IOC Report
GxEyLSwNqM.exe

loading gif

Files

File Path
Type
Category
Malicious
GxEyLSwNqM.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_GxEyLSwNqM.exe_1041c34d76924677d49cb6de8acc07f980121e_3b5bb763_310bd3f7-245a-4d39-809e-387c4041af05\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDC8D.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Aug 30 10:48:53 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD4A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD6A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\GxEyLSwNqM.exe
"C:\Users\user\Desktop\GxEyLSwNqM.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7992 -s 1096

URLs

Name
IP
Malicious
http://120.46.149.112:8888/safekey
120.46.149.112
http://120.46.149.112:8888/safekeyb
unknown
http://120.46.149.112:8888/safekeyr
unknown
http://upx.sf.net
unknown
http://120.46.149.112/
unknown
http://120.46.149.112:8888/safekeySj
unknown
http://120.46.149.112:8888/safekeyN
unknown

IPs

IP
Domain
Country
Malicious
120.46.149.112
unknown
China

Registry

Path
Value
Malicious
\REGISTRY\A\{5c3e3105-bf8e-9955-df23-ee9de5bd91ba}\Root\InventoryApplicationFile\gxeylswnqm.exe|c52b1e6350e3e445
ProgramId
\REGISTRY\A\{5c3e3105-bf8e-9955-df23-ee9de5bd91ba}\Root\InventoryApplicationFile\gxeylswnqm.exe|c52b1e6350e3e445
FileId
\REGISTRY\A\{5c3e3105-bf8e-9955-df23-ee9de5bd91ba}\Root\InventoryApplicationFile\gxeylswnqm.exe|c52b1e6350e3e445
LowerCaseLongPath
\REGISTRY\A\{5c3e3105-bf8e-9955-df23-ee9de5bd91ba}\Root\InventoryApplicationFile\gxeylswnqm.exe|c52b1e6350e3e445
LongPathHash
\REGISTRY\A\{5c3e3105-bf8e-9955-df23-ee9de5bd91ba}\Root\InventoryApplicationFile\gxeylswnqm.exe|c52b1e6350e3e445
Name
\REGISTRY\A\{5c3e3105-bf8e-9955-df23-ee9de5bd91ba}\Root\InventoryApplicationFile\gxeylswnqm.exe|c52b1e6350e3e445
OriginalFileName
\REGISTRY\A\{5c3e3105-bf8e-9955-df23-ee9de5bd91ba}\Root\InventoryApplicationFile\gxeylswnqm.exe|c52b1e6350e3e445
Publisher
\REGISTRY\A\{5c3e3105-bf8e-9955-df23-ee9de5bd91ba}\Root\InventoryApplicationFile\gxeylswnqm.exe|c52b1e6350e3e445
Version
\REGISTRY\A\{5c3e3105-bf8e-9955-df23-ee9de5bd91ba}\Root\InventoryApplicationFile\gxeylswnqm.exe|c52b1e6350e3e445
BinFileVersion
\REGISTRY\A\{5c3e3105-bf8e-9955-df23-ee9de5bd91ba}\Root\InventoryApplicationFile\gxeylswnqm.exe|c52b1e6350e3e445
BinaryType
\REGISTRY\A\{5c3e3105-bf8e-9955-df23-ee9de5bd91ba}\Root\InventoryApplicationFile\gxeylswnqm.exe|c52b1e6350e3e445
ProductName
\REGISTRY\A\{5c3e3105-bf8e-9955-df23-ee9de5bd91ba}\Root\InventoryApplicationFile\gxeylswnqm.exe|c52b1e6350e3e445
ProductVersion
\REGISTRY\A\{5c3e3105-bf8e-9955-df23-ee9de5bd91ba}\Root\InventoryApplicationFile\gxeylswnqm.exe|c52b1e6350e3e445
LinkDate
\REGISTRY\A\{5c3e3105-bf8e-9955-df23-ee9de5bd91ba}\Root\InventoryApplicationFile\gxeylswnqm.exe|c52b1e6350e3e445
BinProductVersion
\REGISTRY\A\{5c3e3105-bf8e-9955-df23-ee9de5bd91ba}\Root\InventoryApplicationFile\gxeylswnqm.exe|c52b1e6350e3e445
AppxPackageFullName
\REGISTRY\A\{5c3e3105-bf8e-9955-df23-ee9de5bd91ba}\Root\InventoryApplicationFile\gxeylswnqm.exe|c52b1e6350e3e445
AppxPackageRelativeId
\REGISTRY\A\{5c3e3105-bf8e-9955-df23-ee9de5bd91ba}\Root\InventoryApplicationFile\gxeylswnqm.exe|c52b1e6350e3e445
Size
\REGISTRY\A\{5c3e3105-bf8e-9955-df23-ee9de5bd91ba}\Root\InventoryApplicationFile\gxeylswnqm.exe|c52b1e6350e3e445
Language
\REGISTRY\A\{5c3e3105-bf8e-9955-df23-ee9de5bd91ba}\Root\InventoryApplicationFile\gxeylswnqm.exe|c52b1e6350e3e445
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B0B32F8000
stack
page read and write
20FB10B4000
heap
page read and write
20FB10F0000
heap
page read and write
20FB0FD0000
heap
page read and write
20FB10D5000
heap
page read and write
7FF7DF596000
unkown
page readonly
B0B2CFE000
stack
page read and write
7FF7DF593000
unkown
page readonly
7FF7DF591000
unkown
page execute read
7FF7DF593000
unkown
page readonly
B0B2BFD000
stack
page read and write
B0B2AFA000
stack
page read and write
B0B30FF000
stack
page read and write
20FB2E90000
heap
page execute and read and write
B0B2FFE000
stack
page read and write
20FB10FA000
heap
page read and write
7FF7DF591000
unkown
page execute read
B0B2EFE000
stack
page read and write
20FB12A5000
heap
page read and write
B0B31FD000
stack
page read and write
7FF7DF590000
unkown
page readonly
20FB1030000
heap
page read and write
7FF7DF590000
unkown
page readonly
B0B2DFE000
stack
page read and write
7FF7DF596000
unkown
page readonly
20FB103C000
heap
page read and write
20FB1036000
heap
page read and write
20FB10CE000
heap
page read and write
20FB12A0000
heap
page read and write
20FB0FF0000
heap
page read and write
B0B32FA000
stack
page read and write
20FB2EE0000
unkown
page execute and read and write
20FB0F40000
heap
page read and write
There are 23 hidden memdumps, click here to show them.