IOC Report
DSR0987678900000.exe

loading gif

Files

File Path
Type
Category
Malicious
DSR0987678900000.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_DSR0987678900000_7e74b1b87155529a3ff0bd98fc2c8d3a6c378e49_a7480bc7_055a7e94-47cf-4121-8aa6-26f4dc22353a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1637.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER16A6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA6F.tmp.dmp
Mini DuMP crash report, 16 streams, Thu Sep 26 13:09:17 2024, 0x1205a4 type
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i4ti4kez.vbv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ka5pv3g1.2pp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ljiicu1b.ymn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rdt4hkkt.11g.psm1
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DSR0987678900000.exe
"C:\Users\user\Desktop\DSR0987678900000.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DSR0987678900000.exe" -Force
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2756 -s 1224
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
http://upx.sf.net
unknown
http://ftp.antoniomayol.com
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious
ftp.antoniomayol.com
15.197.240.20
malicious
241.42.69.40.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
15.197.240.20
ftp.antoniomayol.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
EnableLUA
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance
Enabled
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileDirectory
\REGISTRY\A\{94e311d3-5054-4602-4a36-bc3fa223ecb9}\Root\InventoryApplicationFile\dsr0987678900000|97ab87626a47e8c1
ProgramId
\REGISTRY\A\{94e311d3-5054-4602-4a36-bc3fa223ecb9}\Root\InventoryApplicationFile\dsr0987678900000|97ab87626a47e8c1
FileId
\REGISTRY\A\{94e311d3-5054-4602-4a36-bc3fa223ecb9}\Root\InventoryApplicationFile\dsr0987678900000|97ab87626a47e8c1
LowerCaseLongPath
\REGISTRY\A\{94e311d3-5054-4602-4a36-bc3fa223ecb9}\Root\InventoryApplicationFile\dsr0987678900000|97ab87626a47e8c1
LongPathHash
\REGISTRY\A\{94e311d3-5054-4602-4a36-bc3fa223ecb9}\Root\InventoryApplicationFile\dsr0987678900000|97ab87626a47e8c1
Name
\REGISTRY\A\{94e311d3-5054-4602-4a36-bc3fa223ecb9}\Root\InventoryApplicationFile\dsr0987678900000|97ab87626a47e8c1
OriginalFileName
\REGISTRY\A\{94e311d3-5054-4602-4a36-bc3fa223ecb9}\Root\InventoryApplicationFile\dsr0987678900000|97ab87626a47e8c1
Publisher
\REGISTRY\A\{94e311d3-5054-4602-4a36-bc3fa223ecb9}\Root\InventoryApplicationFile\dsr0987678900000|97ab87626a47e8c1
Version
\REGISTRY\A\{94e311d3-5054-4602-4a36-bc3fa223ecb9}\Root\InventoryApplicationFile\dsr0987678900000|97ab87626a47e8c1
BinFileVersion
\REGISTRY\A\{94e311d3-5054-4602-4a36-bc3fa223ecb9}\Root\InventoryApplicationFile\dsr0987678900000|97ab87626a47e8c1
BinaryType
\REGISTRY\A\{94e311d3-5054-4602-4a36-bc3fa223ecb9}\Root\InventoryApplicationFile\dsr0987678900000|97ab87626a47e8c1
ProductName
\REGISTRY\A\{94e311d3-5054-4602-4a36-bc3fa223ecb9}\Root\InventoryApplicationFile\dsr0987678900000|97ab87626a47e8c1
ProductVersion
\REGISTRY\A\{94e311d3-5054-4602-4a36-bc3fa223ecb9}\Root\InventoryApplicationFile\dsr0987678900000|97ab87626a47e8c1
LinkDate
\REGISTRY\A\{94e311d3-5054-4602-4a36-bc3fa223ecb9}\Root\InventoryApplicationFile\dsr0987678900000|97ab87626a47e8c1
BinProductVersion
\REGISTRY\A\{94e311d3-5054-4602-4a36-bc3fa223ecb9}\Root\InventoryApplicationFile\dsr0987678900000|97ab87626a47e8c1
AppxPackageFullName
\REGISTRY\A\{94e311d3-5054-4602-4a36-bc3fa223ecb9}\Root\InventoryApplicationFile\dsr0987678900000|97ab87626a47e8c1
AppxPackageRelativeId
\REGISTRY\A\{94e311d3-5054-4602-4a36-bc3fa223ecb9}\Root\InventoryApplicationFile\dsr0987678900000|97ab87626a47e8c1
Size
\REGISTRY\A\{94e311d3-5054-4602-4a36-bc3fa223ecb9}\Root\InventoryApplicationFile\dsr0987678900000|97ab87626a47e8c1
Language
\REGISTRY\A\{94e311d3-5054-4602-4a36-bc3fa223ecb9}\Root\InventoryApplicationFile\dsr0987678900000|97ab87626a47e8c1
Usn
There are 26 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1EB8034D000
trusted library allocation
page read and write
malicious
3161000
trusted library allocation
page read and write
malicious
1EB90811000
trusted library allocation
page read and write
malicious
318E000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
1310000
heap
page read and write
1573EFE000
stack
page read and write
1740000
heap
page read and write
1349000
heap
page read and write
16C0000
trusted library allocation
page read and write
149B000
trusted library allocation
page execute and read and write
1EBEE170000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
3020000
heap
page execute and read and write
318C000
trusted library allocation
page read and write
7FFD9B7E2000
trusted library allocation
page read and write
15739FE000
stack
page read and write
1450000
trusted library allocation
page read and write
1EBEDF8C000
heap
page read and write
1EBEDE10000
unkown
page readonly
12EE000
stack
page read and write
1492000
trusted library allocation
page read and write
6CCF000
stack
page read and write
695D000
trusted library allocation
page read and write
69A0000
trusted library allocation
page execute and read and write
7FFD9B7FD000
trusted library allocation
page execute and read and write
5596000
trusted library allocation
page read and write
13E0000
heap
page read and write
649B000
heap
page read and write
1497000
trusted library allocation
page execute and read and write
5570000
trusted library allocation
page read and write
6C8E000
stack
page read and write
6AE0000
trusted library allocation
page read and write
69F7000
trusted library allocation
page read and write
1490000
trusted library allocation
page read and write
6E80000
trusted library allocation
page execute and read and write
1EBEDF05000
heap
page read and write
1730000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page read and write
134C000
heap
page read and write
1175000
heap
page read and write
6440000
heap
page read and write
69F0000
trusted library allocation
page read and write
31A2000
trusted library allocation
page read and write
1486000
trusted library allocation
page execute and read and write
2F68000
trusted library allocation
page read and write
1EBEDFCE000
heap
page read and write
6900000
heap
page read and write
134E000
heap
page read and write
1190000
heap
page read and write
3131000
trusted library allocation
page read and write
1EBEFB20000
trusted library allocation
page read and write
146D000
trusted library allocation
page execute and read and write
7FFD9B80D000
trusted library allocation
page execute and read and write
7FFD9B89C000
trusted library allocation
page execute and read and write
7FF4A8520000
trusted library allocation
page execute and read and write
14B0000
heap
page read and write
5582000
trusted library allocation
page read and write
1EBEE183000
trusted library allocation
page read and write
1EBEE04F000
heap
page read and write
1318000
heap
page read and write
1139000
stack
page read and write
1EBEFAC0000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
1EBF05AF000
heap
page read and write
17B0000
heap
page read and write
1EBEDF6C000
heap
page read and write
6A8E000
stack
page read and write
147D000
trusted library allocation
page execute and read and write
1EBEE150000
trusted library allocation
page read and write
1EB90001000
trusted library allocation
page read and write
648E000
heap
page read and write
5576000
trusted library allocation
page read and write
4131000
trusted library allocation
page read and write
1EBF0571000
heap
page read and write
15BF000
stack
page read and write
1EBF05A3000
heap
page read and write
103A000
stack
page read and write
6ACE000
stack
page read and write
7FFD9B804000
trusted library allocation
page read and write
5640000
heap
page execute and read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B7ED000
trusted library allocation
page execute and read and write
1470000
trusted library allocation
page read and write
7FFD9B7E3000
trusted library allocation
page execute and read and write
1EB800D9000
trusted library allocation
page read and write
17A0000
trusted library allocation
page read and write
16BE000
stack
page read and write
557B000
trusted library allocation
page read and write
558A000
trusted library allocation
page read and write
312E000
stack
page read and write
15744FC000
stack
page read and write
17B6000
heap
page read and write
1573BFC000
stack
page read and write
1EBEE240000
heap
page read and write
1573FFE000
stack
page read and write
55A2000
trusted library allocation
page read and write
6950000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1EBF03B0000
heap
page execute and read and write
7FFD9B9E0000
trusted library allocation
page read and write
6920000
trusted library allocation
page execute and read and write
1EBEDF00000
heap
page read and write
15743FE000
stack
page read and write
7FFD9B9E7000
trusted library allocation
page read and write
7000000
heap
page read and write
6937000
trusted library allocation
page read and write
1EBEDF30000
heap
page read and write
55EC000
stack
page read and write
68FE000
stack
page read and write
589C000
stack
page read and write
329F000
trusted library allocation
page read and write
7FFD9B9F1000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page execute and read and write
170E000
stack
page read and write
6E30000
heap
page read and write
318A000
trusted library allocation
page read and write
1170000
heap
page read and write
1482000
trusted library allocation
page read and write
7FFD9B7E4000
trusted library allocation
page read and write
1464000
trusted library allocation
page read and write
1573AFE000
stack
page read and write
12AE000
stack
page read and write
12F0000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1EBEDF60000
heap
page read and write
7FFD9B9BE000
trusted library allocation
page read and write
133A000
heap
page read and write
7EE80000
trusted library allocation
page execute and read and write
1EBEDE12000
unkown
page readonly
1346000
heap
page read and write
7FFD9B800000
trusted library allocation
page read and write
5591000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
1EB80001000
trusted library allocation
page read and write
1EB90007000
trusted library allocation
page read and write
1463000
trusted library allocation
page execute and read and write
1EBEDFA2000
heap
page read and write
7FFD9B999000
trusted library allocation
page read and write
1EBEDED0000
heap
page read and write
13E3000
heap
page read and write
1EBEFAE8000
heap
page read and write
1EBF02C0000
trusted library section
page read and write
6E0E000
stack
page read and write
1EBEDFD6000
heap
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
1480000
trusted library allocation
page read and write
1EBEDF66000
heap
page read and write
1EBF0380000
heap
page read and write
3495000
trusted library allocation
page read and write
644D000
heap
page read and write
1EB90B75000
trusted library allocation
page read and write
644B000
heap
page read and write
1EB8015D000
trusted library allocation
page read and write
1495000
trusted library allocation
page execute and read and write
3194000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
7FFD9B8C6000
trusted library allocation
page execute and read and write
56A0000
heap
page read and write
1EBEE200000
heap
page execute and read and write
67FE000
stack
page read and write
132E000
heap
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
1EBF053E000
heap
page read and write
699D000
stack
page read and write
1EBEDF8A000
heap
page read and write
559D000
trusted library allocation
page read and write
1EBEDFA5000
heap
page read and write
1EBEDEE0000
heap
page read and write
1EB80041000
trusted library allocation
page read and write
7FFD9B80B000
trusted library allocation
page execute and read and write
1EBEE245000
heap
page read and write
66BD000
stack
page read and write
15738FE000
stack
page read and write
400000
remote allocation
page execute and read and write
13F3000
heap
page read and write
5690000
heap
page read and write
1573DFE000
stack
page read and write
1EB90AE4000
trusted library allocation
page read and write
64AE000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
1EBEDF10000
heap
page read and write
5693000
heap
page read and write
1720000
trusted library allocation
page read and write
419A000
trusted library allocation
page read and write
1EBF05A7000
heap
page read and write
1EB800C8000
trusted library allocation
page read and write
1EBEE180000
trusted library allocation
page read and write
7FFD9B7F2000
trusted library allocation
page read and write
1EBF0500000
heap
page read and write
558E000
trusted library allocation
page read and write
1EBF05C3000
heap
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
13A6000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page execute and read and write
522D000
stack
page read and write
1EBF055B000
heap
page read and write
178C000
stack
page read and write
1790000
trusted library allocation
page read and write
1420000
heap
page read and write
6D0E000
stack
page read and write
6918000
trusted library allocation
page read and write
1710000
trusted library allocation
page execute and read and write
1460000
trusted library allocation
page read and write
4159000
trusted library allocation
page read and write
1EBEDFD1000
heap
page read and write
15742FD000
stack
page read and write
13D8000
heap
page read and write
1EBEFAE0000
heap
page read and write
148A000
trusted library allocation
page execute and read and write
15735F3000
stack
page read and write
6910000
trusted library allocation
page read and write
69EE000
stack
page read and write
6940000
trusted library allocation
page read and write
67BE000
stack
page read and write
7FFD9B896000
trusted library allocation
page read and write
There are 208 hidden memdumps, click here to show them.