IOC Report
9EoFkvXzGq.exe

loading gif

Files

File Path
Type
Category
Malicious
9EoFkvXzGq.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_9EoFkvXzGq.exe_bfb44abac2a3a6a1d14af4ba1c869bff92d4726a_bcedf73e_39336587-2635-41db-b086-6000998df6f7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB62C.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Aug 30 10:54:25 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB6C9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB709.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\9EoFkvXzGq.exe
"C:\Users\user\Desktop\9EoFkvXzGq.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7256 -s 1096

URLs

Name
IP
Malicious
http://120.46.149.112:8888/safekey
120.46.149.112
http://upx.sf.net
unknown
http://120.46.149.112/
unknown
http://120.46.149.112:8888/safekeyTL
unknown
http://120.46.149.112:8888/safekeyMF
unknown
http://120.46.149.112:8888/safekeyQLv
unknown

IPs

IP
Domain
Country
Malicious
120.46.149.112
unknown
China

Registry

Path
Value
Malicious
\REGISTRY\A\{1a3de3f6-b29a-b1b4-a692-62fd08c025a6}\Root\InventoryApplicationFile\9eofkvxzgq.exe|fc62f0cf9c4c43bc
ProgramId
\REGISTRY\A\{1a3de3f6-b29a-b1b4-a692-62fd08c025a6}\Root\InventoryApplicationFile\9eofkvxzgq.exe|fc62f0cf9c4c43bc
FileId
\REGISTRY\A\{1a3de3f6-b29a-b1b4-a692-62fd08c025a6}\Root\InventoryApplicationFile\9eofkvxzgq.exe|fc62f0cf9c4c43bc
LowerCaseLongPath
\REGISTRY\A\{1a3de3f6-b29a-b1b4-a692-62fd08c025a6}\Root\InventoryApplicationFile\9eofkvxzgq.exe|fc62f0cf9c4c43bc
LongPathHash
\REGISTRY\A\{1a3de3f6-b29a-b1b4-a692-62fd08c025a6}\Root\InventoryApplicationFile\9eofkvxzgq.exe|fc62f0cf9c4c43bc
Name
\REGISTRY\A\{1a3de3f6-b29a-b1b4-a692-62fd08c025a6}\Root\InventoryApplicationFile\9eofkvxzgq.exe|fc62f0cf9c4c43bc
OriginalFileName
\REGISTRY\A\{1a3de3f6-b29a-b1b4-a692-62fd08c025a6}\Root\InventoryApplicationFile\9eofkvxzgq.exe|fc62f0cf9c4c43bc
Publisher
\REGISTRY\A\{1a3de3f6-b29a-b1b4-a692-62fd08c025a6}\Root\InventoryApplicationFile\9eofkvxzgq.exe|fc62f0cf9c4c43bc
Version
\REGISTRY\A\{1a3de3f6-b29a-b1b4-a692-62fd08c025a6}\Root\InventoryApplicationFile\9eofkvxzgq.exe|fc62f0cf9c4c43bc
BinFileVersion
\REGISTRY\A\{1a3de3f6-b29a-b1b4-a692-62fd08c025a6}\Root\InventoryApplicationFile\9eofkvxzgq.exe|fc62f0cf9c4c43bc
BinaryType
\REGISTRY\A\{1a3de3f6-b29a-b1b4-a692-62fd08c025a6}\Root\InventoryApplicationFile\9eofkvxzgq.exe|fc62f0cf9c4c43bc
ProductName
\REGISTRY\A\{1a3de3f6-b29a-b1b4-a692-62fd08c025a6}\Root\InventoryApplicationFile\9eofkvxzgq.exe|fc62f0cf9c4c43bc
ProductVersion
\REGISTRY\A\{1a3de3f6-b29a-b1b4-a692-62fd08c025a6}\Root\InventoryApplicationFile\9eofkvxzgq.exe|fc62f0cf9c4c43bc
LinkDate
\REGISTRY\A\{1a3de3f6-b29a-b1b4-a692-62fd08c025a6}\Root\InventoryApplicationFile\9eofkvxzgq.exe|fc62f0cf9c4c43bc
BinProductVersion
\REGISTRY\A\{1a3de3f6-b29a-b1b4-a692-62fd08c025a6}\Root\InventoryApplicationFile\9eofkvxzgq.exe|fc62f0cf9c4c43bc
AppxPackageFullName
\REGISTRY\A\{1a3de3f6-b29a-b1b4-a692-62fd08c025a6}\Root\InventoryApplicationFile\9eofkvxzgq.exe|fc62f0cf9c4c43bc
AppxPackageRelativeId
\REGISTRY\A\{1a3de3f6-b29a-b1b4-a692-62fd08c025a6}\Root\InventoryApplicationFile\9eofkvxzgq.exe|fc62f0cf9c4c43bc
Size
\REGISTRY\A\{1a3de3f6-b29a-b1b4-a692-62fd08c025a6}\Root\InventoryApplicationFile\9eofkvxzgq.exe|fc62f0cf9c4c43bc
Language
\REGISTRY\A\{1a3de3f6-b29a-b1b4-a692-62fd08c025a6}\Root\InventoryApplicationFile\9eofkvxzgq.exe|fc62f0cf9c4c43bc
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
253F7760000
heap
page read and write
72495FE000
stack
page read and write
253F7380000
heap
page read and write
253F75BF000
heap
page read and write
72497FD000
stack
page read and write
72491FD000
stack
page read and write
253F75F9000
heap
page read and write
7FF78C06A000
unkown
page readonly
72498FA000
stack
page read and write
253F7602000
heap
page read and write
72492FE000
stack
page read and write
253F7580000
heap
page read and write
253F75D9000
heap
page read and write
7FF78C061000
unkown
page execute read
253F7500000
heap
page read and write
253F7765000
heap
page read and write
253F7586000
heap
page read and write
7FF78C060000
unkown
page readonly
7FF78C062000
unkown
page readonly
72493FE000
stack
page read and write
7FF78C062000
unkown
page readonly
72498F8000
stack
page read and write
7FF78C06A000
unkown
page readonly
72496FF000
stack
page read and write
72490FA000
stack
page read and write
253F758C000
heap
page read and write
7FF78C060000
unkown
page readonly
72499FD000
stack
page read and write
7FF78C064000
unkown
page execute read
253F760C000
heap
page read and write
7FF78C061000
unkown
page execute read
72494FE000
stack
page read and write
253F74E0000
heap
page read and write
253F7594000
heap
page read and write
There are 24 hidden memdumps, click here to show them.