IOC Report
fEsB3ftQ3t.exe

loading gif

Files

File Path
Type
Category
Malicious
fEsB3ftQ3t.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fEsB3ftQ3t.exe_821da26d7bb67e36be2aa1dad6f494664403593_940941c1_ae27faad-c13a-42db-99c0-ecb556b50524\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC1DC.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Aug 30 10:43:40 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC2A8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC2E7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\fEsB3ftQ3t.exe
"C:\Users\user\Desktop\fEsB3ftQ3t.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4836 -s 1076

URLs

Name
IP
Malicious
http://120.46.149.112:8888/safekey
120.46.149.112
http://upx.sf.net
unknown
http://120.46.149.112/
unknown
http://120.46.149.112:8888/safekey.
unknown
http://120.46.149.112:8888/safekeyL
unknown
http://120.46.149.112:8888/safekeyk
unknown

IPs

IP
Domain
Country
Malicious
120.46.149.112
unknown
China

Registry

Path
Value
Malicious
\REGISTRY\A\{f17936c1-63eb-259d-7898-805d07e4d6f8}\Root\InventoryApplicationFile\fesb3ftq3t.exe|135b9e6b6649f991
ProgramId
\REGISTRY\A\{f17936c1-63eb-259d-7898-805d07e4d6f8}\Root\InventoryApplicationFile\fesb3ftq3t.exe|135b9e6b6649f991
FileId
\REGISTRY\A\{f17936c1-63eb-259d-7898-805d07e4d6f8}\Root\InventoryApplicationFile\fesb3ftq3t.exe|135b9e6b6649f991
LowerCaseLongPath
\REGISTRY\A\{f17936c1-63eb-259d-7898-805d07e4d6f8}\Root\InventoryApplicationFile\fesb3ftq3t.exe|135b9e6b6649f991
LongPathHash
\REGISTRY\A\{f17936c1-63eb-259d-7898-805d07e4d6f8}\Root\InventoryApplicationFile\fesb3ftq3t.exe|135b9e6b6649f991
Name
\REGISTRY\A\{f17936c1-63eb-259d-7898-805d07e4d6f8}\Root\InventoryApplicationFile\fesb3ftq3t.exe|135b9e6b6649f991
OriginalFileName
\REGISTRY\A\{f17936c1-63eb-259d-7898-805d07e4d6f8}\Root\InventoryApplicationFile\fesb3ftq3t.exe|135b9e6b6649f991
Publisher
\REGISTRY\A\{f17936c1-63eb-259d-7898-805d07e4d6f8}\Root\InventoryApplicationFile\fesb3ftq3t.exe|135b9e6b6649f991
Version
\REGISTRY\A\{f17936c1-63eb-259d-7898-805d07e4d6f8}\Root\InventoryApplicationFile\fesb3ftq3t.exe|135b9e6b6649f991
BinFileVersion
\REGISTRY\A\{f17936c1-63eb-259d-7898-805d07e4d6f8}\Root\InventoryApplicationFile\fesb3ftq3t.exe|135b9e6b6649f991
BinaryType
\REGISTRY\A\{f17936c1-63eb-259d-7898-805d07e4d6f8}\Root\InventoryApplicationFile\fesb3ftq3t.exe|135b9e6b6649f991
ProductName
\REGISTRY\A\{f17936c1-63eb-259d-7898-805d07e4d6f8}\Root\InventoryApplicationFile\fesb3ftq3t.exe|135b9e6b6649f991
ProductVersion
\REGISTRY\A\{f17936c1-63eb-259d-7898-805d07e4d6f8}\Root\InventoryApplicationFile\fesb3ftq3t.exe|135b9e6b6649f991
LinkDate
\REGISTRY\A\{f17936c1-63eb-259d-7898-805d07e4d6f8}\Root\InventoryApplicationFile\fesb3ftq3t.exe|135b9e6b6649f991
BinProductVersion
\REGISTRY\A\{f17936c1-63eb-259d-7898-805d07e4d6f8}\Root\InventoryApplicationFile\fesb3ftq3t.exe|135b9e6b6649f991
AppxPackageFullName
\REGISTRY\A\{f17936c1-63eb-259d-7898-805d07e4d6f8}\Root\InventoryApplicationFile\fesb3ftq3t.exe|135b9e6b6649f991
AppxPackageRelativeId
\REGISTRY\A\{f17936c1-63eb-259d-7898-805d07e4d6f8}\Root\InventoryApplicationFile\fesb3ftq3t.exe|135b9e6b6649f991
Size
\REGISTRY\A\{f17936c1-63eb-259d-7898-805d07e4d6f8}\Root\InventoryApplicationFile\fesb3ftq3t.exe|135b9e6b6649f991
Language
\REGISTRY\A\{f17936c1-63eb-259d-7898-805d07e4d6f8}\Root\InventoryApplicationFile\fesb3ftq3t.exe|135b9e6b6649f991
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF6D3B3A000
unkown
page readonly
7FF6D3B30000
unkown
page readonly
7FF6D3B30000
unkown
page readonly
210586F0000
heap
page read and write
D8755F8000
stack
page read and write
7FF6D3B3A000
unkown
page readonly
21058A85000
heap
page read and write
21058719000
heap
page read and write
2105877E000
heap
page read and write
21058A80000
heap
page read and write
7FF6D3B34000
unkown
page execute read
D874EFE000
stack
page read and write
2105871C000
heap
page read and write
D874BFA000
stack
page read and write
D8754FD000
stack
page read and write
D8751FE000
stack
page read and write
7FF6D3B31000
unkown
page execute read
210586C0000
heap
page read and write
210586D0000
heap
page read and write
7FF6D3B32000
unkown
page readonly
D8750FF000
stack
page read and write
21058710000
heap
page read and write
2105878F000
heap
page read and write
21058769000
heap
page read and write
7FF6D3B32000
unkown
page readonly
D8752FE000
stack
page read and write
D8757FD000
stack
page read and write
D8756FD000
stack
page read and write
21058797000
heap
page read and write
D874FFE000
stack
page read and write
7FF6D3B31000
unkown
page execute read
D8753FE000
stack
page read and write
There are 22 hidden memdumps, click here to show them.