IOC Report
CKC6pZyjtH.exe

loading gif

Files

File Path
Type
Category
Malicious
CKC6pZyjtH.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_CKC6pZyjtH.exe_4db2fe3b4407049757773b20af787af682cfd_ddc56f46_817ec8b7-851b-476f-95aa-6a126bf1ee59\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER408B.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Aug 30 10:46:43 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4138.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4168.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\CKC6pZyjtH.exe
"C:\Users\user\Desktop\CKC6pZyjtH.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6992 -s 1116

URLs

Name
IP
Malicious
http://120.46.149.112:8888/safekey
120.46.149.112
http://120.46.149.112:8888/safekeyB
unknown
http://upx.sf.net
unknown
http://120.46.149.112/
unknown
http://120.46.149.112:8888/safekeya
unknown
http://120.46.149.112:8888/safekeybrQ
unknown
http://120.46.149.112:8888/safekey;
unknown
http://120.46.149.112:8888/safekeynamic
unknown
http://120.46.149.112:8888/safekeyX
unknown

IPs

IP
Domain
Country
Malicious
120.46.149.112
unknown
China

Registry

Path
Value
Malicious
\REGISTRY\A\{256f607a-acf2-39e2-9399-7ddb78dda4ad}\Root\InventoryApplicationFile\ckc6pzyjth.exe|3d3e784d59e6e17a
ProgramId
\REGISTRY\A\{256f607a-acf2-39e2-9399-7ddb78dda4ad}\Root\InventoryApplicationFile\ckc6pzyjth.exe|3d3e784d59e6e17a
FileId
\REGISTRY\A\{256f607a-acf2-39e2-9399-7ddb78dda4ad}\Root\InventoryApplicationFile\ckc6pzyjth.exe|3d3e784d59e6e17a
LowerCaseLongPath
\REGISTRY\A\{256f607a-acf2-39e2-9399-7ddb78dda4ad}\Root\InventoryApplicationFile\ckc6pzyjth.exe|3d3e784d59e6e17a
LongPathHash
\REGISTRY\A\{256f607a-acf2-39e2-9399-7ddb78dda4ad}\Root\InventoryApplicationFile\ckc6pzyjth.exe|3d3e784d59e6e17a
Name
\REGISTRY\A\{256f607a-acf2-39e2-9399-7ddb78dda4ad}\Root\InventoryApplicationFile\ckc6pzyjth.exe|3d3e784d59e6e17a
OriginalFileName
\REGISTRY\A\{256f607a-acf2-39e2-9399-7ddb78dda4ad}\Root\InventoryApplicationFile\ckc6pzyjth.exe|3d3e784d59e6e17a
Publisher
\REGISTRY\A\{256f607a-acf2-39e2-9399-7ddb78dda4ad}\Root\InventoryApplicationFile\ckc6pzyjth.exe|3d3e784d59e6e17a
Version
\REGISTRY\A\{256f607a-acf2-39e2-9399-7ddb78dda4ad}\Root\InventoryApplicationFile\ckc6pzyjth.exe|3d3e784d59e6e17a
BinFileVersion
\REGISTRY\A\{256f607a-acf2-39e2-9399-7ddb78dda4ad}\Root\InventoryApplicationFile\ckc6pzyjth.exe|3d3e784d59e6e17a
BinaryType
\REGISTRY\A\{256f607a-acf2-39e2-9399-7ddb78dda4ad}\Root\InventoryApplicationFile\ckc6pzyjth.exe|3d3e784d59e6e17a
ProductName
\REGISTRY\A\{256f607a-acf2-39e2-9399-7ddb78dda4ad}\Root\InventoryApplicationFile\ckc6pzyjth.exe|3d3e784d59e6e17a
ProductVersion
\REGISTRY\A\{256f607a-acf2-39e2-9399-7ddb78dda4ad}\Root\InventoryApplicationFile\ckc6pzyjth.exe|3d3e784d59e6e17a
LinkDate
\REGISTRY\A\{256f607a-acf2-39e2-9399-7ddb78dda4ad}\Root\InventoryApplicationFile\ckc6pzyjth.exe|3d3e784d59e6e17a
BinProductVersion
\REGISTRY\A\{256f607a-acf2-39e2-9399-7ddb78dda4ad}\Root\InventoryApplicationFile\ckc6pzyjth.exe|3d3e784d59e6e17a
AppxPackageFullName
\REGISTRY\A\{256f607a-acf2-39e2-9399-7ddb78dda4ad}\Root\InventoryApplicationFile\ckc6pzyjth.exe|3d3e784d59e6e17a
AppxPackageRelativeId
\REGISTRY\A\{256f607a-acf2-39e2-9399-7ddb78dda4ad}\Root\InventoryApplicationFile\ckc6pzyjth.exe|3d3e784d59e6e17a
Size
\REGISTRY\A\{256f607a-acf2-39e2-9399-7ddb78dda4ad}\Root\InventoryApplicationFile\ckc6pzyjth.exe|3d3e784d59e6e17a
Language
\REGISTRY\A\{256f607a-acf2-39e2-9399-7ddb78dda4ad}\Root\InventoryApplicationFile\ckc6pzyjth.exe|3d3e784d59e6e17a
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF6EC472000
unkown
page readonly
1E4408D9000
heap
page read and write
7FF6EC475000
unkown
page readonly
1E440904000
heap
page read and write
2DE4EFD000
stack
page read and write
1E440A10000
heap
page read and write
2DE46FA000
stack
page read and write
2DE4CFF000
stack
page read and write
1E4408DD000
heap
page read and write
1E440AB5000
heap
page read and write
2DE4FFF000
stack
page read and write
7FF6EC472000
unkown
page readonly
2DE4BFE000
stack
page read and write
7FF6EC471000
unkown
page execute read
1E442670000
heap
page execute and read and write
1E442620000
heap
page execute and read and write
2DE4AFE000
stack
page read and write
7FF6EC471000
unkown
page execute read
1E44084C000
heap
page read and write
2DE49FF000
stack
page read and write
2DE4DF8000
stack
page read and write
2DE47FD000
stack
page read and write
1E440830000
heap
page read and write
1E4408C1000
heap
page read and write
2DE48FE000
stack
page read and write
7FF6EC475000
unkown
page readonly
1E440A30000
heap
page read and write
1E4408FC000
heap
page read and write
7FF6EC470000
unkown
page readonly
7FF6EC470000
unkown
page readonly
1E44090B000
heap
page read and write
1E440840000
heap
page read and write
1E440AB0000
heap
page read and write
There are 23 hidden memdumps, click here to show them.