IOC Report
E3XzKxHCCb.exe

loading gif

Files

File Path
Type
Category
Malicious
E3XzKxHCCb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_E3XzKxHCCb.exe_5f6fac996cd6656027e6f48caa533a8bfc512bfa_26ffd3d4_df49065c-3ed9-400e-8a09-f22e98155476\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCA62.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Apr 21 19:09:15 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCB7C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCBAC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\~DF119D786586100221.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\E3XzKxHCCb.exe
"C:\Users\user\Desktop\E3XzKxHCCb.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6756 -s 1196

URLs

Name
IP
Malicious
67.213.221.11
malicious
https://www.google.com
unknown
https://paste.ee/r/tC4AKp
unknown
https://www.google.com;
unknown
https://paste.ee/
unknown
http://exmple.com/Uploader.php
unknown
https://analytics.paste.ee;
unknown
https://analytics.paste.ee
unknown
http://upx.sf.net
unknown
https://paste.ee/r/tC4AKD_
unknown
https://cdnjs.cloudflare.com
unknown
https://cdnjs.cloudflare.com;
unknown
https://paste.ee/r/tC4AK
172.67.187.200
https://secure.gravatar.com
unknown
https://themes.googleusercontent.com
unknown
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
paste.ee
172.67.187.200

IPs

IP
Domain
Country
Malicious
172.67.187.200
paste.ee
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{0e4ef7ba-0f3b-7c8c-1310-ceb9ba7d5368}\Root\InventoryApplicationFile\e3xzkxhccb.exe|dafae6515b2ded00
ProgramId
\REGISTRY\A\{0e4ef7ba-0f3b-7c8c-1310-ceb9ba7d5368}\Root\InventoryApplicationFile\e3xzkxhccb.exe|dafae6515b2ded00
FileId
\REGISTRY\A\{0e4ef7ba-0f3b-7c8c-1310-ceb9ba7d5368}\Root\InventoryApplicationFile\e3xzkxhccb.exe|dafae6515b2ded00
LowerCaseLongPath
\REGISTRY\A\{0e4ef7ba-0f3b-7c8c-1310-ceb9ba7d5368}\Root\InventoryApplicationFile\e3xzkxhccb.exe|dafae6515b2ded00
LongPathHash
\REGISTRY\A\{0e4ef7ba-0f3b-7c8c-1310-ceb9ba7d5368}\Root\InventoryApplicationFile\e3xzkxhccb.exe|dafae6515b2ded00
Name
\REGISTRY\A\{0e4ef7ba-0f3b-7c8c-1310-ceb9ba7d5368}\Root\InventoryApplicationFile\e3xzkxhccb.exe|dafae6515b2ded00
OriginalFileName
\REGISTRY\A\{0e4ef7ba-0f3b-7c8c-1310-ceb9ba7d5368}\Root\InventoryApplicationFile\e3xzkxhccb.exe|dafae6515b2ded00
Publisher
\REGISTRY\A\{0e4ef7ba-0f3b-7c8c-1310-ceb9ba7d5368}\Root\InventoryApplicationFile\e3xzkxhccb.exe|dafae6515b2ded00
Version
\REGISTRY\A\{0e4ef7ba-0f3b-7c8c-1310-ceb9ba7d5368}\Root\InventoryApplicationFile\e3xzkxhccb.exe|dafae6515b2ded00
BinFileVersion
\REGISTRY\A\{0e4ef7ba-0f3b-7c8c-1310-ceb9ba7d5368}\Root\InventoryApplicationFile\e3xzkxhccb.exe|dafae6515b2ded00
BinaryType
\REGISTRY\A\{0e4ef7ba-0f3b-7c8c-1310-ceb9ba7d5368}\Root\InventoryApplicationFile\e3xzkxhccb.exe|dafae6515b2ded00
ProductName
\REGISTRY\A\{0e4ef7ba-0f3b-7c8c-1310-ceb9ba7d5368}\Root\InventoryApplicationFile\e3xzkxhccb.exe|dafae6515b2ded00
ProductVersion
\REGISTRY\A\{0e4ef7ba-0f3b-7c8c-1310-ceb9ba7d5368}\Root\InventoryApplicationFile\e3xzkxhccb.exe|dafae6515b2ded00
LinkDate
\REGISTRY\A\{0e4ef7ba-0f3b-7c8c-1310-ceb9ba7d5368}\Root\InventoryApplicationFile\e3xzkxhccb.exe|dafae6515b2ded00
BinProductVersion
\REGISTRY\A\{0e4ef7ba-0f3b-7c8c-1310-ceb9ba7d5368}\Root\InventoryApplicationFile\e3xzkxhccb.exe|dafae6515b2ded00
AppxPackageFullName
\REGISTRY\A\{0e4ef7ba-0f3b-7c8c-1310-ceb9ba7d5368}\Root\InventoryApplicationFile\e3xzkxhccb.exe|dafae6515b2ded00
AppxPackageRelativeId
\REGISTRY\A\{0e4ef7ba-0f3b-7c8c-1310-ceb9ba7d5368}\Root\InventoryApplicationFile\e3xzkxhccb.exe|dafae6515b2ded00
Size
\REGISTRY\A\{0e4ef7ba-0f3b-7c8c-1310-ceb9ba7d5368}\Root\InventoryApplicationFile\e3xzkxhccb.exe|dafae6515b2ded00
Language
\REGISTRY\A\{0e4ef7ba-0f3b-7c8c-1310-ceb9ba7d5368}\Root\InventoryApplicationFile\e3xzkxhccb.exe|dafae6515b2ded00
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
930000
heap
page read and write
malicious
17E0D000
stack
page read and write
695000
unkown
page readonly
959000
heap
page read and write
161C1000
heap
page read and write
419000
unkown
page execute read
24B0000
heap
page read and write
2480000
heap
page read and write
2449000
heap
page read and write
944000
heap
page read and write
673000
unkown
page readonly
24B5000
heap
page read and write
24F1000
heap
page read and write
32FD000
unkown
page read and write
2DD0000
heap
page read and write
24E8000
heap
page read and write
709000
unkown
page readonly
2DAB000
heap
page read and write
2E60000
heap
page read and write
66B000
unkown
page read and write
162B0000
heap
page read and write
68E000
unkown
page readonly
913000
heap
page read and write
673000
unkown
page readonly
24B6000
heap
page read and write
1810F000
stack
page read and write
6A4000
unkown
page readonly
9A000
stack
page read and write
162D6000
heap
page read and write
24FA000
heap
page read and write
164C0000
remote allocation
page read and write
249E000
heap
page read and write
32CD000
unkown
page read and write
6D9000
unkown
page readonly
1F0000
heap
page read and write
88E000
stack
page read and write
1625F000
heap
page read and write
2E70000
trusted library section
page read and write
2410000
heap
page read and write
249F000
heap
page read and write
2D9C000
heap
page read and write
238F000
stack
page read and write
165FF000
stack
page read and write
93F000
heap
page read and write
2540000
trusted library allocation
page read and write
953000
heap
page read and write
161C7000
heap
page read and write
95D000
heap
page read and write
980000
heap
page read and write
2C80000
heap
page read and write
16272000
heap
page read and write
2440000
heap
page read and write
2D8F000
heap
page read and write
2534000
heap
page read and write
162C1000
heap
page read and write
3281000
unkown
page read and write
24C0000
heap
page read and write
992000
heap
page read and write
44B000
unkown
page execute read
16257000
heap
page read and write
1620C000
heap
page read and write
412000
unkown
page execute read
2D96000
heap
page read and write
1825F000
stack
page read and write
944000
heap
page read and write
3297000
unkown
page read and write
2DA6000
heap
page read and write
1621F000
heap
page read and write
6D9000
unkown
page readonly
2529000
heap
page read and write
941000
heap
page read and write
2D98000
heap
page read and write
161D6000
heap
page read and write
2DCE000
heap
page read and write
775000
heap
page read and write
2DE3000
heap
page read and write
16227000
heap
page read and write
977000
heap
page read and write
161B0000
heap
page read and write
24F6000
heap
page read and write
161B1000
heap
page read and write
2D9E000
heap
page read and write
44B000
unkown
page execute read
48D000
unkown
page execute read
2DAD000
heap
page read and write
161F9000
heap
page read and write
24FB000
heap
page read and write
2537000
heap
page read and write
1622D000
heap
page read and write
24AB000
heap
page read and write
45E000
unkown
page execute read
61F000
unkown
page execute read
2DDE000
stack
page read and write
2DE1000
heap
page read and write
164C0000
remote allocation
page read and write
2E12000
heap
page read and write
3288000
unkown
page read and write
2DB5000
heap
page read and write
8FA000
heap
page read and write
944000
heap
page read and write
161B1000
heap
page read and write
17F0F000
stack
page read and write
2DEB000
heap
page read and write
2420000
heap
page read and write
164FE000
stack
page read and write
2D96000
heap
page read and write
24C4000
heap
page read and write
695000
unkown
page readonly
161D6000
heap
page read and write
162F9000
heap
page read and write
709000
unkown
page readonly
2533000
heap
page read and write
AEF000
stack
page read and write
16234000
heap
page read and write
6A4000
unkown
page readonly
941000
heap
page read and write
75E000
stack
page read and write
2D85000
heap
page read and write
1626A000
heap
page read and write
19A000
stack
page read and write
8FE000
heap
page read and write
400000
unkown
page readonly
32BA000
unkown
page read and write
250D000
stack
page read and write
1620C000
heap
page read and write
164C0000
remote allocation
page read and write
419000
unkown
page execute read
1800F000
stack
page read and write
161C7000
heap
page read and write
16225000
heap
page read and write
90F000
heap
page read and write
68E000
unkown
page readonly
45E000
unkown
page execute read
24E3000
heap
page read and write
24A6000
heap
page read and write
161C1000
heap
page read and write
9A7000
heap
page read and write
670000
unkown
page read and write
1630C000
heap
page read and write
400000
unkown
page readonly
2DAB000
heap
page read and write
2537000
heap
page read and write
401000
unkown
page execute read
2530000
heap
page read and write
24AF000
heap
page read and write
2DA0000
heap
page read and write
401000
unkown
page execute read
710000
heap
page read and write
162C7000
heap
page read and write
428000
unkown
page execute read
3270000
unkown
page read and write
8F0000
heap
page read and write
2DE1000
heap
page read and write
249A000
heap
page read and write
2D80000
heap
page read and write
2E5E000
stack
page read and write
48D000
unkown
page execute read
24B1000
heap
page read and write
17D0D000
stack
page read and write
412000
unkown
page execute read
24DE000
heap
page read and write
6C7000
unkown
page readonly
770000
heap
page read and write
24AC000
heap
page read and write
8D0000
heap
page read and write
24C5000
heap
page read and write
2DD8000
heap
page read and write
2495000
heap
page read and write
2DCE000
heap
page read and write
61F000
unkown
page execute read
2D85000
heap
page read and write
24BB000
heap
page read and write
2E1E000
stack
page read and write
1815E000
stack
page read and write
8A0000
trusted library allocation
page execute read
2D87000
heap
page read and write
24E7000
heap
page read and write
2E75000
trusted library section
page read and write
428000
unkown
page execute read
162B1000
heap
page read and write
2E64000
heap
page read and write
1623C000
heap
page read and write
6C7000
unkown
page readonly
24CC000
stack
page read and write
161F9000
heap
page read and write
93E000
heap
page read and write
2D9C000
heap
page read and write
There are 177 hidden memdumps, click here to show them.