IOC Report
bhevLCQYD6.exe

loading gif

Files

File Path
Type
Category
Malicious
bhevLCQYD6.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_bhevLCQYD6.exe_8827a0dbb697e60d3eedbe15e2e4538eca41c0_4be6e095_ef33ba46-e919-4d22-a920-a353ca617ed5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA3BE.tmp.dmp
Mini DuMP crash report, 16 streams, Fri Mar 29 10:30:51 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA594.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA5D4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\bhevLCQYD6.exe
"C:\Users\user\Desktop\bhevLCQYD6.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6956 -s 1212

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
https://sectigo.com/CPS0
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://account.dyn.com/
unknown
http://ocsp.sectigo.com0
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://upx.sf.net
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://api.ipify.org/t
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://api.ipify.org
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://mail.gosportz.in
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.gosportz.in
51.79.229.7
malicious
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
51.79.229.7
mail.gosportz.in
Canada
malicious
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileDirectory
\REGISTRY\A\{768806f9-c608-2ddf-aace-88bb09e0723a}\Root\InventoryApplicationFile\bhevlcqyd6.exe|85b3b372173c1abe
ProgramId
\REGISTRY\A\{768806f9-c608-2ddf-aace-88bb09e0723a}\Root\InventoryApplicationFile\bhevlcqyd6.exe|85b3b372173c1abe
FileId
\REGISTRY\A\{768806f9-c608-2ddf-aace-88bb09e0723a}\Root\InventoryApplicationFile\bhevlcqyd6.exe|85b3b372173c1abe
LowerCaseLongPath
\REGISTRY\A\{768806f9-c608-2ddf-aace-88bb09e0723a}\Root\InventoryApplicationFile\bhevlcqyd6.exe|85b3b372173c1abe
LongPathHash
\REGISTRY\A\{768806f9-c608-2ddf-aace-88bb09e0723a}\Root\InventoryApplicationFile\bhevlcqyd6.exe|85b3b372173c1abe
Name
\REGISTRY\A\{768806f9-c608-2ddf-aace-88bb09e0723a}\Root\InventoryApplicationFile\bhevlcqyd6.exe|85b3b372173c1abe
OriginalFileName
\REGISTRY\A\{768806f9-c608-2ddf-aace-88bb09e0723a}\Root\InventoryApplicationFile\bhevlcqyd6.exe|85b3b372173c1abe
Publisher
\REGISTRY\A\{768806f9-c608-2ddf-aace-88bb09e0723a}\Root\InventoryApplicationFile\bhevlcqyd6.exe|85b3b372173c1abe
Version
\REGISTRY\A\{768806f9-c608-2ddf-aace-88bb09e0723a}\Root\InventoryApplicationFile\bhevlcqyd6.exe|85b3b372173c1abe
BinFileVersion
\REGISTRY\A\{768806f9-c608-2ddf-aace-88bb09e0723a}\Root\InventoryApplicationFile\bhevlcqyd6.exe|85b3b372173c1abe
BinaryType
\REGISTRY\A\{768806f9-c608-2ddf-aace-88bb09e0723a}\Root\InventoryApplicationFile\bhevlcqyd6.exe|85b3b372173c1abe
ProductName
\REGISTRY\A\{768806f9-c608-2ddf-aace-88bb09e0723a}\Root\InventoryApplicationFile\bhevlcqyd6.exe|85b3b372173c1abe
ProductVersion
\REGISTRY\A\{768806f9-c608-2ddf-aace-88bb09e0723a}\Root\InventoryApplicationFile\bhevlcqyd6.exe|85b3b372173c1abe
LinkDate
\REGISTRY\A\{768806f9-c608-2ddf-aace-88bb09e0723a}\Root\InventoryApplicationFile\bhevlcqyd6.exe|85b3b372173c1abe
BinProductVersion
\REGISTRY\A\{768806f9-c608-2ddf-aace-88bb09e0723a}\Root\InventoryApplicationFile\bhevlcqyd6.exe|85b3b372173c1abe
AppxPackageFullName
\REGISTRY\A\{768806f9-c608-2ddf-aace-88bb09e0723a}\Root\InventoryApplicationFile\bhevlcqyd6.exe|85b3b372173c1abe
AppxPackageRelativeId
\REGISTRY\A\{768806f9-c608-2ddf-aace-88bb09e0723a}\Root\InventoryApplicationFile\bhevlcqyd6.exe|85b3b372173c1abe
Size
\REGISTRY\A\{768806f9-c608-2ddf-aace-88bb09e0723a}\Root\InventoryApplicationFile\bhevlcqyd6.exe|85b3b372173c1abe
Language
\REGISTRY\A\{768806f9-c608-2ddf-aace-88bb09e0723a}\Root\InventoryApplicationFile\bhevlcqyd6.exe|85b3b372173c1abe
Usn
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
29C1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
1D782B1C000
trusted library allocation
page read and write
malicious
1D792611000
trusted library allocation
page read and write
malicious
1D79C3B0000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
970000
heap
page read and write
52C0000
trusted library allocation
page read and write
60CE000
stack
page read and write
2E0A000
trusted library allocation
page read and write
1D79BFB0000
trusted library allocation
page read and write
D23000
trusted library allocation
page execute and read and write
D5A000
trusted library allocation
page execute and read and write
2DE6000
trusted library allocation
page read and write
5CED000
heap
page read and write
534C000
stack
page read and write
D90000
trusted library allocation
page execute and read and write
27E0000
trusted library allocation
page read and write
1D780AB0000
heap
page read and write
3999000
trusted library allocation
page read and write
D67000
trusted library allocation
page execute and read and write
6267000
trusted library allocation
page read and write
D3D000
trusted library allocation
page execute and read and write
1D780E25000
heap
page read and write
2CB0000
trusted library allocation
page read and write
513D000
stack
page read and write
2A33000
trusted library allocation
page read and write
A79D000
stack
page read and write
1D780BA0000
heap
page read and write
2B6C000
trusted library allocation
page read and write
5C0C000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
6240000
trusted library allocation
page read and write
1D79ACC0000
trusted library section
page read and write
7FFD9B990000
trusted library allocation
page read and write
5FA000
stack
page read and write
E50000
heap
page read and write
2BE8000
trusted library allocation
page read and write
A4C000
heap
page read and write
96CC000
heap
page read and write
D6458FF000
stack
page read and write
1D7809F1000
heap
page read and write
2800000
trusted library allocation
page read and write
D56000
trusted library allocation
page execute and read and write
7FFD9BA40000
trusted library allocation
page read and write
5C10000
heap
page read and write
5F8F000
stack
page read and write
2A15000
trusted library allocation
page read and write
2832000
trusted library allocation
page read and write
7FFD9B7BB000
trusted library allocation
page execute and read and write
280E000
trusted library allocation
page read and write
662C000
stack
page read and write
1D79ADB0000
heap
page execute and read and write
D10000
trusted library allocation
page read and write
CEC000
stack
page read and write
D62000
trusted library allocation
page read and write
65EF000
stack
page read and write
7FFD9B794000
trusted library allocation
page read and write
1D780A1E000
heap
page read and write
DA0000
trusted library allocation
page read and write
62B6000
trusted library allocation
page read and write
2860000
heap
page read and write
4DB0000
heap
page read and write
62C0000
trusted library allocation
page read and write
1D79AEB0000
heap
page read and write
2ECC000
trusted library allocation
page read and write
5C69000
heap
page read and write
D24000
trusted library allocation
page read and write
AC5000
heap
page read and write
1D792601000
trusted library allocation
page read and write
AF6000
heap
page read and write
7FFD9B7A2000
trusted library allocation
page read and write
903E000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
D644FE3000
stack
page read and write
29A7000
trusted library allocation
page read and write
1D780B20000
trusted library allocation
page read and write
5350000
heap
page read and write
1D782560000
heap
page execute and read and write
990000
heap
page read and write
1D780C30000
heap
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
62B0000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
636E000
stack
page read and write
1D79AD70000
heap
page read and write
9678000
heap
page read and write
1D780800000
unkown
page readonly
7FFD9B975000
trusted library allocation
page read and write
1D7807F2000
unkown
page readonly
5FCE000
stack
page read and write
3B39000
trusted library allocation
page read and write
9DC000
stack
page read and write
6A5D000
stack
page read and write
D2D000
trusted library allocation
page execute and read and write
7FFD9B9F0000
trusted library allocation
page read and write
3AF9000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page execute and read and write
E0C000
stack
page read and write
7FFD9BA14000
trusted library allocation
page read and write
3CB9000
trusted library allocation
page read and write
26AE000
stack
page read and write
1D780B90000
heap
page read and write
D6B000
trusted library allocation
page execute and read and write
29BD000
trusted library allocation
page read and write
2BF8000
trusted library allocation
page read and write
3C39000
trusted library allocation
page read and write
1D78283B000
trusted library allocation
page read and write
D6454FF000
stack
page read and write
296F000
stack
page read and write
1D780E20000
heap
page read and write
95EB000
heap
page read and write
D645CFD000
stack
page read and write
6250000
trusted library allocation
page read and write
3B79000
trusted library allocation
page read and write
29AF000
trusted library allocation
page read and write
7FD00000
trusted library allocation
page execute and read and write
1D7809BC000
heap
page read and write
3C59000
trusted library allocation
page read and write
1D79A630000
trusted library allocation
page read and write
A59000
heap
page read and write
966E000
heap
page read and write
3AD9000
trusted library allocation
page read and write
D6459FE000
stack
page read and write
3A59000
trusted library allocation
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
7FFD9BA50000
trusted library allocation
page read and write
1D792893000
trusted library allocation
page read and write
2750000
heap
page read and write
D645BFA000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
D6456FC000
stack
page read and write
1D780BD5000
heap
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
2971000
trusted library allocation
page read and write
7FFD9BA2D000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
1D79AEC0000
heap
page read and write
65AE000
stack
page read and write
27F0000
heap
page execute and read and write
3A99000
trusted library allocation
page read and write
D645AFD000
stack
page read and write
2812000
trusted library allocation
page read and write
3BD9000
trusted library allocation
page read and write
6B5D000
stack
page read and write
7FFD9BA10000
trusted library allocation
page read and write
6760000
heap
page read and write
A9E000
heap
page read and write
DC0000
heap
page read and write
6260000
trusted library allocation
page read and write
3BB9000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
26B8000
trusted library allocation
page read and write
282D000
trusted library allocation
page read and write
2C22000
trusted library allocation
page read and write
A69D000
stack
page read and write
1D79BFD2000
trusted library allocation
page read and write
C56E000
trusted library allocation
page read and write
3A19000
trusted library allocation
page read and write
4FEC000
stack
page read and write
7FFD9B7BD000
trusted library allocation
page execute and read and write
DB0000
heap
page read and write
D65000
trusted library allocation
page execute and read and write
7FFD9BA00000
trusted library allocation
page read and write
D6453FE000
stack
page read and write
27BC000
stack
page read and write
1D780A8C000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
2AA3000
trusted library allocation
page read and write
E79000
heap
page read and write
3C79000
trusted library allocation
page read and write
2E85000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
1D7825F0000
heap
page read and write
3B99000
trusted library allocation
page read and write
3A39000
trusted library allocation
page read and write
1D780A26000
heap
page read and write
D6455FC000
stack
page read and write
67C0000
heap
page read and write
A20000
heap
page read and write
5C65000
heap
page read and write
2E1A000
trusted library allocation
page read and write
1D780B30000
trusted library allocation
page read and write
AF1000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
DC7000
heap
page read and write
4EEC000
stack
page read and write
63AB000
stack
page read and write
612E000
stack
page read and write
27C0000
trusted library allocation
page read and write
A1C000
stack
page read and write
9039000
trusted library allocation
page read and write
2826000
trusted library allocation
page read and write
6780000
trusted library allocation
page execute and read and write
1D780BE0000
heap
page read and write
1D7809B6000
heap
page read and write
5140000
heap
page read and write
5B0C000
stack
page read and write
7C5C000
stack
page read and write
1D79C630000
heap
page read and write
503E000
stack
page read and write
E60000
trusted library allocation
page read and write
D6452FE000
stack
page read and write
9673000
heap
page read and write
9036000
trusted library allocation
page read and write
2DBA000
trusted library allocation
page read and write
DB4000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
D6457FF000
stack
page read and write
D52000
trusted library allocation
page read and write
CAA0000
trusted library allocation
page read and write
96C1000
heap
page read and write
2BBB000
trusted library allocation
page read and write
625D000
trusted library allocation
page read and write
1D780A1C000
heap
page read and write
281E000
trusted library allocation
page read and write
1D780B93000
heap
page read and write
E4C000
stack
page read and write
2770000
heap
page execute and read and write
7A70000
heap
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
1D780990000
heap
page read and write
29B1000
trusted library allocation
page read and write
958D000
heap
page read and write
622F000
stack
page read and write
7FFD9B980000
trusted library allocation
page read and write
1D79AEDB000
heap
page read and write
1D7807F0000
unkown
page readonly
7FFD9B7AD000
trusted library allocation
page execute and read and write
3B59000
trusted library allocation
page read and write
4A6E000
stack
page read and write
1D782601000
trusted library allocation
page read and write
3A79000
trusted library allocation
page read and write
960000
heap
page read and write
27D0000
trusted library allocation
page read and write
7FF415C10000
trusted library allocation
page execute and read and write
7FFD9B7B4000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
3971000
trusted library allocation
page read and write
A57000
heap
page read and write
ECB000
stack
page read and write
1D780C35000
heap
page read and write
AEB000
heap
page read and write
D46000
heap
page read and write
3C99000
trusted library allocation
page read and write
2CD4000
trusted library allocation
page read and write
8F9000
stack
page read and write
62D0000
trusted library allocation
page execute and read and write
1D780B33000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1D7809B0000
heap
page read and write
4DC0000
heap
page read and write
1D792607000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
2E0C000
trusted library allocation
page read and write
3C19000
trusted library allocation
page read and write
7FFD9B9C9000
trusted library allocation
page read and write
6248000
trusted library allocation
page read and write
1D780BD0000
heap
page read and write
1D79C632000
heap
page read and write
1D7809F4000
heap
page read and write
2CD6000
trusted library allocation
page read and write
39D9000
trusted library allocation
page read and write
1D780C00000
trusted library allocation
page read and write
6750000
trusted library allocation
page read and write
280B000
trusted library allocation
page read and write
1D79C6C7000
heap
page read and write
995000
heap
page read and write
966B000
heap
page read and write
D50000
trusted library allocation
page read and write
3BF9000
trusted library allocation
page read and write
1D79AEEC000
heap
page read and write
1D780890000
heap
page read and write
1D780B00000
trusted library allocation
page read and write
672C000
stack
page read and write
E70000
heap
page read and write
1D780970000
heap
page read and write
968B000
heap
page read and write
9598000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
5E8D000
stack
page read and write
A40000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1D780BC0000
trusted library section
page readonly
9560000
heap
page read and write
D40000
heap
page read and write
3AB9000
trusted library allocation
page read and write
39F9000
trusted library allocation
page read and write
62AE000
stack
page read and write
6B60000
trusted library allocation
page read and write
1D79AEEA000
heap
page read and write
63B0000
trusted library allocation
page execute and read and write
1D7807FA000
unkown
page readonly
7FFD9B7B0000
trusted library allocation
page read and write
656C000
stack
page read and write
7A60000
heap
page read and write
2ADF000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
2821000
trusted library allocation
page read and write
2C85000
trusted library allocation
page read and write
3B19000
trusted library allocation
page read and write
There are 298 hidden memdumps, click here to show them.