IOC Report
zXR333P8h1.exe

loading gif

Files

File Path
Type
Category
Malicious
zXR333P8h1.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_zXR333P8h1.exe_b29f99c4964a63d75bfaad84c79f35e37fff30_0bcd2230_e6f2bc47-8ba4-46b9-9ff3-2368d59fa92b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA057.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Aug 30 10:43:29 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA123.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA143.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\zXR333P8h1.exe
"C:\Users\user\Desktop\zXR333P8h1.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3788 -s 1112

URLs

Name
IP
Malicious
http://120.46.149.112:8888/safekey
120.46.149.112
http://upx.sf.net
unknown
http://120.46.149.112/
unknown
http://120.46.149.112:8888/safekeykE
unknown
http://120.46.149.112:8888/safekeyI
unknown
http://120.46.149.112:8888/safekeyX
unknown

IPs

IP
Domain
Country
Malicious
120.46.149.112
unknown
China

Registry

Path
Value
Malicious
\REGISTRY\A\{15dc6f93-359a-d0b1-16b5-d614646c8f45}\Root\InventoryApplicationFile\zxr333p8h1.exe|7fada4fa157b7057
ProgramId
\REGISTRY\A\{15dc6f93-359a-d0b1-16b5-d614646c8f45}\Root\InventoryApplicationFile\zxr333p8h1.exe|7fada4fa157b7057
FileId
\REGISTRY\A\{15dc6f93-359a-d0b1-16b5-d614646c8f45}\Root\InventoryApplicationFile\zxr333p8h1.exe|7fada4fa157b7057
LowerCaseLongPath
\REGISTRY\A\{15dc6f93-359a-d0b1-16b5-d614646c8f45}\Root\InventoryApplicationFile\zxr333p8h1.exe|7fada4fa157b7057
LongPathHash
\REGISTRY\A\{15dc6f93-359a-d0b1-16b5-d614646c8f45}\Root\InventoryApplicationFile\zxr333p8h1.exe|7fada4fa157b7057
Name
\REGISTRY\A\{15dc6f93-359a-d0b1-16b5-d614646c8f45}\Root\InventoryApplicationFile\zxr333p8h1.exe|7fada4fa157b7057
OriginalFileName
\REGISTRY\A\{15dc6f93-359a-d0b1-16b5-d614646c8f45}\Root\InventoryApplicationFile\zxr333p8h1.exe|7fada4fa157b7057
Publisher
\REGISTRY\A\{15dc6f93-359a-d0b1-16b5-d614646c8f45}\Root\InventoryApplicationFile\zxr333p8h1.exe|7fada4fa157b7057
Version
\REGISTRY\A\{15dc6f93-359a-d0b1-16b5-d614646c8f45}\Root\InventoryApplicationFile\zxr333p8h1.exe|7fada4fa157b7057
BinFileVersion
\REGISTRY\A\{15dc6f93-359a-d0b1-16b5-d614646c8f45}\Root\InventoryApplicationFile\zxr333p8h1.exe|7fada4fa157b7057
BinaryType
\REGISTRY\A\{15dc6f93-359a-d0b1-16b5-d614646c8f45}\Root\InventoryApplicationFile\zxr333p8h1.exe|7fada4fa157b7057
ProductName
\REGISTRY\A\{15dc6f93-359a-d0b1-16b5-d614646c8f45}\Root\InventoryApplicationFile\zxr333p8h1.exe|7fada4fa157b7057
ProductVersion
\REGISTRY\A\{15dc6f93-359a-d0b1-16b5-d614646c8f45}\Root\InventoryApplicationFile\zxr333p8h1.exe|7fada4fa157b7057
LinkDate
\REGISTRY\A\{15dc6f93-359a-d0b1-16b5-d614646c8f45}\Root\InventoryApplicationFile\zxr333p8h1.exe|7fada4fa157b7057
BinProductVersion
\REGISTRY\A\{15dc6f93-359a-d0b1-16b5-d614646c8f45}\Root\InventoryApplicationFile\zxr333p8h1.exe|7fada4fa157b7057
AppxPackageFullName
\REGISTRY\A\{15dc6f93-359a-d0b1-16b5-d614646c8f45}\Root\InventoryApplicationFile\zxr333p8h1.exe|7fada4fa157b7057
AppxPackageRelativeId
\REGISTRY\A\{15dc6f93-359a-d0b1-16b5-d614646c8f45}\Root\InventoryApplicationFile\zxr333p8h1.exe|7fada4fa157b7057
Size
\REGISTRY\A\{15dc6f93-359a-d0b1-16b5-d614646c8f45}\Root\InventoryApplicationFile\zxr333p8h1.exe|7fada4fa157b7057
Language
\REGISTRY\A\{15dc6f93-359a-d0b1-16b5-d614646c8f45}\Root\InventoryApplicationFile\zxr333p8h1.exe|7fada4fa157b7057
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00E25490A01
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
D22F0FE000
stack
page read and write
7FF788880000
unkown
page readonly
D22F3FF000
stack
page read and write
21B6EE00000
heap
page read and write
21B6EAE0000
heap
page read and write
21B6EB50000
heap
page read and write
21B6EB5C000
heap
page read and write
7FF788885000
unkown
page readonly
21B6EAC0000
heap
page read and write
D22F7FD000
stack
page read and write
7FF788880000
unkown
page readonly
21B6E9E0000
heap
page read and write
7FF788882000
unkown
page readonly
D22F6F8000
stack
page read and write
21B70860000
heap
page execute and read and write
D22F5FD000
stack
page read and write
21B6EC15000
heap
page read and write
D22F2FE000
stack
page read and write
7FF788882000
unkown
page readonly
7FF788885000
unkown
page readonly
7FF788881000
unkown
page execute read
21B6EC0D000
heap
page read and write
D22EFFE000
stack
page read and write
21B6EBD5000
heap
page read and write
D22EEFA000
stack
page read and write
21B6EBD1000
heap
page read and write
21B708B0000
heap
page execute and read and write
21B6EE05000
heap
page read and write
D22F1FE000
stack
page read and write
D22F4FF000
stack
page read and write
21B6EBF1000
heap
page read and write
7FF788881000
unkown
page execute read
There are 22 hidden memdumps, click here to show them.