IOC Report
GleiApp.exe

loading gif

Files

File Path
Type
Category
Malicious
GleiApp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_GleiApp.exe_fae4f9ac080b046071561fa357d4976710acf_cab99d22_6a120cb7-f31e-4845-a163-2b05d96e1f13\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDB9E.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 25 16:50:01 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE207.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE227.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\GleiApp.exe
"C:\Users\user\Desktop\GleiApp.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6700 -s 940

URLs

Name
IP
Malicious
http://tempuri.org/dsGLEI0010.xsd
unknown
http://upx.sf.net
unknown
http://tempuri.org/dsGLEI0020.xsd
unknown
http://tempuri.org/dsGLEI0030.xsd
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{a786f6f1-80fc-2ddd-9a57-01f1c549bf87}\Root\InventoryApplicationFile\gleiapp.exe|befcfe752a9cfbbb
ProgramId
\REGISTRY\A\{a786f6f1-80fc-2ddd-9a57-01f1c549bf87}\Root\InventoryApplicationFile\gleiapp.exe|befcfe752a9cfbbb
FileId
\REGISTRY\A\{a786f6f1-80fc-2ddd-9a57-01f1c549bf87}\Root\InventoryApplicationFile\gleiapp.exe|befcfe752a9cfbbb
LowerCaseLongPath
\REGISTRY\A\{a786f6f1-80fc-2ddd-9a57-01f1c549bf87}\Root\InventoryApplicationFile\gleiapp.exe|befcfe752a9cfbbb
LongPathHash
\REGISTRY\A\{a786f6f1-80fc-2ddd-9a57-01f1c549bf87}\Root\InventoryApplicationFile\gleiapp.exe|befcfe752a9cfbbb
Name
\REGISTRY\A\{a786f6f1-80fc-2ddd-9a57-01f1c549bf87}\Root\InventoryApplicationFile\gleiapp.exe|befcfe752a9cfbbb
OriginalFileName
\REGISTRY\A\{a786f6f1-80fc-2ddd-9a57-01f1c549bf87}\Root\InventoryApplicationFile\gleiapp.exe|befcfe752a9cfbbb
Publisher
\REGISTRY\A\{a786f6f1-80fc-2ddd-9a57-01f1c549bf87}\Root\InventoryApplicationFile\gleiapp.exe|befcfe752a9cfbbb
Version
\REGISTRY\A\{a786f6f1-80fc-2ddd-9a57-01f1c549bf87}\Root\InventoryApplicationFile\gleiapp.exe|befcfe752a9cfbbb
BinFileVersion
\REGISTRY\A\{a786f6f1-80fc-2ddd-9a57-01f1c549bf87}\Root\InventoryApplicationFile\gleiapp.exe|befcfe752a9cfbbb
BinaryType
\REGISTRY\A\{a786f6f1-80fc-2ddd-9a57-01f1c549bf87}\Root\InventoryApplicationFile\gleiapp.exe|befcfe752a9cfbbb
ProductName
\REGISTRY\A\{a786f6f1-80fc-2ddd-9a57-01f1c549bf87}\Root\InventoryApplicationFile\gleiapp.exe|befcfe752a9cfbbb
ProductVersion
\REGISTRY\A\{a786f6f1-80fc-2ddd-9a57-01f1c549bf87}\Root\InventoryApplicationFile\gleiapp.exe|befcfe752a9cfbbb
LinkDate
\REGISTRY\A\{a786f6f1-80fc-2ddd-9a57-01f1c549bf87}\Root\InventoryApplicationFile\gleiapp.exe|befcfe752a9cfbbb
BinProductVersion
\REGISTRY\A\{a786f6f1-80fc-2ddd-9a57-01f1c549bf87}\Root\InventoryApplicationFile\gleiapp.exe|befcfe752a9cfbbb
AppxPackageFullName
\REGISTRY\A\{a786f6f1-80fc-2ddd-9a57-01f1c549bf87}\Root\InventoryApplicationFile\gleiapp.exe|befcfe752a9cfbbb
AppxPackageRelativeId
\REGISTRY\A\{a786f6f1-80fc-2ddd-9a57-01f1c549bf87}\Root\InventoryApplicationFile\gleiapp.exe|befcfe752a9cfbbb
Size
\REGISTRY\A\{a786f6f1-80fc-2ddd-9a57-01f1c549bf87}\Root\InventoryApplicationFile\gleiapp.exe|befcfe752a9cfbbb
Language
\REGISTRY\A\{a786f6f1-80fc-2ddd-9a57-01f1c549bf87}\Root\InventoryApplicationFile\gleiapp.exe|befcfe752a9cfbbb
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
9E8000
heap
page read and write
A14000
heap
page read and write
D10000
heap
page read and write
53E000
unkown
page readonly
522E000
stack
page read and write
801000
stack
page read and write
9DE000
stack
page read and write
1D2000
unkown
page readonly
99E000
stack
page read and write
1D0000
unkown
page readonly
9E0000
heap
page read and write
FC3000
trusted library allocation
page execute and read and write
4DAE000
stack
page read and write
950000
heap
page read and write
27E0000
heap
page read and write
28F1000
trusted library allocation
page read and write
4F20000
heap
page read and write
A07000
heap
page read and write
FD4000
trusted library allocation
page read and write
A0B000
heap
page read and write
49EE000
stack
page read and write
A53000
heap
page read and write
4E20000
heap
page execute and read and write
4DEE000
stack
page read and write
A21000
heap
page read and write
502F000
stack
page read and write
279E000
stack
page read and write
FB0000
trusted library allocation
page read and write
2720000
trusted library allocation
page execute and read and write
1010000
heap
page read and write
2750000
heap
page execute and read and write
940000
heap
page read and write
2730000
trusted library allocation
page read and write
FFB000
trusted library allocation
page execute and read and write
28EF000
stack
page read and write
267E000
stack
page read and write
AF5000
heap
page read and write
512E000
stack
page read and write
9EE000
heap
page read and write
AF0000
heap
page read and write
E1E000
stack
page read and write
38F1000
trusted library allocation
page read and write
5DB000
stack
page read and write
2630000
trusted library allocation
page read and write
FC4000
trusted library allocation
page read and write
2740000
trusted library allocation
page read and write
4D6E000
stack
page read and write
FCD000
trusted library allocation
page execute and read and write
A25000
heap
page read and write
FF7000
trusted library allocation
page execute and read and write
CCF000
stack
page read and write
CD0000
heap
page read and write
FD0000
trusted library allocation
page read and write
There are 43 hidden memdumps, click here to show them.