IOC Report
vEcIHT68pU.exe

loading gif

Files

File Path
Type
Category
Malicious
vEcIHT68pU.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_vEcIHT68pU.exe_2cbb3d2a264287c88ad2d657e7ba421935d5091_0c1dfcd1_bf82597f-35a2-4bae-b294-ab3c2288ee54\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MSBuild.exe_a7c83bcf6ac3ff550146223df713f817623037_05bdfb8c_f23c1e99-82ae-4bac-b94b-eac5ca96fd4e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_bad_module_info_26851ced9dceca7ff813c34112d2afbecefcef_85207d7d_2c8b76b6-d73c-4c96-a4c3-1a0f668ee729\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAEC3.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 16:00:23 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAF12.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAF42.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB839.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Oct 7 16:00:26 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB915.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB945.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF8BF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF8DF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\WERF8AE.tmp.WERDataCollectionStatus.txt
Unicode text, UTF-16, little-endian text, with CRLF, LF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\vEcIHT68pU.exe
"C:\Users\user\Desktop\vEcIHT68pU.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7580 -s 260
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7604 -s 1624
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7604 -s 1608

URLs

Name
IP
Malicious
frizzettei.sbs
malicious
bemuzzeki.sbs
malicious
invinjurhey.sbs
malicious
https://exemplarou.sbs/api
188.114.96.3
malicious
exilepolsiy.sbs
malicious
exemplarou.sbs
malicious
laddyirekyi.sbs
malicious
wickedneatr.sbs
malicious
isoplethui.sbs
malicious
https://exemplarou.sbs/
unknown
https://exemplarou.sbs/w
unknown
http://upx.sf.net
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
exemplarou.sbs
188.114.96.3
malicious
bg.microsoft.map.fastly.net
199.232.214.172

IPs

IP
Domain
Country
Malicious
188.114.96.3
exemplarou.sbs
European Union
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\veciht68pu.exe|25f7a52a011c9543
ProgramId
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\veciht68pu.exe|25f7a52a011c9543
FileId
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\veciht68pu.exe|25f7a52a011c9543
LowerCaseLongPath
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\veciht68pu.exe|25f7a52a011c9543
LongPathHash
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\veciht68pu.exe|25f7a52a011c9543
Name
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\veciht68pu.exe|25f7a52a011c9543
OriginalFileName
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\veciht68pu.exe|25f7a52a011c9543
Publisher
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\veciht68pu.exe|25f7a52a011c9543
Version
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\veciht68pu.exe|25f7a52a011c9543
BinFileVersion
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\veciht68pu.exe|25f7a52a011c9543
BinaryType
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\veciht68pu.exe|25f7a52a011c9543
ProductName
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\veciht68pu.exe|25f7a52a011c9543
ProductVersion
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\veciht68pu.exe|25f7a52a011c9543
LinkDate
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\veciht68pu.exe|25f7a52a011c9543
BinProductVersion
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\veciht68pu.exe|25f7a52a011c9543
AppxPackageFullName
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\veciht68pu.exe|25f7a52a011c9543
AppxPackageRelativeId
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\veciht68pu.exe|25f7a52a011c9543
Size
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\veciht68pu.exe|25f7a52a011c9543
Language
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\veciht68pu.exe|25f7a52a011c9543
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProgramId
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
FileId
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LowerCaseLongPath
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LongPathHash
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Name
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
OriginalFileName
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Publisher
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Version
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinFileVersion
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinaryType
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductName
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductVersion
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LinkDate
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinProductVersion
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageFullName
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageRelativeId
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Size
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Language
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
IsOsComponent
\REGISTRY\A\{a16b386d-bb6a-3cef-a125-33ff782ea615}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00188010B131808C
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 34 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A7D000
unkown
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
A50000
unkown
page readonly
150D000
heap
page read and write
ECB000
stack
page read and write
31AD000
stack
page read and write
308D000
stack
page read and write
3A0F000
stack
page read and write
F7E000
stack
page read and write
BE0000
heap
page read and write
70490000
unkown
page readonly
1230000
heap
page read and write
2EBF000
stack
page read and write
134E000
stack
page read and write
70491000
unkown
page execute read
F80000
heap
page read and write
1522000
heap
page read and write
AD5000
unkown
page execute and read and write
45E000
remote allocation
page execute and read and write
B7C000
stack
page read and write
A73000
unkown
page readonly
388F000
stack
page read and write
30A0000
heap
page read and write
A50000
unkown
page readonly
14FC000
heap
page read and write
159A000
heap
page read and write
704A6000
unkown
page readonly
A7D000
unkown
page write copy
704AF000
unkown
page readonly
1513000
heap
page read and write
BA0000
heap
page read and write
14AF000
stack
page read and write
14E8000
heap
page read and write
A51000
unkown
page execute read
1350000
heap
page read and write
704AD000
unkown
page read and write
A73000
unkown
page readonly
1588000
heap
page read and write
AD8000
unkown
page readonly
F8E000
heap
page read and write
EFD000
stack
page read and write
38B0000
heap
page read and write
134F000
stack
page read and write
35EE000
stack
page read and write
BF0000
heap
page read and write
AD8000
unkown
page readonly
372E000
stack
page read and write
2DBE000
stack
page read and write
2EFD000
stack
page read and write
124F000
stack
page read and write
13A5000
heap
page read and write
159F000
heap
page read and write
1370000
heap
page read and write
362E000
stack
page read and write
FCB000
stack
page read and write
15A1000
heap
page read and write
F8A000
heap
page read and write
AD6000
unkown
page read and write
F3E000
stack
page read and write
13A0000
heap
page read and write
390E000
stack
page read and write
14E0000
heap
page read and write
A51000
unkown
page execute read
378E000
stack
page read and write
303E000
stack
page read and write
2FFD000
stack
page read and write
There are 56 hidden memdumps, click here to show them.