IOC Report
GesApIoVpU.exe

loading gif

Files

File Path
Type
Category
Malicious
GesApIoVpU.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_GesApIoVpU.exe_5ea3397a741e5f68ac27938378e376aaae817630_80bf81c8_24071944-6c9e-4368-85e3-787597bc2646\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6991.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Aug 30 10:43:26 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A6D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A8D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\GesApIoVpU.exe
"C:\Users\user\Desktop\GesApIoVpU.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7356 -s 1072

URLs

Name
IP
Malicious
http://120.46.149.112:8888/safekey
120.46.149.112
http://120.46.149.112:8888/safekeyc
unknown
http://120.46.149.112:8888/safekeys
unknown
http://120.46.149.112:8888/safekeyB
unknown
http://upx.sf.net
unknown
http://120.46.149.112/
unknown
http://120.46.149.112/uG
unknown
http://120.46.149.112:8888/safekeyvF
unknown
http://120.46.149.112:8888/safekeyv
unknown

IPs

IP
Domain
Country
Malicious
120.46.149.112
unknown
China

Registry

Path
Value
Malicious
\REGISTRY\A\{87898610-f142-fa2b-807e-e07b8acec804}\Root\InventoryApplicationFile\gesapiovpu.exe|ff3528fc590b0343
ProgramId
\REGISTRY\A\{87898610-f142-fa2b-807e-e07b8acec804}\Root\InventoryApplicationFile\gesapiovpu.exe|ff3528fc590b0343
FileId
\REGISTRY\A\{87898610-f142-fa2b-807e-e07b8acec804}\Root\InventoryApplicationFile\gesapiovpu.exe|ff3528fc590b0343
LowerCaseLongPath
\REGISTRY\A\{87898610-f142-fa2b-807e-e07b8acec804}\Root\InventoryApplicationFile\gesapiovpu.exe|ff3528fc590b0343
LongPathHash
\REGISTRY\A\{87898610-f142-fa2b-807e-e07b8acec804}\Root\InventoryApplicationFile\gesapiovpu.exe|ff3528fc590b0343
Name
\REGISTRY\A\{87898610-f142-fa2b-807e-e07b8acec804}\Root\InventoryApplicationFile\gesapiovpu.exe|ff3528fc590b0343
OriginalFileName
\REGISTRY\A\{87898610-f142-fa2b-807e-e07b8acec804}\Root\InventoryApplicationFile\gesapiovpu.exe|ff3528fc590b0343
Publisher
\REGISTRY\A\{87898610-f142-fa2b-807e-e07b8acec804}\Root\InventoryApplicationFile\gesapiovpu.exe|ff3528fc590b0343
Version
\REGISTRY\A\{87898610-f142-fa2b-807e-e07b8acec804}\Root\InventoryApplicationFile\gesapiovpu.exe|ff3528fc590b0343
BinFileVersion
\REGISTRY\A\{87898610-f142-fa2b-807e-e07b8acec804}\Root\InventoryApplicationFile\gesapiovpu.exe|ff3528fc590b0343
BinaryType
\REGISTRY\A\{87898610-f142-fa2b-807e-e07b8acec804}\Root\InventoryApplicationFile\gesapiovpu.exe|ff3528fc590b0343
ProductName
\REGISTRY\A\{87898610-f142-fa2b-807e-e07b8acec804}\Root\InventoryApplicationFile\gesapiovpu.exe|ff3528fc590b0343
ProductVersion
\REGISTRY\A\{87898610-f142-fa2b-807e-e07b8acec804}\Root\InventoryApplicationFile\gesapiovpu.exe|ff3528fc590b0343
LinkDate
\REGISTRY\A\{87898610-f142-fa2b-807e-e07b8acec804}\Root\InventoryApplicationFile\gesapiovpu.exe|ff3528fc590b0343
BinProductVersion
\REGISTRY\A\{87898610-f142-fa2b-807e-e07b8acec804}\Root\InventoryApplicationFile\gesapiovpu.exe|ff3528fc590b0343
AppxPackageFullName
\REGISTRY\A\{87898610-f142-fa2b-807e-e07b8acec804}\Root\InventoryApplicationFile\gesapiovpu.exe|ff3528fc590b0343
AppxPackageRelativeId
\REGISTRY\A\{87898610-f142-fa2b-807e-e07b8acec804}\Root\InventoryApplicationFile\gesapiovpu.exe|ff3528fc590b0343
Size
\REGISTRY\A\{87898610-f142-fa2b-807e-e07b8acec804}\Root\InventoryApplicationFile\gesapiovpu.exe|ff3528fc590b0343
Language
\REGISTRY\A\{87898610-f142-fa2b-807e-e07b8acec804}\Root\InventoryApplicationFile\gesapiovpu.exe|ff3528fc590b0343
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
16F28EA0000
heap
page read and write
7FF6D25A6000
unkown
page readonly
7FF6D25A6000
unkown
page readonly
16F28FB3000
heap
page read and write
2EEBBFA000
stack
page read and write
16F28E90000
heap
page read and write
2EEB7FF000
stack
page read and write
7FF6D25A3000
unkown
page readonly
16F29220000
heap
page read and write
2EEB6FE000
stack
page read and write
16F29225000
heap
page read and write
2EEB9FF000
stack
page read and write
16F28EFC000
heap
page read and write
16F2ADA0000
heap
page execute and read and write
2EEB8FE000
stack
page read and write
16F28F70000
heap
page read and write
2EEBAFD000
stack
page read and write
7FF6D25A0000
unkown
page readonly
16F28EC0000
heap
page read and write
7FF6D25A1000
unkown
page execute read
2EEB5FE000
stack
page read and write
2EEB4FD000
stack
page read and write
7FF6D25A3000
unkown
page readonly
16F28F97000
heap
page read and write
2EEB17A000
stack
page read and write
16F2ADF0000
unkown
page execute and read and write
7FF6D25A1000
unkown
page execute read
7FF6D25A0000
unkown
page readonly
2EEBBF8000
stack
page read and write
16F28F8E000
heap
page read and write
16F28EF0000
heap
page read and write
16F28FAB000
heap
page read and write
There are 22 hidden memdumps, click here to show them.