IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_e12877fd784066db4a7d50c47aa9ae87834a8bd8_ccf28a54_44b0b5b5-23f4-41d7-95d4-4bc25a2a619a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4263.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 16:08:39 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER43DB.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER43FB.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 1532

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://upx.sf.net
unknown
http://185.215.113.206JX
unknown
http://185.215.113.206/Y
unknown
http://185.215.113.206/%
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{239972e5-fe85-7658-f1f6-09b1bf00d28a}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProgramId
malicious
\REGISTRY\A\{239972e5-fe85-7658-f1f6-09b1bf00d28a}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
FileId
malicious
\REGISTRY\A\{239972e5-fe85-7658-f1f6-09b1bf00d28a}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LowerCaseLongPath
malicious
\REGISTRY\A\{239972e5-fe85-7658-f1f6-09b1bf00d28a}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LongPathHash
malicious
\REGISTRY\A\{239972e5-fe85-7658-f1f6-09b1bf00d28a}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Name
malicious
\REGISTRY\A\{239972e5-fe85-7658-f1f6-09b1bf00d28a}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
OriginalFileName
malicious
\REGISTRY\A\{239972e5-fe85-7658-f1f6-09b1bf00d28a}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Publisher
malicious
\REGISTRY\A\{239972e5-fe85-7658-f1f6-09b1bf00d28a}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Version
malicious
\REGISTRY\A\{239972e5-fe85-7658-f1f6-09b1bf00d28a}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinFileVersion
malicious
\REGISTRY\A\{239972e5-fe85-7658-f1f6-09b1bf00d28a}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinaryType
malicious
\REGISTRY\A\{239972e5-fe85-7658-f1f6-09b1bf00d28a}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductName
malicious
\REGISTRY\A\{239972e5-fe85-7658-f1f6-09b1bf00d28a}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductVersion
malicious
\REGISTRY\A\{239972e5-fe85-7658-f1f6-09b1bf00d28a}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LinkDate
malicious
\REGISTRY\A\{239972e5-fe85-7658-f1f6-09b1bf00d28a}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinProductVersion
malicious
\REGISTRY\A\{239972e5-fe85-7658-f1f6-09b1bf00d28a}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageFullName
malicious
\REGISTRY\A\{239972e5-fe85-7658-f1f6-09b1bf00d28a}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageRelativeId
malicious
\REGISTRY\A\{239972e5-fe85-7658-f1f6-09b1bf00d28a}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Size
malicious
\REGISTRY\A\{239972e5-fe85-7658-f1f6-09b1bf00d28a}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Language
malicious
\REGISTRY\A\{239972e5-fe85-7658-f1f6-09b1bf00d28a}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Usn
malicious
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
531000
unkown
page execute and read and write
malicious
4EB0000
direct allocation
page read and write
malicious
656000
unkown
page execute and read and write
malicious
11DE000
heap
page read and write
malicious
48EE000
stack
page read and write
4A21000
heap
page read and write
4A10000
direct allocation
page read and write
AC0000
unkown
page execute and read and write
4A21000
heap
page read and write
39EE000
stack
page read and write
4EB0000
direct allocation
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
462F000
stack
page read and write
3DAE000
stack
page read and write
5020000
direct allocation
page execute and read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
34EE000
stack
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
4A10000
direct allocation
page read and write
1D32E000
stack
page read and write
4A21000
heap
page read and write
326E000
stack
page read and write
4A21000
heap
page read and write
D70000
heap
page read and write
4DC000
stack
page read and write
402E000
stack
page read and write
5030000
direct allocation
page execute and read and write
2C4C000
stack
page read and write
4A21000
heap
page read and write
2FEF000
stack
page read and write
35EF000
stack
page read and write
4A21000
heap
page read and write
4A10000
direct allocation
page read and write
4A21000
heap
page read and write
3C6E000
stack
page read and write
4EDB000
direct allocation
page read and write
531000
unkown
page execute and write copy
4A21000
heap
page read and write
3B2E000
stack
page read and write
4A21000
heap
page read and write
5060000
direct allocation
page execute and read and write
4FEF000
stack
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
616000
unkown
page execute and read and write
D6F000
stack
page read and write
4A21000
heap
page read and write
81A000
unkown
page execute and read and write
130E000
stack
page read and write
2CD0000
heap
page read and write
4A21000
heap
page read and write
2EEF000
stack
page read and write
5000000
direct allocation
page execute and read and write
1244000
heap
page read and write
4A10000
direct allocation
page read and write
42AE000
stack
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
D65000
stack
page read and write
4A21000
heap
page read and write
3EAF000
stack
page read and write
1D5F0000
trusted library allocation
page read and write
4A21000
heap
page read and write
4A23000
heap
page read and write
4A21000
heap
page read and write
5040000
direct allocation
page execute and read and write
466E000
stack
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
1222000
heap
page read and write
2CEB000
heap
page read and write
476F000
stack
page read and write
4A21000
heap
page read and write
2CE7000
heap
page read and write
4A21000
heap
page read and write
2DEF000
stack
page read and write
426F000
stack
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
1D46D000
stack
page read and write
4A21000
heap
page read and write
3EEE000
stack
page read and write
43EE000
stack
page read and write
1CF3F000
stack
page read and write
DB5000
heap
page read and write
1D36D000
stack
page read and write
4A21000
heap
page read and write
C65000
unkown
page execute and write copy
4A21000
heap
page read and write
DFE000
stack
page read and write
4A10000
direct allocation
page read and write
49F0000
heap
page read and write
C64000
unkown
page execute and read and write
4A10000
direct allocation
page read and write
4A21000
heap
page read and write
2C8E000
stack
page read and write
4EEC000
stack
page read and write
4A21000
heap
page read and write
33AE000
stack
page read and write
1257000
heap
page read and write
4A10000
direct allocation
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
4A10000
direct allocation
page read and write
4A21000
heap
page read and write
AB2000
unkown
page execute and read and write
4A10000
direct allocation
page read and write
1D22D000
stack
page read and write
641000
unkown
page execute and read and write
322F000
stack
page read and write
5010000
direct allocation
page execute and read and write
2CE0000
heap
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
1CF7E000
stack
page read and write
4B20000
trusted library allocation
page read and write
4A21000
heap
page read and write
4A10000
direct allocation
page read and write
49EF000
stack
page read and write
336F000
stack
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
3D6F000
stack
page read and write
11D0000
heap
page read and write
44EF000
stack
page read and write
4A21000
heap
page read and write
39AF000
stack
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
AC1000
unkown
page execute and write copy
5030000
direct allocation
page execute and read and write
312E000
stack
page read and write
11CF000
stack
page read and write
4A10000
direct allocation
page read and write
9A6000
unkown
page execute and read and write
4EB0000
direct allocation
page read and write
55C000
unkown
page execute and read and write
D80000
heap
page read and write
4A21000
heap
page read and write
376E000
stack
page read and write
3C2F000
stack
page read and write
2CCE000
stack
page read and write
386F000
stack
page read and write
412F000
stack
page read and write
5050000
direct allocation
page execute and read and write
4A21000
heap
page read and write
1D0EE000
stack
page read and write
140E000
stack
page read and write
38AE000
stack
page read and write
503E000
stack
page read and write
372F000
stack
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
362E000
stack
page read and write
4A21000
heap
page read and write
530000
unkown
page read and write
43AF000
stack
page read and write
1CE3E000
stack
page read and write
4A21000
heap
page read and write
34AF000
stack
page read and write
4A21000
heap
page read and write
416E000
stack
page read and write
4A21000
heap
page read and write
2C0E000
stack
page read and write
5030000
direct allocation
page execute and read and write
4A40000
heap
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
1CDFF000
stack
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
48AF000
stack
page read and write
530000
unkown
page readonly
47AE000
stack
page read and write
3AEF000
stack
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
A86000
unkown
page execute and read and write
AC0000
unkown
page execute and write copy
64B000
unkown
page execute and read and write
11DA000
heap
page read and write
4A20000
heap
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
1239000
heap
page read and write
4A10000
direct allocation
page read and write
1D4D3000
heap
page read and write
452E000
stack
page read and write
4A10000
direct allocation
page read and write
DB0000
heap
page read and write
3FEF000
stack
page read and write
644000
unkown
page execute and read and write
4A30000
heap
page read and write
4A21000
heap
page read and write
1D1EF000
stack
page read and write
4A10000
direct allocation
page read and write
61E000
unkown
page execute and read and write
1D07E000
stack
page read and write
AAA000
unkown
page execute and read and write
4A21000
heap
page read and write
30EF000
stack
page read and write
There are 202 hidden memdumps, click here to show them.