IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_50842b9be826d8ed7939945d23cf3e974f7f0c4_56460358_2c7f8a6a-34e8-4b3b-a34b-55f9ed7afc39\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\GIIIECBGDHJJ\CAEHJE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GIIIECBGDHJJ\EBKEHJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GIIIECBGDHJJ\GHDHJE
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\GIIIECBGDHJJ\GIIIEC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GIIIECBGDHJJ\IJKKEH
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\GIIIECBGDHJJ\JJJKFB
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GIIIECBGDHJJ\KEGCBK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
modified
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF16E.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Jul 2 14:40:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF269.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF299.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\sqlt[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6132 -s 264

URLs

Name
IP
Malicious
https://t.me/
unknown
malicious
https://steamcommunity.com/profiles/76561199707802586
malicious
https://t.me/g067n
149.154.167.99
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://49.13.159.121:9000a4f35rosoft
unknown
https://duckduckgo.com/ac/?q=
unknown
https://web.telegram.org
unknown
https://steamcommunity.com/profiles/76561199707802586hellosqlt.dllsqlite3.dll
unknown
https://49.13.159.121:9000/MW
unknown
https://49.13.159.121:900024
unknown
https://49.13.159.121:9000/vcruntime140.dllh/Q
unknown
https://49.13.159.121:9000/softokn3.dllEdge
unknown
https://49.13.159.121:9000/vcruntime140.dlltQ
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://49.13.159.121:9000/softokn3.dll
unknown
https://t.me/g067n4G
unknown
https://49.13.159.121:9000alMicrosoft
unknown
https://49.13.159.121:9000
unknown
https://49.13.159.121:9000/(
unknown
https://49.13.159.121:9000/vcruntime140.dllrsaenh.dllE
unknown
https://49.13.159.121:9000/freebl3.dll
unknown
https://49.13.159.121:9000/freebl3.dll7
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://49.13.159.121:9000/0
unknown
https://49.13.159.121/
unknown
https://49.13.159.121:9000/mozglue.dll
unknown
https://t.me/g067nry1neMozilla/5.0
unknown
https://49.13.159.121:9000/KD
unknown
http://www.sqlite.org/copyright.html.
unknown
https://49.13.159.121:9000/B
unknown
https://49.13.159.121:9000/D
unknown
https://49.13.159.121:9000/msvcp140.dll0.15;
unknown
https://49.13.159.121:9000/nss3.dll
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://49.13.159.121:9000/sqlt.dll
unknown
https://49.13.159.121:9000/vcruntime140.dllets
unknown
https://49.13.159.121:9000/softokn3.dll2
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://49.13.159.121:9000/msvcp140.dll
unknown
https://49.13.159.121:9000a4f35txtft
unknown
https://www.ecosia.org/newtab/
unknown
https://49.13.159.121:9000/nss3.dlloft
unknown
https://49.13.159.121:9000/soft
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://49.13.159.121:9000/
unknown
https://49.13.159.121:9000/softokn3.dllL
unknown
https://49.13.159.121:9000/mW
unknown
https://49.13.159.121:9000/l
unknown
https://49.13.159.121:9000/msvcp140.dll~
unknown
https://49.13.159.121:9000ming
unknown
https://49.13.159.121:9000/msvcp140.dllEdge
unknown
https://49.13.159.121:9000/vcruntime140.dll
unknown
https://49.13.159.121:9000al
unknown
https://49.13.159.121:9000/ss3.dll
unknown
https://49.13.159.121:9000/freebl3.dllAppData
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://t.me/g067nNG
unknown
There are 48 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
t.me
149.154.167.99
malicious

IPs

IP
Domain
Country
Malicious
149.154.167.99
t.me
United Kingdom
malicious
49.13.159.121
unknown
Germany

Registry

Path
Value
Malicious
\REGISTRY\A\{ebeb69de-2d3e-e001-118a-d7efe2dfe5f0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{ebeb69de-2d3e-e001-118a-d7efe2dfe5f0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{ebeb69de-2d3e-e001-118a-d7efe2dfe5f0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{ebeb69de-2d3e-e001-118a-d7efe2dfe5f0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{ebeb69de-2d3e-e001-118a-d7efe2dfe5f0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{ebeb69de-2d3e-e001-118a-d7efe2dfe5f0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{ebeb69de-2d3e-e001-118a-d7efe2dfe5f0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{ebeb69de-2d3e-e001-118a-d7efe2dfe5f0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{ebeb69de-2d3e-e001-118a-d7efe2dfe5f0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{ebeb69de-2d3e-e001-118a-d7efe2dfe5f0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{ebeb69de-2d3e-e001-118a-d7efe2dfe5f0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{ebeb69de-2d3e-e001-118a-d7efe2dfe5f0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{ebeb69de-2d3e-e001-118a-d7efe2dfe5f0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{ebeb69de-2d3e-e001-118a-d7efe2dfe5f0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{ebeb69de-2d3e-e001-118a-d7efe2dfe5f0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{ebeb69de-2d3e-e001-118a-d7efe2dfe5f0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{ebeb69de-2d3e-e001-118a-d7efe2dfe5f0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{ebeb69de-2d3e-e001-118a-d7efe2dfe5f0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{ebeb69de-2d3e-e001-118a-d7efe2dfe5f0}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018400FE397F205
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
48A000
unkown
page read and write
malicious
1011000
heap
page read and write
malicious
445000
remote allocation
page execute and read and write
malicious
172FD000
stack
page read and write
19CF3000
heap
page read and write
198CF000
stack
page read and write
FC0000
heap
page read and write
4B1000
remote allocation
page execute and read and write
1FE68000
direct allocation
page readonly
1126000
heap
page read and write
4D1000
remote allocation
page execute and read and write
4E0000
remote allocation
page execute and read and write
10C8000
heap
page read and write
1FC51000
direct allocation
page execute read
19BAD000
heap
page read and write
116C000
heap
page read and write
1134000
heap
page read and write
52D000
remote allocation
page execute and read and write
502000
remote allocation
page execute and read and write
3F0000
unkown
page readonly
198FD000
heap
page read and write
126AD000
stack
page read and write
14BEC000
stack
page read and write
312E000
stack
page read and write
1FE5F000
direct allocation
page readonly
3F1000
unkown
page execute read
1FC58000
direct allocation
page execute read
5C8000
remote allocation
page execute and read and write
1FE5D000
direct allocation
page execute read
F90000
heap
page read and write
4A6000
remote allocation
page execute and read and write
19EF8000
heap
page read and write
14D5F000
stack
page read and write
E20000
heap
page read and write
15AD000
heap
page read and write
FE0000
heap
page read and write
3587000
heap
page read and write
19B3C000
stack
page read and write
F9A000
heap
page read and write
643000
remote allocation
page execute and read and write
13BE000
stack
page read and write
1FE9F000
direct allocation
page readonly
19EFA000
heap
page read and write
199E0000
heap
page read and write
ABC000
stack
page read and write
1A8F000
stack
page read and write
4DD000
remote allocation
page execute and read and write
BBC000
stack
page read and write
1136000
heap
page read and write
1994E000
heap
page read and write
F5C000
stack
page read and write
478000
unkown
page readonly
1FEB1000
heap
page read and write
1FF55000
heap
page read and write
14DBE000
stack
page read and write
641000
remote allocation
page execute and read and write
FFE000
heap
page read and write
F00000
heap
page read and write
3510000
heap
page read and write
97C0000
heap
page read and write
48A000
unkown
page write copy
198EC000
heap
page read and write
1FE92000
direct allocation
page read and write
19954000
heap
page read and write
3580000
heap
page read and write
14DD000
stack
page read and write
1FE9A000
direct allocation
page readonly
1012D000
stack
page read and write
1FC50000
direct allocation
page execute and read and write
322E000
stack
page read and write
4C2000
unkown
page readonly
4C2000
unkown
page readonly
100EF000
stack
page read and write
1738E000
stack
page read and write
19A3C000
stack
page read and write
1117000
heap
page read and write
19E51000
heap
page read and write
178F000
stack
page read and write
358D000
heap
page read and write
478000
unkown
page readonly
159A000
heap
page read and write
98B0000
unclassified section
page read and write
12FD000
stack
page read and write
97B0000
heap
page read and write
111C000
heap
page read and write
1266D000
stack
page read and write
3F0000
unkown
page readonly
1FDB6000
direct allocation
page execute read
439000
remote allocation
page execute and read and write
BB3000
stack
page read and write
FD0000
heap
page read and write
3F1000
unkown
page execute read
50E000
remote allocation
page execute and read and write
10EF000
heap
page read and write
1990E000
heap
page read and write
4BE000
unkown
page read and write
14F0000
heap
page read and write
10D2000
heap
page read and write
539000
remote allocation
page execute and read and write
F20000
heap
page read and write
19B90000
heap
page read and write
1590000
heap
page read and write
43F000
remote allocation
page execute and read and write
137E000
stack
page read and write
19CEC000
heap
page read and write
19E33000
heap
page read and write
14C5E000
stack
page read and write
10F7000
heap
page read and write
13C0000
heap
page read and write
1FE9D000
direct allocation
page readonly
4A9000
remote allocation
page execute and read and write
133E000
stack
page read and write
356E000
stack
page read and write
FF0000
direct allocation
page execute and read and write
198E2000
heap
page read and write
159E000
heap
page read and write
There are 107 hidden memdumps, click here to show them.