IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_ecb872d877965a585f2559d793b7e616f71336be_e7084c5b_b47a1fa4-8427-46b0-822d-ea551c172590\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7021.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Sep 30 14:11:44 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7802.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7822.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6524 -s 396

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{fd84fc42-a47c-3133-e985-119d8c510db4}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProgramId
malicious
\REGISTRY\A\{fd84fc42-a47c-3133-e985-119d8c510db4}\Root\InventoryApplicationFile\file.exe|634507f567776d77
FileId
malicious
\REGISTRY\A\{fd84fc42-a47c-3133-e985-119d8c510db4}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LowerCaseLongPath
malicious
\REGISTRY\A\{fd84fc42-a47c-3133-e985-119d8c510db4}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LongPathHash
malicious
\REGISTRY\A\{fd84fc42-a47c-3133-e985-119d8c510db4}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Name
malicious
\REGISTRY\A\{fd84fc42-a47c-3133-e985-119d8c510db4}\Root\InventoryApplicationFile\file.exe|634507f567776d77
OriginalFileName
malicious
\REGISTRY\A\{fd84fc42-a47c-3133-e985-119d8c510db4}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Publisher
malicious
\REGISTRY\A\{fd84fc42-a47c-3133-e985-119d8c510db4}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Version
malicious
\REGISTRY\A\{fd84fc42-a47c-3133-e985-119d8c510db4}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinFileVersion
malicious
\REGISTRY\A\{fd84fc42-a47c-3133-e985-119d8c510db4}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinaryType
malicious
\REGISTRY\A\{fd84fc42-a47c-3133-e985-119d8c510db4}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProductName
malicious
\REGISTRY\A\{fd84fc42-a47c-3133-e985-119d8c510db4}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProductVersion
malicious
\REGISTRY\A\{fd84fc42-a47c-3133-e985-119d8c510db4}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LinkDate
malicious
\REGISTRY\A\{fd84fc42-a47c-3133-e985-119d8c510db4}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinProductVersion
malicious
\REGISTRY\A\{fd84fc42-a47c-3133-e985-119d8c510db4}\Root\InventoryApplicationFile\file.exe|634507f567776d77
AppxPackageFullName
malicious
\REGISTRY\A\{fd84fc42-a47c-3133-e985-119d8c510db4}\Root\InventoryApplicationFile\file.exe|634507f567776d77
AppxPackageRelativeId
malicious
\REGISTRY\A\{fd84fc42-a47c-3133-e985-119d8c510db4}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Size
malicious
\REGISTRY\A\{fd84fc42-a47c-3133-e985-119d8c510db4}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Language
malicious
\REGISTRY\A\{fd84fc42-a47c-3133-e985-119d8c510db4}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
451000
unkown
page readonly
407000
unkown
page readonly
A1000
stack
page read and write
74A000
heap
page read and write
400000
unkown
page readonly
1F0000
heap
page read and write
40C000
unkown
page readonly
407000
unkown
page readonly
740000
heap
page read and write
411000
unkown
page readonly
451000
unkown
page readonly
40B000
unkown
page read and write
411000
unkown
page readonly
610000
heap
page read and write
401000
unkown
page execute read
415000
unkown
page readonly
74E000
heap
page read and write
5BE000
stack
page read and write
57E000
stack
page read and write
71E000
stack
page read and write
401000
unkown
page execute read
40C000
unkown
page readonly
530000
heap
page read and write
93F000
stack
page read and write
400000
unkown
page readonly
75B000
heap
page read and write
9C000
stack
page read and write
408000
unkown
page write copy
415000
unkown
page readonly
5E0000
heap
page read and write
408000
unkown
page write copy
There are 21 hidden memdumps, click here to show them.