IOC Report
EI1Hc80wNB.exe

loading gif

Files

File Path
Type
Category
Malicious
EI1Hc80wNB.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_EI1Hc80wNB.exe_3416ea934612db8642f1a07c817ab6e34b35f6_cc125bad_3214f767-1679-4c53-84c1-6eaa4cc5c6e7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAD85.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Aug 30 10:48:34 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAE70.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAEAF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\EI1Hc80wNB.exe
"C:\Users\user\Desktop\EI1Hc80wNB.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6528 -s 1104

URLs

Name
IP
Malicious
http://120.46.149.112:8888/safekey
120.46.149.112
http://120.46.149.112:8888/safekeyw9
unknown
http://120.46.149.112/~
unknown
http://upx.sf.net
unknown
http://120.46.149.112/
unknown
http://120.46.149.112:8888/safekey:
unknown
http://120.46.149.112:8888/safekeyez9
unknown
http://120.46.149.112:8888/safekey6
unknown

IPs

IP
Domain
Country
Malicious
120.46.149.112
unknown
China

Registry

Path
Value
Malicious
\REGISTRY\A\{a0063d3e-abc6-e0cf-bfe7-4670637ae484}\Root\InventoryApplicationFile\ei1hc80wnb.exe|4c19bb66fd6efd45
ProgramId
\REGISTRY\A\{a0063d3e-abc6-e0cf-bfe7-4670637ae484}\Root\InventoryApplicationFile\ei1hc80wnb.exe|4c19bb66fd6efd45
FileId
\REGISTRY\A\{a0063d3e-abc6-e0cf-bfe7-4670637ae484}\Root\InventoryApplicationFile\ei1hc80wnb.exe|4c19bb66fd6efd45
LowerCaseLongPath
\REGISTRY\A\{a0063d3e-abc6-e0cf-bfe7-4670637ae484}\Root\InventoryApplicationFile\ei1hc80wnb.exe|4c19bb66fd6efd45
LongPathHash
\REGISTRY\A\{a0063d3e-abc6-e0cf-bfe7-4670637ae484}\Root\InventoryApplicationFile\ei1hc80wnb.exe|4c19bb66fd6efd45
Name
\REGISTRY\A\{a0063d3e-abc6-e0cf-bfe7-4670637ae484}\Root\InventoryApplicationFile\ei1hc80wnb.exe|4c19bb66fd6efd45
OriginalFileName
\REGISTRY\A\{a0063d3e-abc6-e0cf-bfe7-4670637ae484}\Root\InventoryApplicationFile\ei1hc80wnb.exe|4c19bb66fd6efd45
Publisher
\REGISTRY\A\{a0063d3e-abc6-e0cf-bfe7-4670637ae484}\Root\InventoryApplicationFile\ei1hc80wnb.exe|4c19bb66fd6efd45
Version
\REGISTRY\A\{a0063d3e-abc6-e0cf-bfe7-4670637ae484}\Root\InventoryApplicationFile\ei1hc80wnb.exe|4c19bb66fd6efd45
BinFileVersion
\REGISTRY\A\{a0063d3e-abc6-e0cf-bfe7-4670637ae484}\Root\InventoryApplicationFile\ei1hc80wnb.exe|4c19bb66fd6efd45
BinaryType
\REGISTRY\A\{a0063d3e-abc6-e0cf-bfe7-4670637ae484}\Root\InventoryApplicationFile\ei1hc80wnb.exe|4c19bb66fd6efd45
ProductName
\REGISTRY\A\{a0063d3e-abc6-e0cf-bfe7-4670637ae484}\Root\InventoryApplicationFile\ei1hc80wnb.exe|4c19bb66fd6efd45
ProductVersion
\REGISTRY\A\{a0063d3e-abc6-e0cf-bfe7-4670637ae484}\Root\InventoryApplicationFile\ei1hc80wnb.exe|4c19bb66fd6efd45
LinkDate
\REGISTRY\A\{a0063d3e-abc6-e0cf-bfe7-4670637ae484}\Root\InventoryApplicationFile\ei1hc80wnb.exe|4c19bb66fd6efd45
BinProductVersion
\REGISTRY\A\{a0063d3e-abc6-e0cf-bfe7-4670637ae484}\Root\InventoryApplicationFile\ei1hc80wnb.exe|4c19bb66fd6efd45
AppxPackageFullName
\REGISTRY\A\{a0063d3e-abc6-e0cf-bfe7-4670637ae484}\Root\InventoryApplicationFile\ei1hc80wnb.exe|4c19bb66fd6efd45
AppxPackageRelativeId
\REGISTRY\A\{a0063d3e-abc6-e0cf-bfe7-4670637ae484}\Root\InventoryApplicationFile\ei1hc80wnb.exe|4c19bb66fd6efd45
Size
\REGISTRY\A\{a0063d3e-abc6-e0cf-bfe7-4670637ae484}\Root\InventoryApplicationFile\ei1hc80wnb.exe|4c19bb66fd6efd45
Language
\REGISTRY\A\{a0063d3e-abc6-e0cf-bfe7-4670637ae484}\Root\InventoryApplicationFile\ei1hc80wnb.exe|4c19bb66fd6efd45
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6EFC4FE000
stack
page read and write
2221345B000
heap
page read and write
6EFC5FE000
stack
page read and write
22213570000
heap
page read and write
6EFC3FE000
stack
page read and write
7FF6AF694000
unkown
page readonly
6EFC6FD000
stack
page read and write
6EFC7F8000
stack
page read and write
6EFC0FE000
stack
page read and write
22213360000
heap
page read and write
7FF6AF691000
unkown
page execute read
7FF6AF692000
unkown
page readonly
22213450000
heap
page read and write
22213550000
heap
page read and write
6EFBFFE000
stack
page read and write
6EFC1FE000
stack
page read and write
222134F0000
heap
page read and write
222134D4000
heap
page read and write
22213655000
heap
page read and write
7FF6AF691000
unkown
page execute read
6EFC2FF000
stack
page read and write
222151D0000
heap
page execute and read and write
7FF6AF690000
unkown
page readonly
222134AD000
heap
page read and write
2221350D000
heap
page read and write
7FF6AF692000
unkown
page readonly
22213517000
heap
page read and write
7FF6AF694000
unkown
page readonly
7FF6AF690000
unkown
page readonly
6EFBEFA000
stack
page read and write
22213650000
heap
page read and write
22215180000
heap
page execute and read and write
There are 22 hidden memdumps, click here to show them.