http://upx.sf.net
unknown
http://95.215.207.176/d8ddb681db736e16.phpV
unknown
http://95.215.207.176/d8ddb681db736e16.php:
unknown
There are 3 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
95.215.207.176
unknown
Ukraine
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{4c1b755d-497c-1ddf-ffdb-334985a34446}\Root\InventoryApplicationFile\lxeu3xfjib.exe|3123524ef64dd4c4
ProgramId
\REGISTRY\A\{4c1b755d-497c-1ddf-ffdb-334985a34446}\Root\InventoryApplicationFile\lxeu3xfjib.exe|3123524ef64dd4c4
FileId
\REGISTRY\A\{4c1b755d-497c-1ddf-ffdb-334985a34446}\Root\InventoryApplicationFile\lxeu3xfjib.exe|3123524ef64dd4c4
LowerCaseLongPath
\REGISTRY\A\{4c1b755d-497c-1ddf-ffdb-334985a34446}\Root\InventoryApplicationFile\lxeu3xfjib.exe|3123524ef64dd4c4
LongPathHash
\REGISTRY\A\{4c1b755d-497c-1ddf-ffdb-334985a34446}\Root\InventoryApplicationFile\lxeu3xfjib.exe|3123524ef64dd4c4
Name
\REGISTRY\A\{4c1b755d-497c-1ddf-ffdb-334985a34446}\Root\InventoryApplicationFile\lxeu3xfjib.exe|3123524ef64dd4c4
OriginalFileName
\REGISTRY\A\{4c1b755d-497c-1ddf-ffdb-334985a34446}\Root\InventoryApplicationFile\lxeu3xfjib.exe|3123524ef64dd4c4
Publisher
\REGISTRY\A\{4c1b755d-497c-1ddf-ffdb-334985a34446}\Root\InventoryApplicationFile\lxeu3xfjib.exe|3123524ef64dd4c4
Version
\REGISTRY\A\{4c1b755d-497c-1ddf-ffdb-334985a34446}\Root\InventoryApplicationFile\lxeu3xfjib.exe|3123524ef64dd4c4
BinFileVersion
\REGISTRY\A\{4c1b755d-497c-1ddf-ffdb-334985a34446}\Root\InventoryApplicationFile\lxeu3xfjib.exe|3123524ef64dd4c4
BinaryType
\REGISTRY\A\{4c1b755d-497c-1ddf-ffdb-334985a34446}\Root\InventoryApplicationFile\lxeu3xfjib.exe|3123524ef64dd4c4
ProductName
\REGISTRY\A\{4c1b755d-497c-1ddf-ffdb-334985a34446}\Root\InventoryApplicationFile\lxeu3xfjib.exe|3123524ef64dd4c4
ProductVersion
\REGISTRY\A\{4c1b755d-497c-1ddf-ffdb-334985a34446}\Root\InventoryApplicationFile\lxeu3xfjib.exe|3123524ef64dd4c4
LinkDate
\REGISTRY\A\{4c1b755d-497c-1ddf-ffdb-334985a34446}\Root\InventoryApplicationFile\lxeu3xfjib.exe|3123524ef64dd4c4
BinProductVersion
\REGISTRY\A\{4c1b755d-497c-1ddf-ffdb-334985a34446}\Root\InventoryApplicationFile\lxeu3xfjib.exe|3123524ef64dd4c4
AppxPackageFullName
\REGISTRY\A\{4c1b755d-497c-1ddf-ffdb-334985a34446}\Root\InventoryApplicationFile\lxeu3xfjib.exe|3123524ef64dd4c4
AppxPackageRelativeId
\REGISTRY\A\{4c1b755d-497c-1ddf-ffdb-334985a34446}\Root\InventoryApplicationFile\lxeu3xfjib.exe|3123524ef64dd4c4
Size
\REGISTRY\A\{4c1b755d-497c-1ddf-ffdb-334985a34446}\Root\InventoryApplicationFile\lxeu3xfjib.exe|3123524ef64dd4c4
Language
\REGISTRY\A\{4c1b755d-497c-1ddf-ffdb-334985a34446}\Root\InventoryApplicationFile\lxeu3xfjib.exe|3123524ef64dd4c4
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4840000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
4920000
direct allocation
page read and write
malicious
2C99000
heap
page read and write
malicious
2C10000
heap
page read and write
1F0000
heap
page read and write
400000
unkown
page readonly
2C1E000
heap
page read and write
1CE8E000
stack
page read and write
6E8000
unkown
page execute and read and write
4980000
heap
page read and write
19E000
stack
page read and write
2C1A000
heap
page read and write
2B91000
unkown
page readonly
2BB0000
heap
page read and write
9C000
stack
page read and write
1CF8D000
stack
page read and write
2CF5000
heap
page read and write
56E000
unkown
page execute and read and write
1CFCE000
stack
page read and write
6D6000
unkown
page execute and read and write
49CE000
stack
page read and write
1CE4F000
stack
page read and write
2CC4000
heap
page read and write
2B91000
unkown
page readonly
40E000
unkown
page execute read
48B000
unkown
page write copy
1D12E000
stack
page read and write
2D90000
heap
page read and write
195000
stack
page read and write
497E000
stack
page read and write
1D22F000
stack
page read and write
1CB0F000
stack
page read and write
401000
unkown
page execute read
53D000
unkown
page execute and read and write
549000
unkown
page execute and read and write
2F6F000
stack
page read and write
2D95000
heap
page read and write
2D4E000
stack
page read and write
1CD4E000
stack
page read and write
2C23000
heap
page execute and read and write
4A0E000
stack
page read and write
1CC0F000
stack
page read and write
2F90000
heap
page read and write
2BFE000
stack
page read and write
4A30000
heap
page read and write
1D0CE000
stack
page read and write
1CD0F000
stack
page read and write
4920000
heap
page read and write
4A33000
heap
page read and write
483F000
stack
page read and write
488000
unkown
page readonly
2CD8000
heap
page read and write
19B000
stack
page read and write
There are 44 hidden memdumps, click here to show them.