IOC Report
W4B3Ey7x8Z.exe

loading gif

Files

File Path
Type
Category
Malicious
W4B3Ey7x8Z.exe
MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows, MZ for MS-DOS
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_W4B3Ey7x8Z.exe_2bd3de2274677e6b3bd981548d993a5f9a0c241_4f6d1ef8_94871002-70bc-4585-89d4-3095326445bf\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_W4B3Ey7x8Z.exe_f851b79e2d542ca26cedda47ca9e5b7e23c19a_4f6d1ef8_b8c3e3f8-f1af-4e48-b8d8-640fab491dfd\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3947.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 24 01:02:14 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3996.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER39C6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3B89.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 24 01:02:14 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3BC9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3C18.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\W4B3Ey7x8Z.exe
"C:\Users\user\Desktop\W4B3Ey7x8Z.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7444 -s 232
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7444 -s 236

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{e7532ca6-822a-12c4-86b2-39ad70278f57}\Root\InventoryApplicationFile\w4b3ey7x8z.exe|817485a32139bb52
ProgramId
\REGISTRY\A\{e7532ca6-822a-12c4-86b2-39ad70278f57}\Root\InventoryApplicationFile\w4b3ey7x8z.exe|817485a32139bb52
FileId
\REGISTRY\A\{e7532ca6-822a-12c4-86b2-39ad70278f57}\Root\InventoryApplicationFile\w4b3ey7x8z.exe|817485a32139bb52
LowerCaseLongPath
\REGISTRY\A\{e7532ca6-822a-12c4-86b2-39ad70278f57}\Root\InventoryApplicationFile\w4b3ey7x8z.exe|817485a32139bb52
LongPathHash
\REGISTRY\A\{e7532ca6-822a-12c4-86b2-39ad70278f57}\Root\InventoryApplicationFile\w4b3ey7x8z.exe|817485a32139bb52
Name
\REGISTRY\A\{e7532ca6-822a-12c4-86b2-39ad70278f57}\Root\InventoryApplicationFile\w4b3ey7x8z.exe|817485a32139bb52
OriginalFileName
\REGISTRY\A\{e7532ca6-822a-12c4-86b2-39ad70278f57}\Root\InventoryApplicationFile\w4b3ey7x8z.exe|817485a32139bb52
Publisher
\REGISTRY\A\{e7532ca6-822a-12c4-86b2-39ad70278f57}\Root\InventoryApplicationFile\w4b3ey7x8z.exe|817485a32139bb52
Version
\REGISTRY\A\{e7532ca6-822a-12c4-86b2-39ad70278f57}\Root\InventoryApplicationFile\w4b3ey7x8z.exe|817485a32139bb52
BinFileVersion
\REGISTRY\A\{e7532ca6-822a-12c4-86b2-39ad70278f57}\Root\InventoryApplicationFile\w4b3ey7x8z.exe|817485a32139bb52
BinaryType
\REGISTRY\A\{e7532ca6-822a-12c4-86b2-39ad70278f57}\Root\InventoryApplicationFile\w4b3ey7x8z.exe|817485a32139bb52
ProductName
\REGISTRY\A\{e7532ca6-822a-12c4-86b2-39ad70278f57}\Root\InventoryApplicationFile\w4b3ey7x8z.exe|817485a32139bb52
ProductVersion
\REGISTRY\A\{e7532ca6-822a-12c4-86b2-39ad70278f57}\Root\InventoryApplicationFile\w4b3ey7x8z.exe|817485a32139bb52
LinkDate
\REGISTRY\A\{e7532ca6-822a-12c4-86b2-39ad70278f57}\Root\InventoryApplicationFile\w4b3ey7x8z.exe|817485a32139bb52
BinProductVersion
\REGISTRY\A\{e7532ca6-822a-12c4-86b2-39ad70278f57}\Root\InventoryApplicationFile\w4b3ey7x8z.exe|817485a32139bb52
AppxPackageFullName
\REGISTRY\A\{e7532ca6-822a-12c4-86b2-39ad70278f57}\Root\InventoryApplicationFile\w4b3ey7x8z.exe|817485a32139bb52
AppxPackageRelativeId
\REGISTRY\A\{e7532ca6-822a-12c4-86b2-39ad70278f57}\Root\InventoryApplicationFile\w4b3ey7x8z.exe|817485a32139bb52
Size
\REGISTRY\A\{e7532ca6-822a-12c4-86b2-39ad70278f57}\Root\InventoryApplicationFile\w4b3ey7x8z.exe|817485a32139bb52
Language
\REGISTRY\A\{e7532ca6-822a-12c4-86b2-39ad70278f57}\Root\InventoryApplicationFile\w4b3ey7x8z.exe|817485a32139bb52
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
424000
unkown
page readonly
400000
unkown
page readonly
412000
unkown
page readonly
410000
unkown
page execute and write copy
78A000
heap
page read and write
412000
unkown
page readonly
500000
heap
page read and write
9D000
stack
page read and write
424000
unkown
page readonly
400000
unkown
page readonly
780000
heap
page read and write
410000
unkown
page execute and write copy
78E000
heap
page read and write
19D000
stack
page read and write
1F0000
heap
page read and write
5D0000
heap
page read and write
There are 6 hidden memdumps, click here to show them.