IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_819e5e45b8a757e26ca9bd44e6d9284b79b3342d_a5cec3f2_bd6d5ea6-705d-4af6-b2b9-a2e53a09d84c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC47.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Oct 11 11:45:48 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD51.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDC0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5856 -s 1460

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/t
unknown
malicious
http://185.215.113.37/5
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
malicious
http://upx.sf.net
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{d2deece2-1c0c-62a9-783f-23400904a681}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{d2deece2-1c0c-62a9-783f-23400904a681}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{d2deece2-1c0c-62a9-783f-23400904a681}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{d2deece2-1c0c-62a9-783f-23400904a681}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{d2deece2-1c0c-62a9-783f-23400904a681}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{d2deece2-1c0c-62a9-783f-23400904a681}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{d2deece2-1c0c-62a9-783f-23400904a681}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{d2deece2-1c0c-62a9-783f-23400904a681}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{d2deece2-1c0c-62a9-783f-23400904a681}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{d2deece2-1c0c-62a9-783f-23400904a681}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{d2deece2-1c0c-62a9-783f-23400904a681}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{d2deece2-1c0c-62a9-783f-23400904a681}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{d2deece2-1c0c-62a9-783f-23400904a681}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{d2deece2-1c0c-62a9-783f-23400904a681}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{d2deece2-1c0c-62a9-783f-23400904a681}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{d2deece2-1c0c-62a9-783f-23400904a681}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{d2deece2-1c0c-62a9-783f-23400904a681}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{d2deece2-1c0c-62a9-783f-23400904a681}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{d2deece2-1c0c-62a9-783f-23400904a681}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
331000
unkown
page execute and read and write
malicious
4CE0000
direct allocation
page read and write
malicious
3CA000
unkown
page execute and read and write
malicious
392000
unkown
page execute and read and write
malicious
DDE000
heap
page read and write
malicious
4861000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
4960000
trusted library allocation
page read and write
2A70000
direct allocation
page read and write
2A70000
direct allocation
page read and write
2A5E000
stack
page read and write
4E90000
direct allocation
page execute and read and write
1CDEE000
stack
page read and write
4861000
heap
page read and write
DA4000
heap
page read and write
3E5F000
stack
page read and write
4861000
heap
page read and write
3ADE000
stack
page read and write
1CDAF000
stack
page read and write
31DF000
stack
page read and write
425E000
stack
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
E52000
heap
page read and write
4861000
heap
page read and write
2A70000
direct allocation
page read and write
E55000
heap
page read and write
475E000
stack
page read and write
3C1E000
stack
page read and write
DA4000
heap
page read and write
DD0000
heap
page read and write
111F000
stack
page read and write
3D5E000
stack
page read and write
7F8000
unkown
page execute and read and write
DA4000
heap
page read and write
4861000
heap
page read and write
2A70000
direct allocation
page read and write
4861000
heap
page read and write
1CF2E000
stack
page read and write
837000
unkown
page execute and write copy
DA4000
heap
page read and write
4861000
heap
page read and write
435F000
stack
page read and write
DA4000
heap
page read and write
C6C000
stack
page read and write
4861000
heap
page read and write
2B9F000
stack
page read and write
411E000
stack
page read and write
461E000
stack
page read and write
4E30000
direct allocation
page execute and read and write
3F9F000
stack
page read and write
4861000
heap
page read and write
321E000
stack
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
DA4000
heap
page read and write
DA4000
heap
page read and write
4861000
heap
page read and write
E22000
heap
page read and write
4861000
heap
page read and write
D65000
stack
page read and write
395F000
stack
page read and write
3FDE000
stack
page read and write
DA4000
heap
page read and write
4CE0000
direct allocation
page read and write
38A000
unkown
page execute and read and write
DA4000
heap
page read and write
2F5F000
stack
page read and write
4880000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
827000
unkown
page execute and read and write
E37000
heap
page read and write
D6F000
stack
page read and write
4861000
heap
page read and write
4E80000
direct allocation
page execute and read and write
DA4000
heap
page read and write
3D1F000
stack
page read and write
DA4000
heap
page read and write
349E000
stack
page read and write
330000
unkown
page readonly
2A90000
heap
page read and write
714000
unkown
page execute and read and write
421F000
stack
page read and write
DA4000
heap
page read and write
DA4000
heap
page read and write
4861000
heap
page read and write
DA0000
heap
page read and write
4861000
heap
page read and write
DA4000
heap
page read and write
36DF000
stack
page read and write
4861000
heap
page read and write
125F000
stack
page read and write
4D1C000
stack
page read and write
2BDC000
stack
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
DA4000
heap
page read and write
359F000
stack
page read and write
4860000
heap
page read and write
DA4000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
DA4000
heap
page read and write
836000
unkown
page execute and read and write
DA4000
heap
page read and write
40DF000
stack
page read and write
DA4000
heap
page read and write
1CC6F000
stack
page read and write
1D333000
heap
page read and write
3B8000
unkown
page execute and read and write
4861000
heap
page read and write
4CC0000
heap
page read and write
399E000
stack
page read and write
4878000
heap
page read and write
4861000
heap
page read and write
2A70000
direct allocation
page read and write
836000
unkown
page execute and write copy
4861000
heap
page read and write
3BDF000
stack
page read and write
4861000
heap
page read and write
DA4000
heap
page read and write
385E000
stack
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
331000
unkown
page execute and write copy
57A000
unkown
page execute and read and write
DA4000
heap
page read and write
4861000
heap
page read and write
2A60000
heap
page read and write
3BF000
unkown
page execute and read and write
1D450000
trusted library allocation
page read and write
DA4000
heap
page read and write
ED0000
heap
page read and write
2A70000
direct allocation
page read and write
1D1BD000
stack
page read and write
4E1F000
stack
page read and write
1D02F000
stack
page read and write
4E60000
direct allocation
page execute and read and write
DA4000
heap
page read and write
35DE000
stack
page read and write
4861000
heap
page read and write
FB0000
heap
page read and write
2A70000
direct allocation
page read and write
4861000
heap
page read and write
44DE000
stack
page read and write
1D17D000
stack
page read and write
DA4000
heap
page read and write
4861000
heap
page read and write
DA4000
heap
page read and write
DA4000
heap
page read and write
3E9E000
stack
page read and write
309F000
stack
page read and write
DA4000
heap
page read and write
4861000
heap
page read and write
4E50000
direct allocation
page execute and read and write
1CEEE000
stack
page read and write
4E40000
direct allocation
page execute and read and write
4861000
heap
page read and write
449F000
stack
page read and write
4861000
heap
page read and write
330000
unkown
page read and write
2F9E000
stack
page read and write
4861000
heap
page read and write
45DF000
stack
page read and write
58E000
unkown
page execute and read and write
3A9F000
stack
page read and write
101E000
stack
page read and write
2A70000
direct allocation
page read and write
371E000
stack
page read and write
2A70000
direct allocation
page read and write
485F000
stack
page read and write
DA4000
heap
page read and write
115D000
stack
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
2A70000
direct allocation
page read and write
335E000
stack
page read and write
4861000
heap
page read and write
2A97000
heap
page read and write
4861000
heap
page read and write
9D8000
unkown
page execute and read and write
DA4000
heap
page read and write
30DE000
stack
page read and write
4861000
heap
page read and write
4CE0000
direct allocation
page read and write
2D1E000
stack
page read and write
DA4000
heap
page read and write
1D2BC000
stack
page read and write
3B5000
unkown
page execute and read and write
1CB6E000
stack
page read and write
DA4000
heap
page read and write
4861000
heap
page read and write
381F000
stack
page read and write
2A70000
direct allocation
page read and write
E64000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
471F000
stack
page read and write
2E5E000
stack
page read and write
81E000
unkown
page execute and read and write
DDA000
heap
page read and write
1CCAE000
stack
page read and write
331F000
stack
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
9D9000
unkown
page execute and write copy
1D07E000
stack
page read and write
4E70000
direct allocation
page execute and read and write
DA4000
heap
page read and write
4861000
heap
page read and write
2E1F000
stack
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
439E000
stack
page read and write
DA4000
heap
page read and write
4861000
heap
page read and write
4E60000
direct allocation
page execute and read and write
345F000
stack
page read and write
DA4000
heap
page read and write
4861000
heap
page read and write
2A70000
direct allocation
page read and write
DA4000
heap
page read and write
4861000
heap
page read and write
DA4000
heap
page read and write
2A9B000
heap
page read and write
DA4000
heap
page read and write
2A70000
direct allocation
page read and write
2A70000
direct allocation
page read and write
2CDF000
stack
page read and write
There are 224 hidden memdumps, click here to show them.