IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_d6eca444034557dbadee3a9b8c12d3885e1caed_6983241a_16bd15ca-eeb6-4121-8ba8-a24a92496132\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\IJECAEHJJJKJKFIDGCBGIJJJEH
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6CDF.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Sep 1 18:54:59 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6E47.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6E87.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 1600

URLs

Name
IP
Malicious
http://185.215.113.100/e2b1563c6670f193.phpUser
unknown
malicious
http://185.215.113.100/e2b1563c6670f193.php
185.215.113.100
malicious
http://185.215.113.1000d60be0de163924d/sqlite3.dllY2l8MXwwfDB8TWV0YU1hc2t8ZWpiYWxiYWtvcGxjaGxnaGVjZG
unknown
malicious
http://185.215.113.100/0d60be0de163924d/sqlite3.dll
185.215.113.100
malicious
http://185.215.113.100/e2b1563c6670f193.phpion:
unknown
malicious
http://185.215.113.100
unknown
malicious
http://185.215.113.100/0d60be0de163924d/sqlite3.dllq
unknown
malicious
http://185.215.113.100/e2b1563c6670f193.phpWm
unknown
malicious
http://185.215.113.100/e2b1563c6670f193.phpZWVta2JnY2l8MXwwfDB8TWV0YU1hc2t8ZWpiYWxiYWtvcGxjaGxnaGVjZ
unknown
malicious
http://185.215.113.100/e2b1563c6670f193.phpx
unknown
malicious
http://185.215.113.100/e2b1563c6670f193.phpinit.exe
unknown
malicious
http://185.215.113.100GIJ
unknown
malicious
http://185.215.113.100:
unknown
malicious
http://185.215.113.100/
185.215.113.100
malicious
http://185.215.113.100s.exe
unknown
malicious
http://185.215.113.100/e2b1563c6670f193.php7mH
unknown
malicious
http://185.215.113.100/0d60be0de163924d/sqlite3.dllc
unknown
malicious
http://upx.sf.net
unknown
http://www.sqlite.org/copyright.html.
unknown
There are 9 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.100
unknown
Portugal
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{df3247ab-d77f-6d22-8e35-e26e2549d3a2}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{df3247ab-d77f-6d22-8e35-e26e2549d3a2}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{df3247ab-d77f-6d22-8e35-e26e2549d3a2}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{df3247ab-d77f-6d22-8e35-e26e2549d3a2}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{df3247ab-d77f-6d22-8e35-e26e2549d3a2}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{df3247ab-d77f-6d22-8e35-e26e2549d3a2}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{df3247ab-d77f-6d22-8e35-e26e2549d3a2}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{df3247ab-d77f-6d22-8e35-e26e2549d3a2}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{df3247ab-d77f-6d22-8e35-e26e2549d3a2}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{df3247ab-d77f-6d22-8e35-e26e2549d3a2}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{df3247ab-d77f-6d22-8e35-e26e2549d3a2}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{df3247ab-d77f-6d22-8e35-e26e2549d3a2}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{df3247ab-d77f-6d22-8e35-e26e2549d3a2}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{df3247ab-d77f-6d22-8e35-e26e2549d3a2}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{df3247ab-d77f-6d22-8e35-e26e2549d3a2}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{df3247ab-d77f-6d22-8e35-e26e2549d3a2}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{df3247ab-d77f-6d22-8e35-e26e2549d3a2}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{df3247ab-d77f-6d22-8e35-e26e2549d3a2}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{df3247ab-d77f-6d22-8e35-e26e2549d3a2}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
38A000
unkown
page execute and read and write
malicious
119E000
heap
page read and write
malicious
4B51000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
1D2FF000
stack
page read and write
41D000
unkown
page execute and read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
7BD000
unkown
page execute and read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4FE0000
direct allocation
page read and write
4B70000
heap
page read and write
1D72E000
stack
page read and write
560000
unkown
page execute and read and write
61E00000
direct allocation
page execute and read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4B40000
direct allocation
page read and write
4B51000
heap
page read and write
DB0000
heap
page read and write
7F7000
unkown
page execute and write copy
3B1E000
stack
page read and write
3F1000
unkown
page execute and read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
2ED7000
heap
page read and write
1D62E000
stack
page read and write
4B51000
heap
page read and write
61ECD000
direct allocation
page execute and read and write
4B51000
heap
page read and write
D4C000
stack
page read and write
30DF000
stack
page read and write
4B51000
heap
page read and write
98B000
unkown
page execute and read and write
3BF000
unkown
page execute and read and write
13B6000
heap
page read and write
4B51000
heap
page read and write
4B40000
direct allocation
page read and write
4B51000
heap
page read and write
4B60000
heap
page read and write
1D48E000
stack
page read and write
4B1F000
stack
page read and write
4B51000
heap
page read and write
511F000
stack
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
311E000
stack
page read and write
4B51000
heap
page read and write
5160000
direct allocation
page execute and read and write
1190000
heap
page read and write
4B51000
heap
page read and write
2ECE000
stack
page read and write
4A1E000
stack
page read and write
4B51000
heap
page read and write
43DE000
stack
page read and write
3B3000
unkown
page execute and read and write
4FE0000
direct allocation
page read and write
6E5000
unkown
page execute and read and write
4B51000
heap
page read and write
10FD000
stack
page read and write
4B51000
heap
page read and write
7F6000
unkown
page execute and write copy
12D0000
heap
page read and write
3ADF000
stack
page read and write
3D5F000
stack
page read and write
145B000
heap
page read and write
4B51000
heap
page read and write
1D730000
heap
page read and write
335F000
stack
page read and write
321F000
stack
page read and write
4B51000
heap
page read and write
4B40000
direct allocation
page read and write
501B000
stack
page read and write
4B51000
heap
page read and write
439F000
stack
page read and write
1D34D000
stack
page read and write
389E000
stack
page read and write
385F000
stack
page read and write
1D736000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
48DE000
stack
page read and write
4B51000
heap
page read and write
2E8C000
stack
page read and write
321000
unkown
page execute and read and write
1D09E000
stack
page read and write
320000
unkown
page readonly
10F5000
stack
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
49DF000
stack
page read and write
4B51000
heap
page read and write
4B40000
direct allocation
page read and write
61ED3000
direct allocation
page execute and read and write
35C000
unkown
page execute and read and write
12CE000
stack
page read and write
4B40000
direct allocation
page read and write
3C1F000
stack
page read and write
349F000
stack
page read and write
4B51000
heap
page read and write
98C000
unkown
page execute and write copy
4B51000
heap
page read and write
411000
unkown
page execute and read and write
2ED0000
heap
page read and write
3E9F000
stack
page read and write
3C5E000
stack
page read and write
320000
unkown
page read and write
238CF000
stack
page read and write
2FDF000
stack
page read and write
411F000
stack
page read and write
5150000
direct allocation
page execute and read and write
1227000
heap
page read and write
4B40000
direct allocation
page read and write
4B40000
direct allocation
page read and write
479E000
stack
page read and write
4C7000
unkown
page execute and read and write
34DE000
stack
page read and write
1D58C000
stack
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4B20000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
361E000
stack
page read and write
371F000
stack
page read and write
489F000
stack
page read and write
11F6000
heap
page read and write
4B40000
direct allocation
page read and write
44DF000
stack
page read and write
7F6000
unkown
page execute and read and write
4CD000
unkown
page execute and read and write
DA0000
heap
page read and write
54C000
unkown
page execute and read and write
4B51000
heap
page read and write
4B40000
direct allocation
page read and write
415E000
stack
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
4FE0000
direct allocation
page read and write
3EDE000
stack
page read and write
4B51000
heap
page read and write
11E1000
heap
page read and write
321000
unkown
page execute and write copy
475F000
stack
page read and write
4B51000
heap
page read and write
1D853000
heap
page read and write
4B51000
heap
page read and write
39DE000
stack
page read and write
4B50000
heap
page read and write
461F000
stack
page read and write
4B51000
heap
page read and write
1D44D000
stack
page read and write
4A7000
unkown
page execute and read and write
4C50000
trusted library allocation
page read and write
4B51000
heap
page read and write
3E4000
unkown
page execute and read and write
4B51000
heap
page read and write
1CF5E000
stack
page read and write
2E4F000
stack
page read and write
4B51000
heap
page read and write
113E000
stack
page read and write
119A000
heap
page read and write
4B51000
heap
page read and write
325E000
stack
page read and write
4B40000
direct allocation
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
465E000
stack
page read and write
4B51000
heap
page read and write
5160000
direct allocation
page execute and read and write
4B51000
heap
page read and write
375E000
stack
page read and write
4B40000
direct allocation
page read and write
2EDB000
heap
page read and write
339E000
stack
page read and write
4B40000
direct allocation
page read and write
1D19F000
stack
page read and write
3D9E000
stack
page read and write
7DF000
unkown
page execute and read and write
4B51000
heap
page read and write
401E000
stack
page read and write
451E000
stack
page read and write
399F000
stack
page read and write
425E000
stack
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
5170000
direct allocation
page execute and read and write
1CF1F000
stack
page read and write
4B51000
heap
page read and write
1180000
heap
page read and write
1D850000
trusted library allocation
page read and write
4B40000
direct allocation
page read and write
1D05F000
stack
page read and write
5180000
direct allocation
page execute and read and write
3FDF000
stack
page read and write
4B65000
heap
page read and write
4B51000
heap
page read and write
12D5000
heap
page read and write
4B51000
heap
page read and write
1212000
heap
page read and write
1D1FE000
stack
page read and write
7E7000
unkown
page execute and read and write
429E000
stack
page read and write
4B51000
heap
page read and write
35DF000
stack
page read and write
516E000
stack
page read and write
4B51000
heap
page read and write
5130000
direct allocation
page execute and read and write
4B40000
direct allocation
page read and write
4B51000
heap
page read and write
11E3000
heap
page read and write
There are 209 hidden memdumps, click here to show them.