IOC Report
lApMYpXACB.exe

loading gif

Files

File Path
Type
Category
Malicious
lApMYpXACB.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_lApMYpXACB.exe_3b254f2d213ebcfb26dee9e62fecff4317ef7935_d79dcfe3_5c24a137-c0ad-436c-8948-e234cd864edf\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA324.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Aug 30 10:43:44 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA3C1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA400.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\lApMYpXACB.exe
"C:\Users\user\Desktop\lApMYpXACB.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4476 -s 1120

URLs

Name
IP
Malicious
http://120.46.149.112:8888/safekey
120.46.149.112
http://120.46.149.112:8888/safekeyc
unknown
http://upx.sf.net
unknown
http://120.46.149.112/
unknown
http://120.46.149.112:8888/safekey?
unknown
http://120.46.149.112:8888/safekeye1
unknown

IPs

IP
Domain
Country
Malicious
120.46.149.112
unknown
China

Registry

Path
Value
Malicious
\REGISTRY\A\{780affcb-1718-67d4-5d4c-189086d06d37}\Root\InventoryApplicationFile\lapmypxacb.exe|5f9e71ffca8faa9c
ProgramId
\REGISTRY\A\{780affcb-1718-67d4-5d4c-189086d06d37}\Root\InventoryApplicationFile\lapmypxacb.exe|5f9e71ffca8faa9c
FileId
\REGISTRY\A\{780affcb-1718-67d4-5d4c-189086d06d37}\Root\InventoryApplicationFile\lapmypxacb.exe|5f9e71ffca8faa9c
LowerCaseLongPath
\REGISTRY\A\{780affcb-1718-67d4-5d4c-189086d06d37}\Root\InventoryApplicationFile\lapmypxacb.exe|5f9e71ffca8faa9c
LongPathHash
\REGISTRY\A\{780affcb-1718-67d4-5d4c-189086d06d37}\Root\InventoryApplicationFile\lapmypxacb.exe|5f9e71ffca8faa9c
Name
\REGISTRY\A\{780affcb-1718-67d4-5d4c-189086d06d37}\Root\InventoryApplicationFile\lapmypxacb.exe|5f9e71ffca8faa9c
OriginalFileName
\REGISTRY\A\{780affcb-1718-67d4-5d4c-189086d06d37}\Root\InventoryApplicationFile\lapmypxacb.exe|5f9e71ffca8faa9c
Publisher
\REGISTRY\A\{780affcb-1718-67d4-5d4c-189086d06d37}\Root\InventoryApplicationFile\lapmypxacb.exe|5f9e71ffca8faa9c
Version
\REGISTRY\A\{780affcb-1718-67d4-5d4c-189086d06d37}\Root\InventoryApplicationFile\lapmypxacb.exe|5f9e71ffca8faa9c
BinFileVersion
\REGISTRY\A\{780affcb-1718-67d4-5d4c-189086d06d37}\Root\InventoryApplicationFile\lapmypxacb.exe|5f9e71ffca8faa9c
BinaryType
\REGISTRY\A\{780affcb-1718-67d4-5d4c-189086d06d37}\Root\InventoryApplicationFile\lapmypxacb.exe|5f9e71ffca8faa9c
ProductName
\REGISTRY\A\{780affcb-1718-67d4-5d4c-189086d06d37}\Root\InventoryApplicationFile\lapmypxacb.exe|5f9e71ffca8faa9c
ProductVersion
\REGISTRY\A\{780affcb-1718-67d4-5d4c-189086d06d37}\Root\InventoryApplicationFile\lapmypxacb.exe|5f9e71ffca8faa9c
LinkDate
\REGISTRY\A\{780affcb-1718-67d4-5d4c-189086d06d37}\Root\InventoryApplicationFile\lapmypxacb.exe|5f9e71ffca8faa9c
BinProductVersion
\REGISTRY\A\{780affcb-1718-67d4-5d4c-189086d06d37}\Root\InventoryApplicationFile\lapmypxacb.exe|5f9e71ffca8faa9c
AppxPackageFullName
\REGISTRY\A\{780affcb-1718-67d4-5d4c-189086d06d37}\Root\InventoryApplicationFile\lapmypxacb.exe|5f9e71ffca8faa9c
AppxPackageRelativeId
\REGISTRY\A\{780affcb-1718-67d4-5d4c-189086d06d37}\Root\InventoryApplicationFile\lapmypxacb.exe|5f9e71ffca8faa9c
Size
\REGISTRY\A\{780affcb-1718-67d4-5d4c-189086d06d37}\Root\InventoryApplicationFile\lapmypxacb.exe|5f9e71ffca8faa9c
Language
\REGISTRY\A\{780affcb-1718-67d4-5d4c-189086d06d37}\Root\InventoryApplicationFile\lapmypxacb.exe|5f9e71ffca8faa9c
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF6D4DB0000
unkown
page readonly
2580CFE000
stack
page read and write
2580AFE000
stack
page read and write
19AC8CA1000
heap
page read and write
19AC8DF0000
heap
page read and write
25809FF000
stack
page read and write
25808FD000
stack
page read and write
19AC8C2B000
heap
page read and write
19AC8C7B000
heap
page read and write
7FF6D4DB0000
unkown
page readonly
19AC8E30000
heap
page read and write
25805FA000
stack
page read and write
2580FF8000
stack
page read and write
19AC8C9A000
heap
page read and write
19AC8C00000
heap
page read and write
2580FFA000
stack
page read and write
2580DFE000
stack
page read and write
7FF6D4DB2000
unkown
page readonly
7FF6D4DB1000
unkown
page execute read
7FF6D4DB3000
unkown
page execute read
7FF6D4DB2000
unkown
page readonly
7FF6D4DB1000
unkown
page execute read
2580BFE000
stack
page read and write
7FF6D4DB9000
unkown
page readonly
19AC8C20000
heap
page read and write
19AC8E35000
heap
page read and write
2580EFD000
stack
page read and write
7FF6D4DB9000
unkown
page readonly
19AC8C80000
heap
page read and write
19AC8E10000
heap
page read and write
There are 20 hidden memdumps, click here to show them.