IOC Report
r67EeWwi9R.exe

loading gif

Files

File Path
Type
Category
Malicious
r67EeWwi9R.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_r67EeWwi9R.exe_76b3c0f35cdaf9701ee164f1d1c253a4d235e94d_ac731dc0_f4eb6921-42a6-4556-a7da-1537245e5024\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF2F7.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Aug 30 10:54:04 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF3D3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF403.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\r67EeWwi9R.exe
"C:\Users\user\Desktop\r67EeWwi9R.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5040 -s 1116

URLs

Name
IP
Malicious
http://120.46.149.112:8888/safekey
120.46.149.112
http://120.46.149.112:8888/safekey4
unknown
http://120.46.149.112:8888/safekeyt
unknown
http://upx.sf.net
unknown
http://120.46.149.112/x
unknown
http://120.46.149.112:8888/safekey/
unknown
http://120.46.149.112:8888/safekeyi
unknown

IPs

IP
Domain
Country
Malicious
120.46.149.112
unknown
China

Registry

Path
Value
Malicious
\REGISTRY\A\{0aed7b90-8801-9259-32dc-ec5cb8ce2f6d}\Root\InventoryApplicationFile\r67eewwi9r.exe|a6c8520d86be30c6
ProgramId
\REGISTRY\A\{0aed7b90-8801-9259-32dc-ec5cb8ce2f6d}\Root\InventoryApplicationFile\r67eewwi9r.exe|a6c8520d86be30c6
FileId
\REGISTRY\A\{0aed7b90-8801-9259-32dc-ec5cb8ce2f6d}\Root\InventoryApplicationFile\r67eewwi9r.exe|a6c8520d86be30c6
LowerCaseLongPath
\REGISTRY\A\{0aed7b90-8801-9259-32dc-ec5cb8ce2f6d}\Root\InventoryApplicationFile\r67eewwi9r.exe|a6c8520d86be30c6
LongPathHash
\REGISTRY\A\{0aed7b90-8801-9259-32dc-ec5cb8ce2f6d}\Root\InventoryApplicationFile\r67eewwi9r.exe|a6c8520d86be30c6
Name
\REGISTRY\A\{0aed7b90-8801-9259-32dc-ec5cb8ce2f6d}\Root\InventoryApplicationFile\r67eewwi9r.exe|a6c8520d86be30c6
OriginalFileName
\REGISTRY\A\{0aed7b90-8801-9259-32dc-ec5cb8ce2f6d}\Root\InventoryApplicationFile\r67eewwi9r.exe|a6c8520d86be30c6
Publisher
\REGISTRY\A\{0aed7b90-8801-9259-32dc-ec5cb8ce2f6d}\Root\InventoryApplicationFile\r67eewwi9r.exe|a6c8520d86be30c6
Version
\REGISTRY\A\{0aed7b90-8801-9259-32dc-ec5cb8ce2f6d}\Root\InventoryApplicationFile\r67eewwi9r.exe|a6c8520d86be30c6
BinFileVersion
\REGISTRY\A\{0aed7b90-8801-9259-32dc-ec5cb8ce2f6d}\Root\InventoryApplicationFile\r67eewwi9r.exe|a6c8520d86be30c6
BinaryType
\REGISTRY\A\{0aed7b90-8801-9259-32dc-ec5cb8ce2f6d}\Root\InventoryApplicationFile\r67eewwi9r.exe|a6c8520d86be30c6
ProductName
\REGISTRY\A\{0aed7b90-8801-9259-32dc-ec5cb8ce2f6d}\Root\InventoryApplicationFile\r67eewwi9r.exe|a6c8520d86be30c6
ProductVersion
\REGISTRY\A\{0aed7b90-8801-9259-32dc-ec5cb8ce2f6d}\Root\InventoryApplicationFile\r67eewwi9r.exe|a6c8520d86be30c6
LinkDate
\REGISTRY\A\{0aed7b90-8801-9259-32dc-ec5cb8ce2f6d}\Root\InventoryApplicationFile\r67eewwi9r.exe|a6c8520d86be30c6
BinProductVersion
\REGISTRY\A\{0aed7b90-8801-9259-32dc-ec5cb8ce2f6d}\Root\InventoryApplicationFile\r67eewwi9r.exe|a6c8520d86be30c6
AppxPackageFullName
\REGISTRY\A\{0aed7b90-8801-9259-32dc-ec5cb8ce2f6d}\Root\InventoryApplicationFile\r67eewwi9r.exe|a6c8520d86be30c6
AppxPackageRelativeId
\REGISTRY\A\{0aed7b90-8801-9259-32dc-ec5cb8ce2f6d}\Root\InventoryApplicationFile\r67eewwi9r.exe|a6c8520d86be30c6
Size
\REGISTRY\A\{0aed7b90-8801-9259-32dc-ec5cb8ce2f6d}\Root\InventoryApplicationFile\r67eewwi9r.exe|a6c8520d86be30c6
Language
\REGISTRY\A\{0aed7b90-8801-9259-32dc-ec5cb8ce2f6d}\Root\InventoryApplicationFile\r67eewwi9r.exe|a6c8520d86be30c6
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
20E4A8BE000
heap
page read and write
20E4A780000
heap
page read and write
7FF719C54000
unkown
page readonly
20E4A7C0000
heap
page read and write
7FF719C52000
unkown
page readonly
EED97FD000
stack
page read and write
7FF719C54000
unkown
page readonly
EED93FF000
stack
page read and write
20E4C600000
heap
page execute and read and write
7FF719C50000
unkown
page readonly
20E4A7A0000
heap
page read and write
EED95FE000
stack
page read and write
EED91FE000
stack
page read and write
20E4A87C000
heap
page read and write
EED94FE000
stack
page read and write
7FF719C51000
unkown
page execute read
20E4A770000
heap
page read and write
20E4A8E6000
heap
page read and write
EED92FE000
stack
page read and write
EED96FE000
stack
page read and write
7FF719C51000
unkown
page execute read
20E4A8A1000
heap
page read and write
20E4A7C5000
heap
page read and write
7FF719C50000
unkown
page readonly
7FF719C52000
unkown
page readonly
20E4A8DF000
heap
page read and write
20E4A82C000
heap
page read and write
20E4A8C4000
heap
page read and write
20E4C5B0000
heap
page execute and read and write
20E4A8BA000
heap
page read and write
EED98F8000
stack
page read and write
20E4A820000
heap
page read and write
EED90FA000
stack
page read and write
There are 23 hidden memdumps, click here to show them.