IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_aed1f4129a9d8dcd880d77b26ad86f3e04f99ca_8bf2033d_618ff279-480d-491c-a99d-8f67ae46050e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA036.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Oct 30 21:22:57 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA085.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA0A6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 152

URLs

Name
IP
Malicious
servicedny.site
malicious
goalyfeastz.site
malicious
contemteny.site
malicious
opposezmny.site
malicious
authorisev.site
malicious
faulteyotk.site
malicious
https://forbidstow.site/api
104.21.41.39
malicious
seallysl.site
malicious
forbidstow.site
malicious
dilemmadu.site
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://forbidstow.site/apiY
unknown
https://forbidstow.site:443/apil
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://forbidstow.site/apil
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://forbidstow.site/pi
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://forbidstow.site/zo
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://forbidstow.site:443/api
unknown
https://forbidstow.site/apiDw
unknown
https://forbidstow.site/piDw
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://forbidstow.site/tw
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://forbidstow.site/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://forbidstow.site/e
unknown
https://forbidstow.site/c
unknown
There are 36 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
forbidstow.site
104.21.41.39
malicious

IPs

IP
Domain
Country
Malicious
104.21.41.39
forbidstow.site
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{489aa607-4eea-132d-cca0-be7152ca7e6e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{489aa607-4eea-132d-cca0-be7152ca7e6e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{489aa607-4eea-132d-cca0-be7152ca7e6e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{489aa607-4eea-132d-cca0-be7152ca7e6e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{489aa607-4eea-132d-cca0-be7152ca7e6e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{489aa607-4eea-132d-cca0-be7152ca7e6e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{489aa607-4eea-132d-cca0-be7152ca7e6e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{489aa607-4eea-132d-cca0-be7152ca7e6e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{489aa607-4eea-132d-cca0-be7152ca7e6e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{489aa607-4eea-132d-cca0-be7152ca7e6e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{489aa607-4eea-132d-cca0-be7152ca7e6e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{489aa607-4eea-132d-cca0-be7152ca7e6e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{489aa607-4eea-132d-cca0-be7152ca7e6e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{489aa607-4eea-132d-cca0-be7152ca7e6e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{489aa607-4eea-132d-cca0-be7152ca7e6e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{489aa607-4eea-132d-cca0-be7152ca7e6e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{489aa607-4eea-132d-cca0-be7152ca7e6e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{489aa607-4eea-132d-cca0-be7152ca7e6e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{489aa607-4eea-132d-cca0-be7152ca7e6e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
1183000
heap
page read and write
malicious
137F000
heap
page read and write
3899000
trusted library allocation
page read and write
387B000
trusted library allocation
page read and write
13B6000
heap
page read and write
3895000
trusted library allocation
page read and write
3881000
trusted library allocation
page read and write
1370000
heap
page read and write
3891000
trusted library allocation
page read and write
BEF000
unkown
page read and write
15BF000
stack
page read and write
38C5000
trusted library allocation
page read and write
3893000
trusted library allocation
page read and write
3863000
trusted library allocation
page read and write
3889000
trusted library allocation
page read and write
38BE000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
3881000
trusted library allocation
page read and write
38C1000
trusted library allocation
page read and write
38C0000
trusted library allocation
page read and write
3891000
trusted library allocation
page read and write
D8D000
stack
page read and write
127E000
stack
page read and write
3871000
trusted library allocation
page read and write
13B6000
heap
page read and write
14CF000
stack
page read and write
3865000
trusted library allocation
page read and write
1387000
heap
page read and write
396C000
trusted library allocation
page read and write
38B0000
trusted library allocation
page read and write
3960000
heap
page read and write
3889000
trusted library allocation
page read and write
3891000
trusted library allocation
page read and write
135E000
heap
page read and write
386B000
trusted library allocation
page read and write
3899000
trusted library allocation
page read and write
389B000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
135E000
heap
page read and write
38B6000
trusted library allocation
page read and write
3881000
trusted library allocation
page read and write
12FD000
heap
page read and write
3891000
trusted library allocation
page read and write
13B8000
heap
page read and write
3891000
trusted library allocation
page read and write
388E000
trusted library allocation
page read and write
BEE000
unkown
page write copy
BF7000
unkown
page write copy
1395000
heap
page read and write
375E000
stack
page read and write
3891000
trusted library allocation
page read and write
138D000
heap
page read and write
386B000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
137B000
heap
page read and write
13CE000
heap
page read and write
38E0000
trusted library allocation
page read and write
13B4000
heap
page read and write
13CB000
heap
page read and write
1393000
heap
page read and write
38CF000
trusted library allocation
page read and write
1375000
heap
page read and write
13CA000
heap
page read and write
B90000
heap
page read and write
38B7000
trusted library allocation
page read and write
13B4000
heap
page read and write
BE0000
unkown
page readonly
13B9000
heap
page read and write
399D000
trusted library allocation
page read and write
3886000
trusted library allocation
page read and write
38A1000
trusted library allocation
page read and write
1391000
heap
page read and write
38A9000
trusted library allocation
page read and write
3863000
trusted library allocation
page read and write
138D000
heap
page read and write
38AD000
trusted library allocation
page read and write
36EF000
stack
page read and write
13AA000
heap
page read and write
1396000
heap
page read and write
38DE000
trusted library allocation
page read and write
13CB000
heap
page read and write
356F000
stack
page read and write
12EC000
heap
page read and write
BE0000
unkown
page readonly
3889000
trusted library allocation
page read and write
138D000
heap
page read and write
387B000
trusted library allocation
page read and write
35EE000
stack
page read and write
38B9000
trusted library allocation
page read and write
13CA000
heap
page read and write
3867000
trusted library allocation
page read and write
38BE000
trusted library allocation
page read and write
386F000
trusted library allocation
page read and write
13CA000
heap
page read and write
386B000
trusted library allocation
page read and write
4476000
trusted library allocation
page read and write
38BE000
trusted library allocation
page read and write
38C9000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
1387000
heap
page read and write
3893000
trusted library allocation
page read and write
39BD000
trusted library allocation
page read and write
38C1000
trusted library allocation
page read and write
138D000
heap
page read and write
13BA000
heap
page read and write
3891000
trusted library allocation
page read and write
137E000
heap
page read and write
38AD000
trusted library allocation
page read and write
BE0000
unkown
page readonly
1398000
heap
page read and write
386C000
trusted library allocation
page read and write
30C0000
remote allocation
page read and write
3871000
trusted library allocation
page read and write
138D000
heap
page read and write
3881000
trusted library allocation
page read and write
3891000
trusted library allocation
page read and write
389B000
trusted library allocation
page read and write
3865000
trusted library allocation
page read and write
38B7000
trusted library allocation
page read and write
38D2000
trusted library allocation
page read and write
38EF000
trusted library allocation
page read and write
38AD000
trusted library allocation
page read and write
3889000
trusted library allocation
page read and write
3A3D000
trusted library allocation
page read and write
13BA000
heap
page read and write
1375000
heap
page read and write
116D000
stack
page read and write
1379000
heap
page read and write
13CA000
heap
page read and write
136A000
heap
page read and write
13CB000
heap
page read and write
1379000
heap
page read and write
13B4000
heap
page read and write
13B4000
heap
page read and write
137E000
heap
page read and write
3879000
trusted library allocation
page read and write
38E4000
trusted library allocation
page read and write
38BE000
trusted library allocation
page read and write
13B6000
heap
page read and write
3891000
trusted library allocation
page read and write
38A1000
trusted library allocation
page read and write
38C7000
trusted library allocation
page read and write
DD0000
heap
page read and write
BA0000
unkown
page readonly
3897000
trusted library allocation
page read and write
1387000
heap
page read and write
38B9000
trusted library allocation
page read and write
12D0000
heap
page read and write
389E000
trusted library allocation
page read and write
3A45000
trusted library allocation
page read and write
1387000
heap
page read and write
3881000
trusted library allocation
page read and write
38FA000
trusted library allocation
page read and write
13B4000
heap
page read and write
2D6D000
stack
page read and write
3891000
trusted library allocation
page read and write
3881000
trusted library allocation
page read and write
110E000
stack
page read and write
3871000
trusted library allocation
page read and write
1360000
heap
page read and write
BF4000
unkown
page readonly
38B1000
trusted library allocation
page read and write
3886000
trusted library allocation
page read and write
10D0000
heap
page read and write
3865000
trusted library allocation
page read and write
13B3000
heap
page read and write
3860000
trusted library allocation
page read and write
13CB000
heap
page read and write
3886000
trusted library allocation
page read and write
3881000
trusted library allocation
page read and write
3878000
trusted library allocation
page read and write
BA0000
unkown
page readonly
386C000
trusted library allocation
page read and write
1375000
heap
page read and write
386C000
trusted library allocation
page read and write
BA1000
unkown
page execute read
13AF000
heap
page read and write
38BE000
trusted library allocation
page read and write
3898000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
138D000
heap
page read and write
3881000
trusted library allocation
page read and write
13CA000
heap
page read and write
38E4000
trusted library allocation
page read and write
3985000
trusted library allocation
page read and write
38A4000
trusted library allocation
page read and write
388B000
trusted library allocation
page read and write
138D000
heap
page read and write
38A1000
trusted library allocation
page read and write
38EF000
trusted library allocation
page read and write
3891000
trusted library allocation
page read and write
DE0000
heap
page read and write
30C0000
remote allocation
page read and write
3871000
trusted library allocation
page read and write
2E6D000
stack
page read and write
1177000
heap
page read and write
388C000
trusted library allocation
page read and write
D8D000
stack
page read and write
38FE000
trusted library allocation
page read and write
137C000
heap
page read and write
13BA000
heap
page read and write
138D000
heap
page read and write
13B0000
heap
page read and write
38B9000
trusted library allocation
page read and write
13CA000
heap
page read and write
139C000
heap
page read and write
38B9000
trusted library allocation
page read and write
12CA000
heap
page read and write
38B2000
trusted library allocation
page read and write
12D8000
heap
page read and write
C8C000
stack
page read and write
BA1000
unkown
page execute read
114E000
stack
page read and write
138D000
heap
page read and write
2F6E000
stack
page read and write
3885000
trusted library allocation
page read and write
1391000
heap
page read and write
1395000
heap
page read and write
38C4000
trusted library allocation
page read and write
139C000
heap
page read and write
3891000
trusted library allocation
page read and write
13B8000
heap
page read and write
459000
remote allocation
page execute and read and write
BE0000
unkown
page readonly
38E4000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
3893000
trusted library allocation
page read and write
13BA000
heap
page read and write
38EF000
trusted library allocation
page read and write
3881000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
BF4000
unkown
page readonly
3881000
trusted library allocation
page read and write
3891000
trusted library allocation
page read and write
13CE000
heap
page read and write
13B6000
heap
page read and write
138D000
heap
page read and write
1360000
heap
page read and write
3895000
trusted library allocation
page read and write
3891000
trusted library allocation
page read and write
38A0000
trusted library allocation
page read and write
1175000
heap
page read and write
1379000
heap
page read and write
1379000
heap
page read and write
3893000
trusted library allocation
page read and write
38A7000
trusted library allocation
page read and write
1370000
heap
page read and write
13B6000
heap
page read and write
BA0000
unkown
page readonly
3884000
trusted library allocation
page read and write
38B7000
trusted library allocation
page read and write
13CA000
heap
page read and write
38B5000
trusted library allocation
page read and write
38A9000
trusted library allocation
page read and write
3966000
trusted library allocation
page read and write
13B6000
heap
page read and write
38EF000
trusted library allocation
page read and write
12BE000
stack
page read and write
1379000
heap
page read and write
BA1000
unkown
page execute read
3882000
trusted library allocation
page read and write
13B6000
heap
page read and write
38AE000
trusted library allocation
page read and write
1370000
heap
page read and write
13A8000
heap
page read and write
3880000
trusted library allocation
page read and write
38E4000
trusted library allocation
page read and write
1379000
heap
page read and write
BF7000
unkown
page write copy
3580000
heap
page read and write
13B1000
heap
page read and write
BEE000
unkown
page write copy
138D000
heap
page read and write
3863000
trusted library allocation
page read and write
BA1000
unkown
page execute read
BF7000
unkown
page write copy
1387000
heap
page read and write
38A9000
trusted library allocation
page read and write
3889000
trusted library allocation
page read and write
386F000
trusted library allocation
page read and write
13CA000
heap
page read and write
1379000
heap
page read and write
3871000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
D4A000
stack
page read and write
38D7000
trusted library allocation
page read and write
38DD000
trusted library allocation
page read and write
112D000
stack
page read and write
386B000
trusted library allocation
page read and write
3A0D000
trusted library allocation
page read and write
386C000
trusted library allocation
page read and write
38AE000
trusted library allocation
page read and write
38CF000
trusted library allocation
page read and write
3881000
trusted library allocation
page read and write
138D000
heap
page read and write
3B7D000
trusted library allocation
page read and write
DD0000
heap
page read and write
3898000
trusted library allocation
page read and write
BF7000
unkown
page write copy
3AD5000
trusted library allocation
page read and write
385E000
stack
page read and write
13B4000
heap
page read and write
38BD000
trusted library allocation
page read and write
13CA000
heap
page read and write
3895000
trusted library allocation
page read and write
38D7000
trusted library allocation
page read and write
1316000
heap
page read and write
13B8000
heap
page read and write
38D8000
trusted library allocation
page read and write
38C1000
trusted library allocation
page read and write
3865000
trusted library allocation
page read and write
DCE000
stack
page read and write
38D2000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
BF4000
unkown
page readonly
1395000
heap
page read and write
138D000
heap
page read and write
38E2000
trusted library allocation
page read and write
1375000
heap
page read and write
137E000
heap
page read and write
3961000
heap
page read and write
13AF000
heap
page read and write
3871000
trusted library allocation
page read and write
2C7D000
trusted library allocation
page read and write
12C0000
heap
page read and write
B3B000
stack
page read and write
38A2000
trusted library allocation
page read and write
138D000
heap
page read and write
3898000
trusted library allocation
page read and write
389B000
trusted library allocation
page read and write
13BA000
heap
page read and write
13B4000
heap
page read and write
1170000
heap
page read and write
38DE000
trusted library allocation
page read and write
1360000
heap
page read and write
38F6000
trusted library allocation
page read and write
1379000
heap
page read and write
13B0000
heap
page read and write
3871000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
BEE000
unkown
page write copy
389E000
trusted library allocation
page read and write
38AD000
trusted library allocation
page read and write
BEE000
unkown
page execute and read and write
30AE000
stack
page read and write
13BA000
heap
page read and write
135F000
heap
page read and write
13B0000
heap
page read and write
388C000
trusted library allocation
page read and write
3F6E000
trusted library allocation
page read and write
3A03000
trusted library allocation
page read and write
386A000
trusted library allocation
page read and write
13CA000
heap
page read and write
3A35000
trusted library allocation
page read and write
3A67000
trusted library allocation
page read and write
386C000
trusted library allocation
page read and write
38A4000
trusted library allocation
page read and write
1379000
heap
page read and write
1379000
heap
page read and write
3891000
trusted library allocation
page read and write
1370000
heap
page read and write
3886000
trusted library allocation
page read and write
DF0000
heap
page read and write
3968000
trusted library allocation
page read and write
1379000
heap
page read and write
38CD000
trusted library allocation
page read and write
1170000
heap
page read and write
38D1000
trusted library allocation
page read and write
BF4000
unkown
page readonly
3890000
trusted library allocation
page read and write
3F6E000
trusted library allocation
page read and write
1370000
heap
page read and write
3902000
trusted library allocation
page read and write
3886000
trusted library allocation
page read and write
2FAE000
stack
page read and write
13CA000
heap
page read and write
38A2000
trusted library allocation
page read and write
388A000
trusted library allocation
page read and write
13B4000
heap
page read and write
136A000
heap
page read and write
13B0000
heap
page read and write
346E000
stack
page read and write
387F000
trusted library allocation
page read and write
13AE000
heap
page read and write
3892000
trusted library allocation
page read and write
136F000
heap
page read and write
BA0000
unkown
page readonly
3891000
trusted library allocation
page read and write
38AC000
trusted library allocation
page read and write
14BF000
stack
page read and write
13B6000
heap
page read and write
1379000
heap
page read and write
38A9000
trusted library allocation
page read and write
13B0000
heap
page read and write
1370000
heap
page read and write
3889000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
1370000
heap
page read and write
388F000
trusted library allocation
page read and write
1370000
heap
page read and write
13BA000
heap
page read and write
3881000
trusted library allocation
page read and write
135E000
heap
page read and write
13CB000
heap
page read and write
30C0000
remote allocation
page read and write
388B000
trusted library allocation
page read and write
3880000
trusted library allocation
page read and write
389A000
trusted library allocation
page read and write
13B1000
heap
page read and write
12CE000
heap
page read and write
3871000
trusted library allocation
page read and write
3A93000
trusted library allocation
page read and write
138D000
heap
page read and write
38A9000
trusted library allocation
page read and write
13B0000
heap
page read and write
38BF000
trusted library allocation
page read and write
38CF000
trusted library allocation
page read and write
137B000
heap
page read and write
There are 411 hidden memdumps, click here to show them.