IOC Report
4sRugP90qT.exe

loading gif

Files

File Path
Type
Category
Malicious
4sRugP90qT.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_4sRugP90qT.exe_519c860c06b23521d7d6d40b34b8c4ad6c4c43d_2fcf0bd8_f2076af9-5fc6-4071-b006-b8a7d2c804be\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF4C8.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Aug 30 10:54:28 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF5F2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF612.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\4sRugP90qT.exe
"C:\Users\user\Desktop\4sRugP90qT.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7136 -s 1084

URLs

Name
IP
Malicious
http://120.46.149.112:8888/safekey
120.46.149.112
http://120.46.149.112:8888/safekeyjm
unknown
http://120.46.149.112:8888/safekey(m
unknown
http://upx.sf.net
unknown
http://120.46.149.112/UT
unknown
http://120.46.149.112:8888/safekeyrp
unknown
http://120.46.149.112:8888/safekey1p
unknown

IPs

IP
Domain
Country
Malicious
120.46.149.112
unknown
China

Registry

Path
Value
Malicious
\REGISTRY\A\{fc8f882e-a90f-a695-a4de-03333d1484ed}\Root\InventoryApplicationFile\4srugp90qt.exe|bafb374b2af4409f
ProgramId
\REGISTRY\A\{fc8f882e-a90f-a695-a4de-03333d1484ed}\Root\InventoryApplicationFile\4srugp90qt.exe|bafb374b2af4409f
FileId
\REGISTRY\A\{fc8f882e-a90f-a695-a4de-03333d1484ed}\Root\InventoryApplicationFile\4srugp90qt.exe|bafb374b2af4409f
LowerCaseLongPath
\REGISTRY\A\{fc8f882e-a90f-a695-a4de-03333d1484ed}\Root\InventoryApplicationFile\4srugp90qt.exe|bafb374b2af4409f
LongPathHash
\REGISTRY\A\{fc8f882e-a90f-a695-a4de-03333d1484ed}\Root\InventoryApplicationFile\4srugp90qt.exe|bafb374b2af4409f
Name
\REGISTRY\A\{fc8f882e-a90f-a695-a4de-03333d1484ed}\Root\InventoryApplicationFile\4srugp90qt.exe|bafb374b2af4409f
OriginalFileName
\REGISTRY\A\{fc8f882e-a90f-a695-a4de-03333d1484ed}\Root\InventoryApplicationFile\4srugp90qt.exe|bafb374b2af4409f
Publisher
\REGISTRY\A\{fc8f882e-a90f-a695-a4de-03333d1484ed}\Root\InventoryApplicationFile\4srugp90qt.exe|bafb374b2af4409f
Version
\REGISTRY\A\{fc8f882e-a90f-a695-a4de-03333d1484ed}\Root\InventoryApplicationFile\4srugp90qt.exe|bafb374b2af4409f
BinFileVersion
\REGISTRY\A\{fc8f882e-a90f-a695-a4de-03333d1484ed}\Root\InventoryApplicationFile\4srugp90qt.exe|bafb374b2af4409f
BinaryType
\REGISTRY\A\{fc8f882e-a90f-a695-a4de-03333d1484ed}\Root\InventoryApplicationFile\4srugp90qt.exe|bafb374b2af4409f
ProductName
\REGISTRY\A\{fc8f882e-a90f-a695-a4de-03333d1484ed}\Root\InventoryApplicationFile\4srugp90qt.exe|bafb374b2af4409f
ProductVersion
\REGISTRY\A\{fc8f882e-a90f-a695-a4de-03333d1484ed}\Root\InventoryApplicationFile\4srugp90qt.exe|bafb374b2af4409f
LinkDate
\REGISTRY\A\{fc8f882e-a90f-a695-a4de-03333d1484ed}\Root\InventoryApplicationFile\4srugp90qt.exe|bafb374b2af4409f
BinProductVersion
\REGISTRY\A\{fc8f882e-a90f-a695-a4de-03333d1484ed}\Root\InventoryApplicationFile\4srugp90qt.exe|bafb374b2af4409f
AppxPackageFullName
\REGISTRY\A\{fc8f882e-a90f-a695-a4de-03333d1484ed}\Root\InventoryApplicationFile\4srugp90qt.exe|bafb374b2af4409f
AppxPackageRelativeId
\REGISTRY\A\{fc8f882e-a90f-a695-a4de-03333d1484ed}\Root\InventoryApplicationFile\4srugp90qt.exe|bafb374b2af4409f
Size
\REGISTRY\A\{fc8f882e-a90f-a695-a4de-03333d1484ed}\Root\InventoryApplicationFile\4srugp90qt.exe|bafb374b2af4409f
Language
\REGISTRY\A\{fc8f882e-a90f-a695-a4de-03333d1484ed}\Root\InventoryApplicationFile\4srugp90qt.exe|bafb374b2af4409f
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF6A5EF9000
unkown
page readonly
C0E43FF000
stack
page read and write
C0E44FE000
stack
page read and write
1C95DF60000
heap
page read and write
1C95E130000
heap
page read and write
C0E46FD000
stack
page read and write
1C95DF30000
heap
page read and write
C0E47F8000
stack
page read and write
7FF6A5EF2000
unkown
page readonly
1C95DFDB000
heap
page read and write
C0E40FD000
stack
page read and write
1C95DF9D000
heap
page read and write
7FF6A5EF9000
unkown
page readonly
7FF6A5EF0000
unkown
page readonly
C0E3D9A000
stack
page read and write
7FF6A5EF2000
unkown
page readonly
1C95DF6C000
heap
page read and write
7FF6A5EF0000
unkown
page readonly
1C95E250000
heap
page read and write
1C95DFBA000
heap
page read and write
1C95DFC0000
heap
page read and write
C0E48FD000
stack
page read and write
7FF6A5EF1000
unkown
page execute read
1C95DFE3000
heap
page read and write
1C95DF40000
heap
page read and write
7FF6A5EF1000
unkown
page execute read
C0E45FE000
stack
page read and write
C0E41FE000
stack
page read and write
C0E42FE000
stack
page read and write
1C95DFB6000
heap
page read and write
1C95E255000
heap
page read and write
There are 21 hidden memdumps, click here to show them.