IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_455b5ddbe96ff1fb6e298df1c6cfe599588679_6983241a_cd0d6090-ee71-407c-9713-1cba797ca396\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\EHJKJDGCGDAKFHIDBGCBKJEHIE
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER19B0.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Sep 1 21:04:02 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1B67.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1C04.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 1544

URLs

Name
IP
Malicious
http://185.215.113.100/e2b1563c6670f193.php
185.215.113.100
malicious
http://185.215.113.100/e2b1563c6670f193.phpi
unknown
malicious
http://185.215.113.1000d60be0de163924d/sqlite3.dllY2l8MXwwfDB8TWV0YU1hc2t8ZWpiYWxiYWtvcGxjaGxnaGVjZG
unknown
malicious
http://185.215.113.100/0d60be0de163924d/sqlite3.dll
185.215.113.100
malicious
http://185.215.113.100/0d60be0de163924d/sqlite3.dllk.
unknown
malicious
http://185.215.113.100/e2b1563c6670f193.phpo
unknown
malicious
http://185.215.113.100/0d60be0de163924d/sqlite3.dllK
unknown
malicious
http://185.215.113.100/e2b1563c6670f193.phpion:
unknown
malicious
http://185.215.113.100
unknown
malicious
http://185.215.113.100/e2b1563c6670f193.phpU
unknown
malicious
http://185.215.113.100/e2b1563c6670f193.phpser
unknown
malicious
http://185.215.113.100/e2b1563c6670f193.phpZWVta2JnY2l8MXwwfDB8TWV0YU1hc2t8ZWpiYWxiYWtvcGxjaGxnaGVjZ
unknown
malicious
http://185.215.1
unknown
malicious
http://185.215.113.100/e2b1563c6670f193.php9
unknown
malicious
http://185.215.113.100/e2b1563c6670f193.phpinit.exe
unknown
malicious
http://185.215.113.100Local
unknown
malicious
http://185.215.113.100/0d60be0de163924d/sqlite3.dll1563c6670f193.php1_
unknown
malicious
http://185.215.113.100DBG
unknown
malicious
http://185.215.113.100/
185.215.113.100
malicious
http://185.215.113.100s.exe
unknown
malicious
http://185.215.113.100/e2b1563c6670f193.php&
unknown
malicious
http://185.215.113.100/e2b1563c6670f193.phpf
unknown
malicious
http://185.215.113.100Dm
unknown
malicious
http://upx.sf.net
unknown
There are 14 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.100
unknown
Portugal
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{dc0115cf-9421-8da2-70c0-727e44ac814c}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{dc0115cf-9421-8da2-70c0-727e44ac814c}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{dc0115cf-9421-8da2-70c0-727e44ac814c}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{dc0115cf-9421-8da2-70c0-727e44ac814c}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{dc0115cf-9421-8da2-70c0-727e44ac814c}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{dc0115cf-9421-8da2-70c0-727e44ac814c}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{dc0115cf-9421-8da2-70c0-727e44ac814c}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{dc0115cf-9421-8da2-70c0-727e44ac814c}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{dc0115cf-9421-8da2-70c0-727e44ac814c}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{dc0115cf-9421-8da2-70c0-727e44ac814c}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{dc0115cf-9421-8da2-70c0-727e44ac814c}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{dc0115cf-9421-8da2-70c0-727e44ac814c}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{dc0115cf-9421-8da2-70c0-727e44ac814c}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{dc0115cf-9421-8da2-70c0-727e44ac814c}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{dc0115cf-9421-8da2-70c0-727e44ac814c}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{dc0115cf-9421-8da2-70c0-727e44ac814c}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{dc0115cf-9421-8da2-70c0-727e44ac814c}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{dc0115cf-9421-8da2-70c0-727e44ac814c}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{dc0115cf-9421-8da2-70c0-727e44ac814c}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
8CA000
unkown
page execute and read and write
malicious
136E000
heap
page read and write
malicious
49CF000
stack
page read and write
400E000
stack
page read and write
4B0F000
stack
page read and write
14D0000
heap
page read and write
4D91000
heap
page read and write
308F000
stack
page read and write
4D91000
heap
page read and write
534F000
stack
page read and write
3110000
direct allocation
page read and write
14D4000
heap
page read and write
4D91000
heap
page read and write
1D3FF000
stack
page read and write
4D91000
heap
page read and write
1360000
heap
page read and write
3147000
heap
page read and write
FE0000
heap
page read and write
4D91000
heap
page read and write
3110000
direct allocation
page read and write
30CB000
stack
page read and write
1D1BE000
stack
page read and write
384F000
stack
page read and write
D4F000
unkown
page execute and read and write
A8C000
unkown
page execute and read and write
324F000
stack
page read and write
4D91000
heap
page read and write
14D4000
heap
page read and write
524C000
stack
page read and write
4D91000
heap
page read and write
3E8F000
stack
page read and write
4E90000
trusted library allocation
page read and write
4D91000
heap
page read and write
338E000
stack
page read and write
14D4000
heap
page read and write
4D91000
heap
page read and write
4C4F000
stack
page read and write
4D91000
heap
page read and write
5350000
direct allocation
page execute and read and write
3ACF000
stack
page read and write
EF7000
unkown
page execute and read and write
1D7CC000
stack
page read and write
14D4000
heap
page read and write
951000
unkown
page execute and read and write
4D91000
heap
page read and write
474F000
stack
page read and write
14D4000
heap
page read and write
428E000
stack
page read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
4D91000
heap
page read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
4D91000
heap
page read and write
8F3000
unkown
page execute and read and write
3140000
heap
page read and write
388E000
stack
page read and write
2F8E000
stack
page read and write
FF0000
heap
page read and write
1D17F000
stack
page read and write
464E000
stack
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
310E000
stack
page read and write
861000
unkown
page execute and write copy
4D91000
heap
page read and write
4C8E000
stack
page read and write
53A0000
direct allocation
page execute and read and write
13B1000
heap
page read and write
4D91000
heap
page read and write
13C7000
heap
page read and write
478E000
stack
page read and write
4D91000
heap
page read and write
14D4000
heap
page read and write
4D91000
heap
page read and write
3110000
direct allocation
page read and write
1D830000
heap
page read and write
5210000
direct allocation
page read and write
1D53F000
stack
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
A0D000
unkown
page execute and read and write
1368000
heap
page read and write
12F5000
stack
page read and write
424F000
stack
page read and write
4D91000
heap
page read and write
314B000
heap
page read and write
4D91000
heap
page read and write
348F000
stack
page read and write
4D91000
heap
page read and write
D37000
unkown
page execute and read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
1D6CD000
stack
page read and write
4D91000
heap
page read and write
14D4000
heap
page read and write
13E3000
heap
page read and write
AA0000
unkown
page execute and read and write
9E7000
unkown
page execute and read and write
14D4000
heap
page read and write
4D91000
heap
page read and write
3110000
direct allocation
page read and write
4D91000
heap
page read and write
14D4000
heap
page read and write
4D91000
heap
page read and write
3130000
direct allocation
page read and write
1D957000
heap
page read and write
1D832000
heap
page read and write
4D91000
heap
page read and write
EF8000
unkown
page execute and write copy
44CF000
stack
page read and write
4D90000
heap
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
5380000
direct allocation
page execute and read and write
3110000
direct allocation
page read and write
14D4000
heap
page read and write
51F0000
heap
page read and write
1419000
heap
page read and write
334F000
stack
page read and write
924000
unkown
page execute and read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
1D2BF000
stack
page read and write
4D91000
heap
page read and write
860000
unkown
page readonly
4D91000
heap
page read and write
14D4000
heap
page read and write
3D8E000
stack
page read and write
374E000
stack
page read and write
F8C000
stack
page read and write
14D4000
heap
page read and write
13B3000
heap
page read and write
4B4E000
stack
page read and write
4D91000
heap
page read and write
95D000
unkown
page execute and read and write
1D950000
trusted library allocation
page read and write
16AF000
stack
page read and write
43CE000
stack
page read and write
D50000
unkown
page execute and write copy
D4F000
unkown
page execute and write copy
3110000
direct allocation
page read and write
14D4000
heap
page read and write
4D91000
heap
page read and write
3C4E000
stack
page read and write
4D91000
heap
page read and write
5380000
direct allocation
page execute and read and write
4DB0000
heap
page read and write
14D4000
heap
page read and write
3110000
direct allocation
page read and write
410F000
stack
page read and write
14D4000
heap
page read and write
4DA0000
heap
page read and write
14D4000
heap
page read and write
4A0E000
stack
page read and write
4D91000
heap
page read and write
360E000
stack
page read and write
931000
unkown
page execute and read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
14D4000
heap
page read and write
8FF000
unkown
page execute and read and write
61E00000
direct allocation
page execute and read and write
4D91000
heap
page read and write
14D4000
heap
page read and write
D40000
unkown
page execute and read and write
488F000
stack
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
4D8F000
stack
page read and write
414E000
stack
page read and write
14D4000
heap
page read and write
4D91000
heap
page read and write
1D43E000
stack
page read and write
14D4000
heap
page read and write
135E000
stack
page read and write
3ECE000
stack
page read and write
A07000
unkown
page execute and read and write
35CF000
stack
page read and write
1D58E000
stack
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
48CE000
stack
page read and write
4D91000
heap
page read and write
3110000
direct allocation
page read and write
4D91000
heap
page read and write
861000
unkown
page execute and read and write
3130000
direct allocation
page read and write
1D68E000
stack
page read and write
14D4000
heap
page read and write
398F000
stack
page read and write
1D07E000
stack
page read and write
3110000
direct allocation
page read and write
14D4000
heap
page read and write
4D91000
heap
page read and write
450E000
stack
page read and write
370F000
stack
page read and write
14D4000
heap
page read and write
4D91000
heap
page read and write
3D4F000
stack
page read and write
12FD000
stack
page read and write
C34000
unkown
page execute and read and write
5370000
direct allocation
page execute and read and write
4D91000
heap
page read and write
14D4000
heap
page read and write
3110000
direct allocation
page read and write
3110000
direct allocation
page read and write
14D4000
heap
page read and write
4D91000
heap
page read and write
860000
unkown
page read and write
D12000
unkown
page execute and read and write
34CE000
stack
page read and write
1D2FE000
stack
page read and write
89C000
unkown
page execute and read and write
39CE000
stack
page read and write
14D4000
heap
page read and write
3110000
direct allocation
page read and write
3B0E000
stack
page read and write
4D91000
heap
page read and write
5390000
direct allocation
page execute and read and write
460F000
stack
page read and write
3C0F000
stack
page read and write
14C0000
heap
page read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
3FCF000
stack
page read and write
438F000
stack
page read and write
4D91000
heap
page read and write
4D94000
heap
page read and write
14D4000
heap
page read and write
4D91000
heap
page read and write
3110000
direct allocation
page read and write
3110000
direct allocation
page read and write
There are 229 hidden memdumps, click here to show them.