IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_819e5e45b8a757e26ca9bd44e6d9284b79b3342d_a5cec3f2_cc731495-7ed1-4e80-ae92-d0ff6260b0e3\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1BD.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1FC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER83.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Oct 11 02:45:14 2024, 0x1205a4 type
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6528 -s 1496

URLs

Name
IP
Malicious
http://185.215.113.37/p
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/I
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
malicious
http://185.215.113.37D
unknown
malicious
http://upx.sf.net
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{5a671991-26fe-41df-408c-25ffd85b28ac}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{5a671991-26fe-41df-408c-25ffd85b28ac}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{5a671991-26fe-41df-408c-25ffd85b28ac}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{5a671991-26fe-41df-408c-25ffd85b28ac}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{5a671991-26fe-41df-408c-25ffd85b28ac}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{5a671991-26fe-41df-408c-25ffd85b28ac}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{5a671991-26fe-41df-408c-25ffd85b28ac}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{5a671991-26fe-41df-408c-25ffd85b28ac}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{5a671991-26fe-41df-408c-25ffd85b28ac}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{5a671991-26fe-41df-408c-25ffd85b28ac}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{5a671991-26fe-41df-408c-25ffd85b28ac}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{5a671991-26fe-41df-408c-25ffd85b28ac}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{5a671991-26fe-41df-408c-25ffd85b28ac}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{5a671991-26fe-41df-408c-25ffd85b28ac}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{5a671991-26fe-41df-408c-25ffd85b28ac}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{5a671991-26fe-41df-408c-25ffd85b28ac}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{5a671991-26fe-41df-408c-25ffd85b28ac}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{5a671991-26fe-41df-408c-25ffd85b28ac}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{5a671991-26fe-41df-408c-25ffd85b28ac}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
154E000
heap
page read and write
malicious
AE1000
unkown
page execute and read and write
malicious
B7A000
unkown
page execute and read and write
malicious
52F0000
direct allocation
page read and write
malicious
4E71000
heap
page read and write
4D2F000
stack
page read and write
4E71000
heap
page read and write
1480000
direct allocation
page read and write
332F000
stack
page read and write
1494000
heap
page read and write
1D4AE000
stack
page read and write
4E71000
heap
page read and write
3CEF000
stack
page read and write
1D87F000
stack
page read and write
FD2000
unkown
page execute and read and write
B42000
unkown
page execute and read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
1D5EF000
stack
page read and write
3FAE000
stack
page read and write
1494000
heap
page read and write
31F0000
direct allocation
page execute and read and write
5430000
direct allocation
page execute and read and write
40EE000
stack
page read and write
4E71000
heap
page read and write
542F000
stack
page read and write
1480000
direct allocation
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
1494000
heap
page read and write
1494000
heap
page read and write
4BEF000
stack
page read and write
4E71000
heap
page read and write
496F000
stack
page read and write
1DA00000
trusted library allocation
page read and write
B6F000
unkown
page execute and read and write
482F000
stack
page read and write
1D4EE000
stack
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
1494000
heap
page read and write
1494000
heap
page read and write
37EF000
stack
page read and write
472E000
stack
page read and write
1D36E000
stack
page read and write
4E71000
heap
page read and write
1494000
heap
page read and write
322B000
heap
page read and write
98C000
stack
page read and write
4E71000
heap
page read and write
1D73C000
stack
page read and write
1494000
heap
page read and write
1480000
direct allocation
page read and write
1480000
direct allocation
page read and write
532B000
stack
page read and write
1494000
heap
page read and write
1494000
heap
page read and write
46EF000
stack
page read and write
4E71000
heap
page read and write
D3E000
unkown
page execute and read and write
392E000
stack
page read and write
4E71000
heap
page read and write
4AAF000
stack
page read and write
1494000
heap
page read and write
15B2000
heap
page read and write
1480000
direct allocation
page read and write
AE0000
unkown
page read and write
FE0000
unkown
page execute and write copy
4E71000
heap
page read and write
11A0000
heap
page read and write
1494000
heap
page read and write
1540000
heap
page read and write
D2A000
unkown
page execute and read and write
3220000
heap
page read and write
1494000
heap
page read and write
1590000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
3E2F000
stack
page read and write
4E71000
heap
page read and write
1494000
heap
page read and write
4E71000
heap
page read and write
1494000
heap
page read and write
1593000
heap
page read and write
1494000
heap
page read and write
4E90000
heap
page read and write
117E000
unkown
page execute and write copy
A8E000
stack
page read and write
4E71000
heap
page read and write
B65000
unkown
page execute and read and write
4E71000
heap
page read and write
1480000
direct allocation
page read and write
5440000
direct allocation
page execute and read and write
1494000
heap
page read and write
15B0000
heap
page read and write
190E000
stack
page read and write
4E71000
heap
page read and write
FA2000
unkown
page execute and read and write
436E000
stack
page read and write
1494000
heap
page read and write
45AF000
stack
page read and write
117D000
unkown
page execute and read and write
41EF000
stack
page read and write
180F000
stack
page read and write
1494000
heap
page read and write
4E71000
heap
page read and write
1494000
heap
page read and write
FE0000
unkown
page execute and read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
1190000
heap
page read and write
4F70000
trusted library allocation
page read and write
1D22F000
stack
page read and write
31AF000
stack
page read and write
1D8E3000
heap
page read and write
1548000
heap
page read and write
5430000
direct allocation
page execute and read and write
4E71000
heap
page read and write
1480000
direct allocation
page read and write
4E80000
heap
page read and write
382E000
stack
page read and write
1494000
heap
page read and write
1494000
heap
page read and write
4E71000
heap
page read and write
3A6F000
stack
page read and write
1D26E000
stack
page read and write
1494000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
14DE000
stack
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
40AF000
stack
page read and write
1494000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
36EE000
stack
page read and write
45EE000
stack
page read and write
446F000
stack
page read and write
4E71000
heap
page read and write
AE1000
unkown
page execute and write copy
346E000
stack
page read and write
3210000
direct allocation
page execute and read and write
44AE000
stack
page read and write
ECA000
unkown
page execute and read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
1494000
heap
page read and write
4E71000
heap
page read and write
422E000
stack
page read and write
1480000
direct allocation
page read and write
1480000
direct allocation
page read and write
B3A000
unkown
page execute and read and write
1494000
heap
page read and write
1530000
direct allocation
page read and write
143E000
stack
page read and write
31EE000
stack
page read and write
FE1000
unkown
page execute and write copy
1D12E000
stack
page read and write
1494000
heap
page read and write
4E71000
heap
page read and write
3D2E000
stack
page read and write
FC8000
unkown
page execute and read and write
3227000
heap
page read and write
4E71000
heap
page read and write
4AEE000
stack
page read and write
1494000
heap
page read and write
151C000
stack
page read and write
1480000
direct allocation
page read and write
1494000
heap
page read and write
1D63D000
stack
page read and write
4E71000
heap
page read and write
15A6000
heap
page read and write
35AE000
stack
page read and write
3200000
direct allocation
page execute and read and write
1480000
direct allocation
page read and write
4E6F000
stack
page read and write
36AF000
stack
page read and write
4E71000
heap
page read and write
1530000
direct allocation
page read and write
1494000
heap
page read and write
3AAE000
stack
page read and write
396E000
stack
page read and write
AE0000
unkown
page readonly
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
B68000
unkown
page execute and read and write
A85000
stack
page read and write
15C2000
heap
page read and write
4E71000
heap
page read and write
3BAF000
stack
page read and write
49AE000
stack
page read and write
1494000
heap
page read and write
1494000
heap
page read and write
342F000
stack
page read and write
1494000
heap
page read and write
4E71000
heap
page read and write
1480000
direct allocation
page read and write
4E71000
heap
page read and write
1494000
heap
page read and write
356F000
stack
page read and write
4C2E000
stack
page read and write
1480000
direct allocation
page read and write
3F6F000
stack
page read and write
4D6E000
stack
page read and write
432F000
stack
page read and write
4E70000
heap
page read and write
1494000
heap
page read and write
11F0000
heap
page read and write
1D3AE000
stack
page read and write
52B0000
heap
page read and write
1494000
heap
page read and write
1D77D000
stack
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
1480000
direct allocation
page read and write
4E77000
heap
page read and write
3E6E000
stack
page read and write
3BEE000
stack
page read and write
5450000
direct allocation
page execute and read and write
1490000
heap
page read and write
4E71000
heap
page read and write
147E000
stack
page read and write
486E000
stack
page read and write
1494000
heap
page read and write
There are 225 hidden memdumps, click here to show them.