IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_5491e479b4ed026ea3ae7865ed22a89a0229910_7cc2f8af_1f5dda52-8896-4efc-a3ca-7793fbf9a5dc\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERED83.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Oct 27 15:04:20 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREF0B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREF5A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 1492

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/e2b1563c6670f193.php
malicious
http://185.215.113.206/p
unknown
http://upx.sf.net
unknown
http://185.215.113.206/t
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{1670e989-fd9b-c21c-3c4d-db35610d1832}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProgramId
malicious
\REGISTRY\A\{1670e989-fd9b-c21c-3c4d-db35610d1832}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
FileId
malicious
\REGISTRY\A\{1670e989-fd9b-c21c-3c4d-db35610d1832}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LowerCaseLongPath
malicious
\REGISTRY\A\{1670e989-fd9b-c21c-3c4d-db35610d1832}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LongPathHash
malicious
\REGISTRY\A\{1670e989-fd9b-c21c-3c4d-db35610d1832}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Name
malicious
\REGISTRY\A\{1670e989-fd9b-c21c-3c4d-db35610d1832}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
OriginalFileName
malicious
\REGISTRY\A\{1670e989-fd9b-c21c-3c4d-db35610d1832}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Publisher
malicious
\REGISTRY\A\{1670e989-fd9b-c21c-3c4d-db35610d1832}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Version
malicious
\REGISTRY\A\{1670e989-fd9b-c21c-3c4d-db35610d1832}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinFileVersion
malicious
\REGISTRY\A\{1670e989-fd9b-c21c-3c4d-db35610d1832}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinaryType
malicious
\REGISTRY\A\{1670e989-fd9b-c21c-3c4d-db35610d1832}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductName
malicious
\REGISTRY\A\{1670e989-fd9b-c21c-3c4d-db35610d1832}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductVersion
malicious
\REGISTRY\A\{1670e989-fd9b-c21c-3c4d-db35610d1832}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LinkDate
malicious
\REGISTRY\A\{1670e989-fd9b-c21c-3c4d-db35610d1832}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinProductVersion
malicious
\REGISTRY\A\{1670e989-fd9b-c21c-3c4d-db35610d1832}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageFullName
malicious
\REGISTRY\A\{1670e989-fd9b-c21c-3c4d-db35610d1832}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageRelativeId
malicious
\REGISTRY\A\{1670e989-fd9b-c21c-3c4d-db35610d1832}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Size
malicious
\REGISTRY\A\{1670e989-fd9b-c21c-3c4d-db35610d1832}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Language
malicious
\REGISTRY\A\{1670e989-fd9b-c21c-3c4d-db35610d1832}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
BA000
unkown
page execute and read and write
malicious
21000
unkown
page execute and read and write
malicious
49F0000
direct allocation
page read and write
malicious
BB8000
heap
page read and write
malicious
37BE000
stack
page read and write
288B000
stack
page read and write
41BE000
stack
page read and write
28E0000
direct allocation
page read and write
A5000
unkown
page execute and read and write
29FF000
stack
page read and write
4561000
heap
page read and write
6C8000
unkown
page execute and write copy
4561000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
28FB000
heap
page read and write
28E0000
direct allocation
page read and write
3DFE000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
32BE000
stack
page read and write
4561000
heap
page read and write
2C7E000
stack
page read and write
27E000
unkown
page execute and read and write
34FF000
stack
page read and write
28E0000
direct allocation
page read and write
BF8000
heap
page read and write
363F000
stack
page read and write
3C7E000
stack
page read and write
4561000
heap
page read and write
3DBF000
stack
page read and write
28CE000
stack
page read and write
4561000
heap
page read and write
AFE000
stack
page read and write
2FFF000
stack
page read and write
4561000
heap
page read and write
42FE000
stack
page read and write
1D130000
trusted library allocation
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
B3E000
stack
page read and write
3CBE000
stack
page read and write
1CBBF000
stack
page read and write
4B70000
direct allocation
page execute and read and write
327F000
stack
page read and write
2DBE000
stack
page read and write
4561000
heap
page read and write
43FF000
stack
page read and write
407E000
stack
page read and write
4A2C000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
4570000
heap
page read and write
B85000
heap
page read and write
28E0000
direct allocation
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
443E000
stack
page read and write
417F000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
453F000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
C14000
heap
page read and write
4561000
heap
page read and write
4B7E000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
28E0000
direct allocation
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
20000
unkown
page read and write
1CD2F000
stack
page read and write
38BF000
stack
page read and write
317E000
stack
page read and write
4561000
heap
page read and write
20000
unkown
page readonly
3B7E000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
21000
unkown
page execute and write copy
4561000
heap
page read and write
4561000
heap
page read and write
1CA7F000
stack
page read and write
B80000
heap
page read and write
28F0000
heap
page read and write
4561000
heap
page read and write
F5E000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
274E000
stack
page read and write
2EFE000
stack
page read and write
49F0000
direct allocation
page read and write
AF000
unkown
page execute and read and write
4EB000
unkown
page execute and read and write
4561000
heap
page read and write
4561000
heap
page read and write
42BF000
stack
page read and write
4B70000
direct allocation
page execute and read and write
377F000
stack
page read and write
1C93F000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
4580000
heap
page read and write
4561000
heap
page read and write
284F000
stack
page read and write
7B0000
heap
page read and write
A8000
unkown
page execute and read and write
75C000
stack
page read and write
4660000
trusted library allocation
page read and write
B9E000
heap
page read and write
4561000
heap
page read and write
353E000
stack
page read and write
3A3E000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
3EFF000
stack
page read and write
525000
unkown
page execute and read and write
1CEAE000
stack
page read and write
4561000
heap
page read and write
39FF000
stack
page read and write
403F000
stack
page read and write
4561000
heap
page read and write
B90000
heap
page read and write
21000
unkown
page execute and write copy
4561000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
33BF000
stack
page read and write
4561000
heap
page read and write
28E0000
direct allocation
page read and write
BE0000
heap
page read and write
4561000
heap
page read and write
406000
unkown
page execute and read and write
4561000
heap
page read and write
4561000
heap
page read and write
525000
unkown
page execute and write copy
26A000
unkown
page execute and read and write
49F0000
direct allocation
page read and write
4540000
heap
page read and write
515000
unkown
page execute and read and write
303E000
stack
page read and write
4561000
heap
page read and write
7C0000
heap
page read and write
6C7000
unkown
page execute and read and write
28E0000
direct allocation
page read and write
4B90000
direct allocation
page execute and read and write
28E0000
direct allocation
page read and write
28E0000
direct allocation
page read and write
367E000
stack
page read and write
526000
unkown
page execute and write copy
1C97E000
stack
page read and write
BB3000
heap
page read and write
4561000
heap
page read and write
28E0000
direct allocation
page read and write
7A000
unkown
page execute and read and write
4561000
heap
page read and write
2C3F000
stack
page read and write
B7E000
stack
page read and write
28E0000
direct allocation
page read and write
3B3F000
stack
page read and write
B9A000
heap
page read and write
33FE000
stack
page read and write
4B2F000
stack
page read and write
1CE6D000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
2B3E000
stack
page read and write
82000
unkown
page execute and read and write
4561000
heap
page read and write
1CABE000
stack
page read and write
50E000
unkown
page execute and read and write
AF5000
stack
page read and write
4561000
heap
page read and write
3F3E000
stack
page read and write
4561000
heap
page read and write
4B40000
direct allocation
page execute and read and write
1CFAC000
stack
page read and write
2EBF000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
28D0000
heap
page read and write
C04000
heap
page read and write
28E0000
direct allocation
page read and write
1D013000
heap
page read and write
E5E000
stack
page read and write
4560000
heap
page read and write
2AFF000
stack
page read and write
4561000
heap
page read and write
1CD6D000
stack
page read and write
38FE000
stack
page read and write
2D7F000
stack
page read and write
313F000
stack
page read and write
4B50000
direct allocation
page execute and read and write
4B80000
direct allocation
page execute and read and write
28E0000
direct allocation
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
BE3000
heap
page read and write
1CC2E000
stack
page read and write
4561000
heap
page read and write
4B60000
direct allocation
page execute and read and write
28E0000
direct allocation
page read and write
28F7000
heap
page read and write
4561000
heap
page read and write
There are 203 hidden memdumps, click here to show them.