IOC Report
launcher.exe

loading gif

Files

File Path
Type
Category
Malicious
launcher.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_launcher.exe_unk_b0bb7f6d90ed2f8ba3c75ebe9dc55dc31e4cb28_122839a5_de3fb72a-2063-40a2-b49d-422c40f56fc6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE825.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Apr 22 05:00:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE910.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE930.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\launcher.exe
"C:\Users\user\Desktop\launcher.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7444 -s 596

URLs

Name
IP
Malicious
demonstationfukewko.shop
malicious
incredibleextedwj.shop
malicious
shortsvelventysjo.shop
malicious
productivelookewr.shop
malicious
tolerateilusidjukl.shop
malicious
liabilitynighstjsko.shop
malicious
sideindexfollowragelrew.pw
malicious
shatterbreathepsw.shop
malicious
alcojoldwograpciw.shop
malicious
https://productivelookewr.shop/%
unknown
https://productivelookewr.shop/apibu
unknown
https://productivelookewr.shop:443/api
unknown
https://productivelookewr.shop/api
104.21.11.250
https://productivelookewr.shop/o
unknown
http://upx.sf.net
unknown
https://productivelookewr.shop/
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
productivelookewr.shop
104.21.11.250
malicious
sideindexfollowragelrew.pw
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.11.250
productivelookewr.shop
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{278e8230-c4fe-b8b1-e23f-05abfda8dbe6}\Root\InventoryApplicationFile\launcher.exe|7bd5bd6e88d4d952
ProgramId
\REGISTRY\A\{278e8230-c4fe-b8b1-e23f-05abfda8dbe6}\Root\InventoryApplicationFile\launcher.exe|7bd5bd6e88d4d952
FileId
\REGISTRY\A\{278e8230-c4fe-b8b1-e23f-05abfda8dbe6}\Root\InventoryApplicationFile\launcher.exe|7bd5bd6e88d4d952
LowerCaseLongPath
\REGISTRY\A\{278e8230-c4fe-b8b1-e23f-05abfda8dbe6}\Root\InventoryApplicationFile\launcher.exe|7bd5bd6e88d4d952
LongPathHash
\REGISTRY\A\{278e8230-c4fe-b8b1-e23f-05abfda8dbe6}\Root\InventoryApplicationFile\launcher.exe|7bd5bd6e88d4d952
Name
\REGISTRY\A\{278e8230-c4fe-b8b1-e23f-05abfda8dbe6}\Root\InventoryApplicationFile\launcher.exe|7bd5bd6e88d4d952
OriginalFileName
\REGISTRY\A\{278e8230-c4fe-b8b1-e23f-05abfda8dbe6}\Root\InventoryApplicationFile\launcher.exe|7bd5bd6e88d4d952
Publisher
\REGISTRY\A\{278e8230-c4fe-b8b1-e23f-05abfda8dbe6}\Root\InventoryApplicationFile\launcher.exe|7bd5bd6e88d4d952
Version
\REGISTRY\A\{278e8230-c4fe-b8b1-e23f-05abfda8dbe6}\Root\InventoryApplicationFile\launcher.exe|7bd5bd6e88d4d952
BinFileVersion
\REGISTRY\A\{278e8230-c4fe-b8b1-e23f-05abfda8dbe6}\Root\InventoryApplicationFile\launcher.exe|7bd5bd6e88d4d952
BinaryType
\REGISTRY\A\{278e8230-c4fe-b8b1-e23f-05abfda8dbe6}\Root\InventoryApplicationFile\launcher.exe|7bd5bd6e88d4d952
ProductName
\REGISTRY\A\{278e8230-c4fe-b8b1-e23f-05abfda8dbe6}\Root\InventoryApplicationFile\launcher.exe|7bd5bd6e88d4d952
ProductVersion
\REGISTRY\A\{278e8230-c4fe-b8b1-e23f-05abfda8dbe6}\Root\InventoryApplicationFile\launcher.exe|7bd5bd6e88d4d952
LinkDate
\REGISTRY\A\{278e8230-c4fe-b8b1-e23f-05abfda8dbe6}\Root\InventoryApplicationFile\launcher.exe|7bd5bd6e88d4d952
BinProductVersion
\REGISTRY\A\{278e8230-c4fe-b8b1-e23f-05abfda8dbe6}\Root\InventoryApplicationFile\launcher.exe|7bd5bd6e88d4d952
AppxPackageFullName
\REGISTRY\A\{278e8230-c4fe-b8b1-e23f-05abfda8dbe6}\Root\InventoryApplicationFile\launcher.exe|7bd5bd6e88d4d952
AppxPackageRelativeId
\REGISTRY\A\{278e8230-c4fe-b8b1-e23f-05abfda8dbe6}\Root\InventoryApplicationFile\launcher.exe|7bd5bd6e88d4d952
Size
\REGISTRY\A\{278e8230-c4fe-b8b1-e23f-05abfda8dbe6}\Root\InventoryApplicationFile\launcher.exe|7bd5bd6e88d4d952
Language
\REGISTRY\A\{278e8230-c4fe-b8b1-e23f-05abfda8dbe6}\Root\InventoryApplicationFile\launcher.exe|7bd5bd6e88d4d952
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
F50000
heap
page read and write
59C000
stack
page read and write
349C000
trusted library allocation
page read and write
10AD000
stack
page read and write
1370000
heap
page read and write
8FC000
stack
page read and write
335E000
stack
page read and write
A3E000
stack
page read and write
39BF000
stack
page read and write
2D5D000
stack
page read and write
12FF000
stack
page read and write
D9F000
stack
page read and write
360000
unkown
page readonly
B4F000
stack
page read and write
F85000
heap
page read and write
3660000
trusted library allocation
page read and write
3CF000
unkown
page execute and read and write
133E000
stack
page read and write
F60000
heap
page read and write
349F000
trusted library allocation
page read and write
3462000
trusted library allocation
page read and write
11AC000
heap
page read and write
E10000
heap
page read and write
2D9E000
stack
page read and write
361000
unkown
page execute read
BC8000
heap
page read and write
BA0000
heap
page read and write
3698000
trusted library allocation
page read and write
1196000
heap
page read and write
1136000
heap
page read and write
448000
remote allocation
page execute and read and write
11AF000
heap
page read and write
37C000
unkown
page readonly
114D000
heap
page read and write
11B9000
heap
page read and write
BB2000
heap
page read and write
3560000
heap
page read and write
3B80000
heap
page read and write
38BE000
stack
page read and write
115A000
heap
page read and write
331E000
stack
page read and write
BAB000
heap
page read and write
3476000
trusted library allocation
page read and write
3550000
trusted library allocation
page read and write
360000
unkown
page readonly
1100000
heap
page read and write
2C5E000
stack
page read and write
361000
unkown
page execute read
9D0000
heap
page read and write
EF8000
stack
page read and write
386000
unkown
page read and write
A40000
heap
page read and write
386000
unkown
page write copy
36C1000
trusted library allocation
page read and write
BEB000
stack
page read and write
5F0000
heap
page read and write
11A7000
heap
page read and write
34EE000
trusted library allocation
page read and write
3D2000
unkown
page readonly
37C000
unkown
page readonly
3460000
trusted library allocation
page read and write
F80000
heap
page read and write
3D0000
unkown
page read and write
10B0000
heap
page read and write
2E9E000
stack
page read and write
110A000
heap
page read and write
345F000
stack
page read and write
B8E000
stack
page read and write
2C1D000
stack
page read and write
3464000
trusted library allocation
page read and write
11B7000
heap
page read and write
321E000
stack
page read and write
36D4000
trusted library allocation
page read and write
3D2000
unkown
page readonly
There are 65 hidden memdumps, click here to show them.