IOC Report
hesaphareketi_1.exe

loading gif

Files

File Path
Type
Category
Malicious
hesaphareketi_1.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_hesaphareketi_1._249f7061c93968d61f11176880c786d0825038ed_7ae9667d_914613ef-3e3c-4d5a-921c-68d5898b3235\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B2E.tmp.dmp
Mini DuMP crash report, 16 streams, Mon May 27 10:29:50 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2C57.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2C87.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\hesaphareketi_1.exe
"C:\Users\user\Desktop\hesaphareketi_1.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1072 -s 876

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{6b34d937-ccb3-eff3-06ea-eb77115bbb31}\Root\InventoryApplicationFile\hesaphareketi_1.|2783ef5e5f674575
ProgramId
\REGISTRY\A\{6b34d937-ccb3-eff3-06ea-eb77115bbb31}\Root\InventoryApplicationFile\hesaphareketi_1.|2783ef5e5f674575
FileId
\REGISTRY\A\{6b34d937-ccb3-eff3-06ea-eb77115bbb31}\Root\InventoryApplicationFile\hesaphareketi_1.|2783ef5e5f674575
LowerCaseLongPath
\REGISTRY\A\{6b34d937-ccb3-eff3-06ea-eb77115bbb31}\Root\InventoryApplicationFile\hesaphareketi_1.|2783ef5e5f674575
LongPathHash
\REGISTRY\A\{6b34d937-ccb3-eff3-06ea-eb77115bbb31}\Root\InventoryApplicationFile\hesaphareketi_1.|2783ef5e5f674575
Name
\REGISTRY\A\{6b34d937-ccb3-eff3-06ea-eb77115bbb31}\Root\InventoryApplicationFile\hesaphareketi_1.|2783ef5e5f674575
OriginalFileName
\REGISTRY\A\{6b34d937-ccb3-eff3-06ea-eb77115bbb31}\Root\InventoryApplicationFile\hesaphareketi_1.|2783ef5e5f674575
Publisher
\REGISTRY\A\{6b34d937-ccb3-eff3-06ea-eb77115bbb31}\Root\InventoryApplicationFile\hesaphareketi_1.|2783ef5e5f674575
Version
\REGISTRY\A\{6b34d937-ccb3-eff3-06ea-eb77115bbb31}\Root\InventoryApplicationFile\hesaphareketi_1.|2783ef5e5f674575
BinFileVersion
\REGISTRY\A\{6b34d937-ccb3-eff3-06ea-eb77115bbb31}\Root\InventoryApplicationFile\hesaphareketi_1.|2783ef5e5f674575
BinaryType
\REGISTRY\A\{6b34d937-ccb3-eff3-06ea-eb77115bbb31}\Root\InventoryApplicationFile\hesaphareketi_1.|2783ef5e5f674575
ProductName
\REGISTRY\A\{6b34d937-ccb3-eff3-06ea-eb77115bbb31}\Root\InventoryApplicationFile\hesaphareketi_1.|2783ef5e5f674575
ProductVersion
\REGISTRY\A\{6b34d937-ccb3-eff3-06ea-eb77115bbb31}\Root\InventoryApplicationFile\hesaphareketi_1.|2783ef5e5f674575
LinkDate
\REGISTRY\A\{6b34d937-ccb3-eff3-06ea-eb77115bbb31}\Root\InventoryApplicationFile\hesaphareketi_1.|2783ef5e5f674575
BinProductVersion
\REGISTRY\A\{6b34d937-ccb3-eff3-06ea-eb77115bbb31}\Root\InventoryApplicationFile\hesaphareketi_1.|2783ef5e5f674575
AppxPackageFullName
\REGISTRY\A\{6b34d937-ccb3-eff3-06ea-eb77115bbb31}\Root\InventoryApplicationFile\hesaphareketi_1.|2783ef5e5f674575
AppxPackageRelativeId
\REGISTRY\A\{6b34d937-ccb3-eff3-06ea-eb77115bbb31}\Root\InventoryApplicationFile\hesaphareketi_1.|2783ef5e5f674575
Size
\REGISTRY\A\{6b34d937-ccb3-eff3-06ea-eb77115bbb31}\Root\InventoryApplicationFile\hesaphareketi_1.|2783ef5e5f674575
Language
\REGISTRY\A\{6b34d937-ccb3-eff3-06ea-eb77115bbb31}\Root\InventoryApplicationFile\hesaphareketi_1.|2783ef5e5f674575
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
33FCF4000
stack
page read and write
1D89A4C0000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
3404FE000
stack
page read and write
3403FF000
stack
page read and write
1D8AC192000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
1D89A40C000
unkown
page readonly
1D89A530000
trusted library allocation
page read and write
1D89A5BF000
heap
page read and write
3402FE000
stack
page read and write
1D89A490000
heap
page read and write
1D89A400000
unkown
page readonly
1D89A556000
heap
page read and write
1D8AC181000
trusted library allocation
page read and write
1D8B4A20000
heap
page execute and read and write
7FFD9B779000
trusted library allocation
page read and write
1D8AC18D000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
1D89A733000
trusted library allocation
page read and write
33FEFF000
stack
page read and write
7FFD9B816000
trusted library allocation
page read and write
1D89A4E0000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1D89A795000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
7FFD9B820000
trusted library allocation
page execute and read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
1D89A4A0000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
1D8AC188000
trusted library allocation
page read and write
1D89C170000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
1D89A402000
unkown
page readonly
1D89A845000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
3400FE000
stack
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B772000
trusted library allocation
page read and write
1D89A57A000
heap
page read and write
7FFD9B990000
trusted library allocation
page execute and read and write
1D89A55C000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B762000
trusted library allocation
page read and write
1D8B48D6000
heap
page read and write
1D89A550000
heap
page read and write
33FFFF000
stack
page read and write
3401FC000
stack
page read and write
1D89A592000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
7FF492820000
trusted library allocation
page execute and read and write
1D8B48C0000
heap
page read and write
1D89A64B000
heap
page read and write
1D89A5BD000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
1D89A720000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
1D89A840000
heap
page read and write
7FFD9B985000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B945000
trusted library allocation
page read and write
1D89A830000
heap
page execute and read and write
1D89C181000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
7FFD9B846000
trusted library allocation
page execute and read and write
1D89A58F000
heap
page read and write
1D89A5C3000
heap
page read and write
1D89A5EE000
heap
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
33FDFE000
stack
page read and write
1D89A790000
heap
page read and write
1D89A730000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
There are 69 hidden memdumps, click here to show them.