IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_ba8a8a594ca8fa23cd1d4e3bee6863e38899ac_1ee2fc52_23d44693-564a-4aac-9380-f748fbd747a5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\dll[1]
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\soft[1]
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\23RE4w32fN\Bunifu_UI_v1.5.3.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\23RE4w32fN\Y-Cleaner.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAA17.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Nov 30 06:29:34 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAB41.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAB61.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\download[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\add[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\download[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\fuckingdllENCR[1].dll
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\key[1].htm
ASCII text, with no line terminators
dropped
C:\Users\user\Desktop\Cleaner.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon number=0, Archive, ctime=Sat Nov 30 05:29:33 2024, mtime=Sat Nov 30 05:29:33 2024, atime=Sat Nov 30 05:29:33 2024, length=1502720, window=hide
modified
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 644

URLs

Name
IP
Malicious
http://185.156.72.65/soft/download
185.156.72.65
http://upx.sf.net
unknown
http://185.156.72.65/dll/key
185.156.72.65
http://185.156.72.65/files/download
185.156.72.65
http://www.ccleaner.comqhttps://take.rdrct-now.online/go/ZWKA?p78705p298845p1174
unknown
https://iplogger.org/1Pz8p7
unknown
https://g-cleanit.hk
unknown
http://185.156.72.65/add?substr=mixtwo&s=three&sub=nosub
185.156.72.65
http://185.156.72.65/dll/download
185.156.72.65

IPs

IP
Domain
Country
Malicious
185.156.72.65
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{bbd77309-5da0-d09f-93e6-9d17547ba310}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProgramId
malicious
\REGISTRY\A\{bbd77309-5da0-d09f-93e6-9d17547ba310}\Root\InventoryApplicationFile\file.exe|634507f567776d77
FileId
malicious
\REGISTRY\A\{bbd77309-5da0-d09f-93e6-9d17547ba310}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LowerCaseLongPath
malicious
\REGISTRY\A\{bbd77309-5da0-d09f-93e6-9d17547ba310}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LongPathHash
malicious
\REGISTRY\A\{bbd77309-5da0-d09f-93e6-9d17547ba310}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Name
malicious
\REGISTRY\A\{bbd77309-5da0-d09f-93e6-9d17547ba310}\Root\InventoryApplicationFile\file.exe|634507f567776d77
OriginalFileName
malicious
\REGISTRY\A\{bbd77309-5da0-d09f-93e6-9d17547ba310}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Publisher
malicious
\REGISTRY\A\{bbd77309-5da0-d09f-93e6-9d17547ba310}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Version
malicious
\REGISTRY\A\{bbd77309-5da0-d09f-93e6-9d17547ba310}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinFileVersion
malicious
\REGISTRY\A\{bbd77309-5da0-d09f-93e6-9d17547ba310}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinaryType
malicious
\REGISTRY\A\{bbd77309-5da0-d09f-93e6-9d17547ba310}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProductName
malicious
\REGISTRY\A\{bbd77309-5da0-d09f-93e6-9d17547ba310}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProductVersion
malicious
\REGISTRY\A\{bbd77309-5da0-d09f-93e6-9d17547ba310}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LinkDate
malicious
\REGISTRY\A\{bbd77309-5da0-d09f-93e6-9d17547ba310}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinProductVersion
malicious
\REGISTRY\A\{bbd77309-5da0-d09f-93e6-9d17547ba310}\Root\InventoryApplicationFile\file.exe|634507f567776d77
AppxPackageFullName
malicious
\REGISTRY\A\{bbd77309-5da0-d09f-93e6-9d17547ba310}\Root\InventoryApplicationFile\file.exe|634507f567776d77
AppxPackageRelativeId
malicious
\REGISTRY\A\{bbd77309-5da0-d09f-93e6-9d17547ba310}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Size
malicious
\REGISTRY\A\{bbd77309-5da0-d09f-93e6-9d17547ba310}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Language
malicious
\REGISTRY\A\{bbd77309-5da0-d09f-93e6-9d17547ba310}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page execute and read and write
malicious
4A20000
direct allocation
page read and write
malicious
4930000
direct allocation
page execute and read and write
malicious
267C000
stack
page read and write
4341000
heap
page read and write
5493000
heap
page read and write
4341000
heap
page read and write
4330000
direct allocation
page read and write
4341000
heap
page read and write
4341000
heap
page read and write
4341000
heap
page read and write
307E000
stack
page read and write
420E000
stack
page read and write
520B000
stack
page read and write
28BF000
stack
page read and write
B1E000
heap
page read and write
5338000
heap
page read and write
4330000
direct allocation
page read and write
5493000
heap
page read and write
531A000
heap
page read and write
4780000
trusted library allocation
page read and write
5DA1000
heap
page read and write
4341000
heap
page read and write
C4E000
stack
page read and write
5AF4000
heap
page read and write
5A81000
heap
page read and write
4341000
heap
page read and write
5980000
heap
page read and write
4341000
heap
page read and write
2C7F000
stack
page read and write
4341000
heap
page read and write
4341000
heap
page read and write
3A3F000
stack
page read and write
5493000
heap
page read and write
47D0000
direct allocation
page read and write
4341000
heap
page read and write
49B0000
direct allocation
page execute and read and write
4341000
heap
page read and write
4341000
heap
page read and write
4341000
heap
page read and write
5497000
heap
page read and write
5493000
heap
page read and write
5493000
heap
page read and write
995000
heap
page read and write
5338000
heap
page read and write
4330000
direct allocation
page read and write
27BE000
stack
page read and write
37FE000
stack
page read and write
5A10000
heap
page read and write
4980000
direct allocation
page execute and read and write
5493000
heap
page read and write
4330000
direct allocation
page read and write
4E8F000
stack
page read and write
49D0000
direct allocation
page execute and read and write
408F000
stack
page read and write
4341000
heap
page read and write
5F1000
unkown
page execute and read and write
53EA000
heap
page read and write
8B0000
heap
page read and write
5338000
heap
page read and write
3F3F000
stack
page read and write
1001A000
direct allocation
page read and write
5493000
heap
page read and write
4310000
heap
page read and write
32BF000
stack
page read and write
36BE000
stack
page read and write
4341000
heap
page read and write
5DBD000
heap
page read and write
37BF000
stack
page read and write
5B3B000
heap
page read and write
4330000
direct allocation
page read and write
4341000
heap
page read and write
5338000
heap
page read and write
4330000
direct allocation
page read and write
4341000
heap
page read and write
4341000
heap
page read and write
5987000
heap
page read and write
4330000
direct allocation
page read and write
3E3E000
stack
page read and write
4341000
heap
page read and write
54F2000
heap
page read and write
4341000
heap
page read and write
526C000
heap
page read and write
5B06000
heap
page read and write
33FF000
stack
page read and write
49C0000
direct allocation
page execute and read and write
5C61000
heap
page read and write
5BE3000
heap
page read and write
4341000
heap
page read and write
4341000
heap
page read and write
5C4E000
heap
page read and write
5581000
heap
page read and write
470000
unkown
page execute and read and write
353F000
stack
page read and write
5495000
heap
page read and write
343E000
stack
page read and write
5DCB000
heap
page read and write
AEF000
stack
page read and write
54F0000
heap
page read and write
5493000
heap
page read and write
510E000
stack
page read and write
5338000
heap
page read and write
5493000
heap
page read and write
277F000
stack
page read and write
4341000
heap
page read and write
4341000
heap
page read and write
4330000
direct allocation
page read and write
4341000
heap
page read and write
5A92000
heap
page read and write
357E000
stack
page read and write
531A000
heap
page read and write
4341000
heap
page read and write
4341000
heap
page read and write
531A000
heap
page read and write
598F000
heap
page read and write
4341000
heap
page read and write
5305000
heap
page read and write
40CE000
stack
page read and write
4341000
heap
page read and write
5987000
heap
page read and write
4341000
heap
page read and write
4A10000
direct allocation
page execute and read and write
BD0000
heap
page read and write
4341000
heap
page read and write
526B000
heap
page read and write
5580000
heap
page read and write
5338000
heap
page read and write
5338000
heap
page read and write
2F3E000
stack
page read and write
4330000
direct allocation
page read and write
4350000
heap
page read and write
2DBF000
stack
page read and write
29FF000
stack
page read and write
54DA000
heap
page read and write
4341000
heap
page read and write
47D0000
direct allocation
page read and write
49E0000
direct allocation
page execute and read and write
28FE000
stack
page read and write
9EE000
stack
page read and write
4341000
heap
page read and write
393E000
stack
page read and write
531A000
heap
page read and write
5980000
heap
page read and write
BDC000
heap
page read and write
4341000
heap
page read and write
4341000
heap
page read and write
4341000
heap
page read and write
5C46000
heap
page read and write
4F8F000
stack
page read and write
481C000
stack
page read and write
50CE000
stack
page read and write
49F0000
direct allocation
page execute and read and write
4341000
heap
page read and write
5BB6000
heap
page read and write
52ED000
heap
page read and write
4330000
direct allocation
page read and write
4330000
direct allocation
page read and write
4341000
heap
page read and write
4AB0000
heap
page read and write
6FD000
unkown
page execute and read and write
41CF000
stack
page read and write
5338000
heap
page read and write
4330000
direct allocation
page read and write
54F8000
heap
page read and write
531A000
heap
page read and write
4341000
heap
page read and write
38FF000
stack
page read and write
2CBE000
stack
page read and write
8A7000
unkown
page execute and write copy
5338000
heap
page read and write
5988000
heap
page read and write
4341000
heap
page read and write
5ADA000
heap
page read and write
5AD2000
heap
page read and write
4341000
heap
page read and write
598F000
heap
page read and write
4341000
heap
page read and write
47E0000
direct allocation
page read and write
10018000
direct allocation
page read and write
5581000
heap
page read and write
3B7F000
stack
page read and write
4970000
direct allocation
page execute and read and write
47D0000
direct allocation
page read and write
531A000
heap
page read and write
531A000
heap
page read and write
531A000
heap
page read and write
2A3E000
stack
page read and write
4A00000
direct allocation
page execute and read and write
4341000
heap
page read and write
2537000
heap
page read and write
4D8F000
stack
page read and write
5338000
heap
page read and write
531A000
heap
page read and write
5305000
heap
page read and write
4342000
heap
page read and write
4C7E000
stack
page read and write
5ACD000
heap
page read and write
5C15000
heap
page read and write
480B000
direct allocation
page read and write
4341000
heap
page read and write
D4F000
stack
page read and write
4341000
heap
page read and write
530D000
heap
page read and write
5A1C000
heap
page read and write
10001000
direct allocation
page execute read
52A7000
heap
page read and write
5659000
heap
page read and write
303F000
stack
page read and write
5AD0000
heap
page read and write
5497000
heap
page read and write
252E000
stack
page read and write
3CBF000
stack
page read and write
5338000
heap
page read and write
BF1000
heap
page read and write
5984000
heap
page read and write
5338000
heap
page read and write
B10000
heap
page read and write
10000000
direct allocation
page read and write
466000
unkown
page write copy
2B3F000
stack
page read and write
4341000
heap
page read and write
4A7E000
stack
page read and write
4341000
heap
page read and write
5495000
heap
page read and write
4341000
heap
page read and write
2B7E000
stack
page read and write
4341000
heap
page read and write
5338000
heap
page read and write
4930000
direct allocation
page execute and read and write
6F3000
unkown
page execute and read and write
430F000
stack
page read and write
4341000
heap
page read and write
4BBF000
stack
page read and write
4341000
heap
page read and write
8A3000
unkown
page execute and write copy
4340000
heap
page read and write
4341000
heap
page read and write
5338000
heap
page read and write
5ADC000
heap
page read and write
5A43000
heap
page read and write
5C50000
heap
page read and write
4BFE000
stack
page read and write
701000
unkown
page execute and write copy
8A2000
unkown
page execute and read and write
3DFF000
stack
page read and write
52A8000
heap
page read and write
4FCE000
stack
page read and write
5B5C000
heap
page read and write
3CFE000
stack
page read and write
5A5D000
heap
page read and write
4940000
direct allocation
page execute and read and write
BBC000
heap
page read and write
5C4F000
heap
page read and write
531A000
heap
page read and write
5984000
heap
page read and write
45F000
unkown
page execute and read and write
4C80000
heap
page read and write
9A0000
heap
page read and write
4341000
heap
page read and write
4341000
heap
page read and write
4341000
heap
page read and write
4341000
heap
page read and write
4C3E000
stack
page read and write
5497000
heap
page read and write
4341000
heap
page read and write
C08000
heap
page read and write
531A000
heap
page read and write
4341000
heap
page read and write
5983000
heap
page read and write
4341000
heap
page read and write
4780000
direct allocation
page execute and read and write
5260000
heap
page read and write
4341000
heap
page read and write
3A7E000
stack
page read and write
466000
unkown
page read and write
4341000
heap
page read and write
53EA000
heap
page read and write
8A6000
unkown
page execute and read and write
317F000
stack
page read and write
990000
heap
page read and write
367F000
stack
page read and write
4341000
heap
page read and write
5AB5000
heap
page read and write
9B000
stack
page read and write
5493000
heap
page read and write
4341000
heap
page read and write
4950000
direct allocation
page execute and read and write
B1A000
heap
page read and write
2EFF000
stack
page read and write
2530000
heap
page read and write
4341000
heap
page read and write
5B88000
heap
page read and write
4341000
heap
page read and write
32FE000
stack
page read and write
701000
unkown
page execute and read and write
4341000
heap
page read and write
5983000
heap
page read and write
400000
unkown
page readonly
4360000
heap
page read and write
199000
stack
page read and write
4341000
heap
page read and write
401000
unkown
page execute and write copy
5A61000
heap
page read and write
491F000
stack
page read and write
4330000
direct allocation
page read and write
4341000
heap
page read and write
263F000
stack
page read and write
5338000
heap
page read and write
4330000
direct allocation
page read and write
53EA000
heap
page read and write
5DB3000
heap
page read and write
4960000
direct allocation
page execute and read and write
531A000
heap
page read and write
3F8E000
stack
page read and write
5A2E000
heap
page read and write
4341000
heap
page read and write
31BE000
stack
page read and write
5DBB000
heap
page read and write
3BBE000
stack
page read and write
4990000
direct allocation
page execute and read and write
5AE0000
heap
page read and write
3F40000
heap
page read and write
5493000
heap
page read and write
4341000
heap
page read and write
49A0000
direct allocation
page execute and read and write
5AB9000
heap
page read and write
5338000
heap
page read and write
5493000
heap
page read and write
4341000
heap
page read and write
2DFE000
stack
page read and write
702000
unkown
page execute and write copy
10011000
direct allocation
page readonly
4341000
heap
page read and write
531A000
heap
page read and write
52ED000
heap
page read and write
There are 325 hidden memdumps, click here to show them.