IOC Report
Aew8SXjXEb.exe

loading gif

Files

File Path
Type
Category
Malicious
Aew8SXjXEb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Aew8SXjXEb.exe_f6e7fff469788cb2a77365499845ec8544602f72_b1bf4f91_064bad09-4bab-48b2-ad3d-1b452802d532\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER53B.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 17:33:13 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5B9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5E9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Aew8SXjXEb.exe
"C:\Users\user\Desktop\Aew8SXjXEb.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6032 -s 272

URLs

Name
IP
Malicious
http://62.204.41.150
unknown
malicious
http://62.204.41.150/
62.204.41.150
malicious
http://62.204.41.150/edd20096ecef326d.php
62.204.41.150
malicious
http://62.204.41.150/L
unknown
http://62.204.41.150ig
unknown
http://62.204.41.150/edd20096ecef326d.php0
unknown
http://62.204.41.150/S
unknown
http://62.204.41.150/edd20096ecef326d.php;
unknown
http://62.204.41.150/Y
unknown
http://62.204.41.150/edd20096ecef326d.php5
unknown
http://62.204.41.150/edd20096ecef326d.phpu
unknown
http://62.204.41.150/z
unknown
http://62.204.41.150G
unknown
http://upx.sf.net
unknown
http://62.204.41.150/edd20096ecef326d.phpx&
unknown
http://62.204.41.150E
unknown
http://62.204.41.150/edd20096ecef326d.phpi
unknown
http://62.204.41.150/J
unknown
http://62.204.41.150/edd20096ecef326d.phpoca.
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
s-part-0044.t-0009.fb-t-msedge.net
13.107.253.72
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
62.204.41.150
unknown
United Kingdom
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{a8fa1867-c9c8-931e-ad73-68caf7bb87ce}\Root\InventoryApplicationFile\aew8sxjxeb.exe|fd9cf807e6c1bf42
ProgramId
\REGISTRY\A\{a8fa1867-c9c8-931e-ad73-68caf7bb87ce}\Root\InventoryApplicationFile\aew8sxjxeb.exe|fd9cf807e6c1bf42
FileId
\REGISTRY\A\{a8fa1867-c9c8-931e-ad73-68caf7bb87ce}\Root\InventoryApplicationFile\aew8sxjxeb.exe|fd9cf807e6c1bf42
LowerCaseLongPath
\REGISTRY\A\{a8fa1867-c9c8-931e-ad73-68caf7bb87ce}\Root\InventoryApplicationFile\aew8sxjxeb.exe|fd9cf807e6c1bf42
LongPathHash
\REGISTRY\A\{a8fa1867-c9c8-931e-ad73-68caf7bb87ce}\Root\InventoryApplicationFile\aew8sxjxeb.exe|fd9cf807e6c1bf42
Name
\REGISTRY\A\{a8fa1867-c9c8-931e-ad73-68caf7bb87ce}\Root\InventoryApplicationFile\aew8sxjxeb.exe|fd9cf807e6c1bf42
OriginalFileName
\REGISTRY\A\{a8fa1867-c9c8-931e-ad73-68caf7bb87ce}\Root\InventoryApplicationFile\aew8sxjxeb.exe|fd9cf807e6c1bf42
Publisher
\REGISTRY\A\{a8fa1867-c9c8-931e-ad73-68caf7bb87ce}\Root\InventoryApplicationFile\aew8sxjxeb.exe|fd9cf807e6c1bf42
Version
\REGISTRY\A\{a8fa1867-c9c8-931e-ad73-68caf7bb87ce}\Root\InventoryApplicationFile\aew8sxjxeb.exe|fd9cf807e6c1bf42
BinFileVersion
\REGISTRY\A\{a8fa1867-c9c8-931e-ad73-68caf7bb87ce}\Root\InventoryApplicationFile\aew8sxjxeb.exe|fd9cf807e6c1bf42
BinaryType
\REGISTRY\A\{a8fa1867-c9c8-931e-ad73-68caf7bb87ce}\Root\InventoryApplicationFile\aew8sxjxeb.exe|fd9cf807e6c1bf42
ProductName
\REGISTRY\A\{a8fa1867-c9c8-931e-ad73-68caf7bb87ce}\Root\InventoryApplicationFile\aew8sxjxeb.exe|fd9cf807e6c1bf42
ProductVersion
\REGISTRY\A\{a8fa1867-c9c8-931e-ad73-68caf7bb87ce}\Root\InventoryApplicationFile\aew8sxjxeb.exe|fd9cf807e6c1bf42
LinkDate
\REGISTRY\A\{a8fa1867-c9c8-931e-ad73-68caf7bb87ce}\Root\InventoryApplicationFile\aew8sxjxeb.exe|fd9cf807e6c1bf42
BinProductVersion
\REGISTRY\A\{a8fa1867-c9c8-931e-ad73-68caf7bb87ce}\Root\InventoryApplicationFile\aew8sxjxeb.exe|fd9cf807e6c1bf42
AppxPackageFullName
\REGISTRY\A\{a8fa1867-c9c8-931e-ad73-68caf7bb87ce}\Root\InventoryApplicationFile\aew8sxjxeb.exe|fd9cf807e6c1bf42
AppxPackageRelativeId
\REGISTRY\A\{a8fa1867-c9c8-931e-ad73-68caf7bb87ce}\Root\InventoryApplicationFile\aew8sxjxeb.exe|fd9cf807e6c1bf42
Size
\REGISTRY\A\{a8fa1867-c9c8-931e-ad73-68caf7bb87ce}\Root\InventoryApplicationFile\aew8sxjxeb.exe|fd9cf807e6c1bf42
Language
\REGISTRY\A\{a8fa1867-c9c8-931e-ad73-68caf7bb87ce}\Root\InventoryApplicationFile\aew8sxjxeb.exe|fd9cf807e6c1bf42
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
64D000
unkown
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
1397000
heap
page read and write
malicious
158F000
stack
page read and write
1008000
heap
page read and write
11B0000
heap
page read and write
F60000
heap
page read and write
643000
unkown
page readonly
FF0000
heap
page read and write
F00000
heap
page read and write
1B39E000
stack
page read and write
FFE000
heap
page read and write
1AF9E000
stack
page read and write
13F1000
heap
page read and write
621000
unkown
page execute read
1B0DE000
stack
page read and write
131E000
stack
page read and write
F4E000
stack
page read and write
113F000
stack
page read and write
620000
unkown
page readonly
1135000
stack
page read and write
12CE000
stack
page read and write
64D000
unkown
page write copy
168F000
stack
page read and write
1190000
heap
page read and write
1AF5F000
stack
page read and write
13BF000
stack
page read and write
1373000
heap
page read and write
1AE00000
heap
page read and write
EFD000
stack
page read and write
1390000
heap
page read and write
65C000
remote allocation
page execute and read and write
13D6000
heap
page read and write
1195000
heap
page read and write
69C000
unkown
page readonly
1370000
heap
page read and write
4B1000
remote allocation
page execute and read and write
12D0000
heap
page read and write
FFA000
heap
page read and write
1B09D000
stack
page read and write
64A000
remote allocation
page execute and read and write
FAE000
stack
page read and write
BF0000
heap
page read and write
69C000
unkown
page readonly
4BD000
remote allocation
page execute and read and write
1B34F000
stack
page read and write
620000
unkown
page readonly
643000
unkown
page readonly
1B49E000
stack
page read and write
4E2000
remote allocation
page execute and read and write
103C000
stack
page read and write
1B1DC000
stack
page read and write
1B24E000
stack
page read and write
B9C000
stack
page read and write
621000
unkown
page execute read
69A000
unkown
page execute and read and write
12BF000
stack
page read and write
69B000
unkown
page read and write
1AE5E000
stack
page read and write
There are 49 hidden memdumps, click here to show them.