IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_687823f3e027695faa9d88d81b6c04ef2f38cb4_d32b1248_a9fcd368-4032-4731-992d-7df4f590d10d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5099.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Aug 28 10:05:24 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER51A4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER51C4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\add[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\download[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\download[1].htm
very short file (no magic)
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /im "file.exe" /f & erase "C:\Users\user\Desktop\file.exe" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /im "file.exe" /f
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 1504

URLs

Name
IP
Malicious
http://80.66.75.114/files/download
80.66.75.114
malicious
http://80.66.75.114/add?substr=one&s=two
80.66.75.114
malicious
http://80.66.75.114/6.75.114/add?substr=one&s=two
unknown
http://80.66.75.114/files/download4/files/downloadP
unknown
http://80.66.75.114/
unknown
http://80.66.75.114/files/download4/files/download
unknown
http://80.66.75.114/add?substr=one&s=twoi
unknown
http://upx.sf.net
unknown
http://80.66.75.114/files/downloadP
unknown
http://80.66.75.114/files/downloadData
unknown
http://80.66.75.114/wi
unknown
http://80.66.75.114/files/downloadN
unknown
http://80.66.75.114/files/downloadL
unknown
http://80.66.75.114/files/downloadLMEM
unknown
There are 4 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
80.66.75.114
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{a55c5e56-3afc-a478-812c-0ba21b244409}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{a55c5e56-3afc-a478-812c-0ba21b244409}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{a55c5e56-3afc-a478-812c-0ba21b244409}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{a55c5e56-3afc-a478-812c-0ba21b244409}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{a55c5e56-3afc-a478-812c-0ba21b244409}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{a55c5e56-3afc-a478-812c-0ba21b244409}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{a55c5e56-3afc-a478-812c-0ba21b244409}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{a55c5e56-3afc-a478-812c-0ba21b244409}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{a55c5e56-3afc-a478-812c-0ba21b244409}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{a55c5e56-3afc-a478-812c-0ba21b244409}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{a55c5e56-3afc-a478-812c-0ba21b244409}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{a55c5e56-3afc-a478-812c-0ba21b244409}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{a55c5e56-3afc-a478-812c-0ba21b244409}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{a55c5e56-3afc-a478-812c-0ba21b244409}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{a55c5e56-3afc-a478-812c-0ba21b244409}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{a55c5e56-3afc-a478-812c-0ba21b244409}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{a55c5e56-3afc-a478-812c-0ba21b244409}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{a55c5e56-3afc-a478-812c-0ba21b244409}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{a55c5e56-3afc-a478-812c-0ba21b244409}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
740000
direct allocation
page read and write
malicious
5F0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
8AC000
heap
page read and write
8AC000
heap
page read and write
2FC0000
heap
page read and write
29BE000
stack
page read and write
2C5B000
stack
page read and write
7B0000
heap
page read and write
898000
heap
page read and write
86B000
heap
page read and write
218E000
stack
page read and write
436000
unkown
page read and write
520000
heap
page read and write
8AC000
heap
page read and write
7E0000
heap
page read and write
2E29000
heap
page read and write
2D6F000
unkown
page read and write
89A000
heap
page read and write
2DC5000
heap
page read and write
2410000
heap
page read and write
7BA000
heap
page read and write
2220000
heap
page read and write
237E000
stack
page read and write
2E29000
heap
page read and write
401000
unkown
page execute read
2E31000
heap
page read and write
285F000
stack
page read and write
329F000
stack
page read and write
2E29000
heap
page read and write
1F0000
heap
page read and write
434000
unkown
page write copy
42F000
unkown
page execute read
297E000
unkown
page read and write
898000
heap
page read and write
2AA0000
heap
page read and write
898000
heap
page read and write
8AC000
heap
page read and write
2E29000
heap
page read and write
2E29000
heap
page read and write
89A000
heap
page read and write
23CE000
stack
page read and write
898000
heap
page read and write
898000
heap
page read and write
89A000
heap
page read and write
232F000
stack
page read and write
21CE000
stack
page read and write
214F000
stack
page read and write
2E29000
heap
page read and write
2DA0000
heap
page read and write
79E000
stack
page read and write
2E32000
heap
page read and write
29C0000
heap
page read and write
29F0000
heap
page read and write
28FC000
stack
page read and write
2E35000
heap
page read and write
431000
unkown
page readonly
7BE000
heap
page read and write
898000
heap
page read and write
898000
heap
page read and write
5E0000
heap
page read and write
7C4000
heap
page execute and read and write
2E30000
heap
page read and write
8AC000
heap
page read and write
2E3B000
heap
page read and write
89A000
heap
page read and write
2E29000
heap
page read and write
89A000
heap
page read and write
295F000
stack
page read and write
898000
heap
page read and write
89A000
heap
page read and write
2C9E000
stack
page read and write
434000
unkown
page read and write
630000
heap
page read and write
8AC000
heap
page read and write
221E000
stack
page read and write
2AC3000
heap
page read and write
8AC000
heap
page read and write
5BE000
stack
page read and write
2930000
heap
page read and write
740000
heap
page read and write
305C000
stack
page read and write
2B5E000
stack
page read and write
2E31000
heap
page read and write
89A000
heap
page read and write
415000
unkown
page execute read
2E29000
heap
page read and write
319E000
stack
page read and write
2E29000
heap
page read and write
439000
unkown
page readonly
73F000
stack
page read and write
898000
heap
page read and write
400000
unkown
page readonly
2DAF000
heap
page read and write
2D9F000
stack
page read and write
2E29000
heap
page read and write
25CD000
stack
page read and write
9B000
stack
page read and write
2AC5000
heap
page read and write
431000
unkown
page readonly
8AC000
heap
page read and write
19B000
stack
page read and write
2AAB000
heap
page read and write
439000
unkown
page readonly
56E000
stack
page read and write
635000
heap
page read and write
893000
heap
page read and write
315C000
stack
page read and write
2AC1000
heap
page read and write
2E32000
heap
page read and write
2F3F000
stack
page read and write
2E29000
heap
page read and write
89A000
heap
page read and write
2A5F000
stack
page read and write
8AC000
heap
page read and write
8AC000
heap
page read and write
There are 106 hidden memdumps, click here to show them.