IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fontdrvhost.exe_d32c824e8915b30da4efd4eabd13e74e4ef8c1_ad0be647_fbe92652-e1d5-43aa-b1a0-14f87479482c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER686B.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Nov 23 18:17:11 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER68CA.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6938.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Windows\System32\svchost.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3668 -s 660
C:\Windows\System32\fontdrvhost.exe
"C:\Windows\System32\fontdrvhost.exe"
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6856 -s 136

URLs

Name
IP
Malicious
https://104.37.175.218:7982/da03ab84e7f8187e6/mrkd3csf.fn5i5
malicious
https://cloudflare-dns.com/dns-query
unknown
http://upx.sf.net
unknown
https://104.37.175.218:7982/da03ab84e7f8187e6/mrkd3csf.fn5i5kernelbasentdllkernel32GetProcessMitigat
unknown
https://cloudflare-dns.com/dns-queryPOSTContent-TypeContent-LengthHostapplication/dns-message%dMachi
unknown
https://104.37.175.218:7982/da03ab84e7f8187e6/mrkd3csf.fn5i5x
unknown

IPs

IP
Domain
Country
Malicious
104.37.175.218
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\SibCode
sn3
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
ProgramId
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
FileId
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
LowerCaseLongPath
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
LongPathHash
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
Name
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
OriginalFileName
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
Publisher
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
Version
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
BinFileVersion
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
BinaryType
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
ProductName
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
ProductVersion
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
LinkDate
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
BinProductVersion
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
AppxPackageFullName
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
AppxPackageRelativeId
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
Size
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
Language
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
IsOsComponent
\REGISTRY\A\{f6708b28-8d92-0839-e00b-b30c408c99f3}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
Usn
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5E0000
direct allocation
page read and write
malicious
4D90000
direct allocation
page read and write
malicious
2E00000
direct allocation
page execute and read and write
malicious
639000
unkown
page execute and read and write
malicious
4FC0000
direct allocation
page execute and read and write
malicious
66C000
unkown
page read and write
B32000
heap
page read and write
5610000
unkown
page read and write
B42000
heap
page read and write
B32000
heap
page read and write
B42000
heap
page read and write
42EF000
stack
page read and write
2DBE000
stack
page read and write
392E000
stack
page read and write
4FB000
stack
page read and write
A82000
heap
page read and write
B42000
heap
page read and write
4E90000
unkown
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
7B580FE000
stack
page read and write
33EF000
stack
page read and write
102B000
heap
page read and write
C3E000
stack
page read and write
B42000
heap
page read and write
B32000
heap
page read and write
578D000
unkown
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
B42000
heap
page read and write
5816000
unkown
page read and write
45AE000
stack
page read and write
55E0000
unkown
page read and write
A00000
heap
page read and write
4EBF000
stack
page read and write
53C000
stack
page read and write
4F10000
unkown
page read and write
B42000
heap
page read and write
3F6E000
stack
page read and write
B32000
heap
page read and write
B42000
heap
page read and write
41EE000
stack
page read and write
4E13000
unkown
page read and write
B32000
heap
page read and write
B42000
heap
page read and write
B42000
heap
page read and write
FB0000
direct allocation
page read and write
B32000
heap
page read and write
813000
heap
page read and write
4F90000
direct allocation
page execute and read and write
B32000
heap
page read and write
54C0000
unkown
page read and write
802000
heap
page read and write
B42000
heap
page read and write
B32000
heap
page read and write
5001000
heap
page read and write
B42000
heap
page read and write
3DEF000
stack
page read and write
3B6F000
stack
page read and write
2CAE000
stack
page read and write
B32000
heap
page read and write
5800000
heap
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
8F5000
unkown
page execute and read and write
B32000
heap
page read and write
5100000
heap
page read and write
B32000
heap
page read and write
342E000
stack
page read and write
5600000
heap
page read and write
FAE000
stack
page read and write
B32000
heap
page read and write
B42000
heap
page read and write
4EE0000
unkown
page read and write
302F000
stack
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
4E68000
unkown
page read and write
5789000
unkown
page read and write
4950000
heap
page read and write
B32000
heap
page read and write
4D90000
unkown
page read and write
B42000
heap
page read and write
B12000
heap
page read and write
B32000
heap
page read and write
4CF0000
unkown
page read and write
4E10000
unkown
page read and write
FB0000
direct allocation
page read and write
B32000
heap
page read and write
356E000
stack
page read and write
B42000
heap
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
B42000
heap
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
4E2E000
stack
page read and write
B42000
heap
page read and write
366F000
stack
page read and write
B42000
heap
page read and write
B42000
heap
page read and write
53C0000
heap
page read and write
3E2E000
stack
page read and write
B32000
heap
page read and write
2F2E000
stack
page read and write
B42000
heap
page read and write
A12000
heap
page read and write
102C000
heap
page read and write
5A0000
heap
page read and write
56E0000
unkown
page read and write
B32000
heap
page read and write
A53000
heap
page read and write
B42000
heap
page read and write
456F000
stack
page read and write
B32000
heap
page read and write
55E3000
unkown
page read and write
B42000
heap
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
54C0000
unkown
page read and write
B42000
heap
page read and write
B32000
heap
page read and write
B42000
heap
page read and write
B42000
heap
page read and write
56B0000
unkown
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
57FE000
unkown
page read and write
B42000
heap
page read and write
90E000
unkown
page execute and write copy
B32000
heap
page read and write
813000
heap
page read and write
B32000
heap
page read and write
B42000
heap
page read and write
B42000
heap
page read and write
F6E000
heap
page read and write
2DEE000
stack
page read and write
FB0000
direct allocation
page read and write
5F0000
unkown
page read and write
4F70000
direct allocation
page execute and read and write
B42000
heap
page read and write
B32000
heap
page read and write
F3E000
stack
page read and write
5F1000
unkown
page execute and read and write
B42000
heap
page read and write
4F3C000
stack
page read and write
54C0000
unkown
page read and write
4A50000
trusted library allocation
page read and write
B42000
heap
page read and write
B42000
heap
page read and write
5836000
unkown
page read and write
B42000
heap
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
B42000
heap
page read and write
492F000
stack
page read and write
B32000
heap
page read and write
3BAE000
stack
page read and write
5630000
unkown
page read and write
2B2F000
stack
page read and write
46EE000
stack
page read and write
FB0000
direct allocation
page read and write
B42000
heap
page read and write
482E000
stack
page read and write
523F000
stack
page read and write
7B581FE000
stack
page read and write
B42000
heap
page read and write
800000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
B3C000
stack
page read and write
BA2000
heap
page read and write
B32000
heap
page read and write
B42000
heap
page read and write
1054000
heap
page read and write
4F2F000
stack
page read and write
B32000
heap
page read and write
38EF000
stack
page read and write
B9F000
heap
page read and write
F6A000
heap
page read and write
B32000
heap
page read and write
AAA000
unkown
page execute and read and write
5552000
unkown
page read and write
4FB9000
unkown
page read and write
B32000
heap
page read and write
5052000
unkown
page read and write
B32000
heap
page read and write
50F1000
unkown
page read and write
B42000
heap
page read and write
FB0000
direct allocation
page read and write
B42000
heap
page read and write
FB0000
direct allocation
page read and write
5500000
heap
page read and write
32EE000
stack
page read and write
2DAF000
stack
page read and write
FB0000
direct allocation
page read and write
54C0000
unkown
page read and write
B42000
heap
page read and write
B42000
heap
page read and write
306E000
stack
page read and write
B32000
heap
page read and write
502E000
unkown
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
B42000
heap
page read and write
B42000
heap
page read and write
4DE0000
direct allocation
page read and write
B95000
heap
page read and write
4E40000
unkown
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
FB0000
direct allocation
page read and write
B32000
heap
page read and write
570000
unkown
page execute and read and write
B42000
heap
page read and write
5660000
unkown
page read and write
B32000
heap
page read and write
4CF0000
unkown
page read and write
B9F000
heap
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
31AE000
stack
page read and write
5638000
unkown
page read and write
7F5000
unkown
page execute and read and write
B32000
heap
page read and write
47EF000
stack
page read and write
B32000
heap
page read and write
B42000
heap
page read and write
4E60000
unkown
page read and write
4DE0000
direct allocation
page read and write
19399C90000
heap
page read and write
B42000
heap
page read and write
B42000
heap
page read and write
B32000
heap
page read and write
B42000
heap
page read and write
4F80000
direct allocation
page execute and read and write
B42000
heap
page read and write
5600000
heap
page read and write
B42000
heap
page read and write
B32000
heap
page read and write
B42000
heap
page read and write
B42000
heap
page read and write
BA2000
heap
page read and write
B42000
heap
page read and write
2B6E000
stack
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
4DE0000
direct allocation
page read and write
B42000
heap
page read and write
B42000
heap
page read and write
37EE000
stack
page read and write
B32000
heap
page read and write
2EEF000
stack
page read and write
B42000
heap
page read and write
4F50000
direct allocation
page execute and read and write
4951000
heap
page read and write
3A2F000
stack
page read and write
19399B90000
unkown
page execute and read and write
66C000
unkown
page write copy
4E70000
unkown
page read and write
B42000
heap
page read and write
1939A013000
heap
page read and write
B32000
heap
page read and write
B42000
heap
page read and write
90D000
unkown
page execute and write copy
B32000
heap
page read and write
4D3E000
stack
page read and write
BA2000
heap
page read and write
B42000
heap
page read and write
432E000
stack
page read and write
B42000
heap
page read and write
4CF0000
unkown
page read and write
FC0000
heap
page read and write
B42000
heap
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
5E0000
heap
page read and write
B90000
heap
page read and write
8D2000
unkown
page execute and read and write
90D000
unkown
page execute and read and write
B42000
heap
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
4E7E000
stack
page read and write
3F2F000
stack
page read and write
4951000
heap
page read and write
32AF000
stack
page read and write
B32000
heap
page read and write
B42000
heap
page read and write
B32000
heap
page read and write
19399CB0000
unkown
page execute and read and write
442F000
stack
page read and write
B42000
heap
page read and write
4EFC000
stack
page read and write
4CF0000
unkown
page read and write
B32000
heap
page read and write
40AE000
stack
page read and write
639000
unkown
page execute and read and write
B42000
heap
page read and write
4DA0000
unkown
page read and write
3CAF000
stack
page read and write
B42000
heap
page read and write
BC0000
heap
page read and write
B9F000
heap
page read and write
4FDE000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
B32000
heap
page read and write
4F40000
direct allocation
page execute and read and write
B32000
heap
page read and write
B42000
heap
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
7B57DDC000
stack
page read and write
37AF000
stack
page read and write
B42000
heap
page read and write
B32000
heap
page read and write
316F000
stack
page read and write
B42000
heap
page read and write
66F000
unkown
page execute and read and write
B42000
heap
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
352F000
stack
page read and write
B42000
heap
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
19399D5A000
heap
page read and write
B32000
heap
page read and write
B00000
heap
page read and write
B42000
heap
page read and write
5570000
unkown
page read and write
B42000
heap
page read and write
4FE0000
heap
page read and write
2C6F000
stack
page read and write
BB0000
heap
page read and write
B42000
heap
page read and write
B42000
heap
page read and write
B42000
heap
page read and write
A24000
heap
page read and write
5136000
heap
page read and write
36AE000
stack
page read and write
4930000
heap
page read and write
5066000
unkown
page read and write
B42000
heap
page read and write
FCE000
heap
page read and write
B42000
heap
page read and write
B3D000
heap
page read and write
FB0000
direct allocation
page read and write
B32000
heap
page read and write
B42000
heap
page read and write
B42000
heap
page read and write
5D0000
heap
page read and write
B32000
heap
page read and write
FB0000
direct allocation
page read and write
F60000
heap
page read and write
5240000
direct allocation
page read and write
B32000
heap
page read and write
FCA000
heap
page read and write
B42000
heap
page read and write
5640000
unkown
page read and write
B42000
heap
page read and write
4951000
heap
page read and write
B42000
heap
page read and write
B9F000
heap
page read and write
B42000
heap
page read and write
F6C000
heap
page read and write
B42000
heap
page read and write
8FE000
unkown
page execute and read and write
5046000
unkown
page read and write
3A6E000
stack
page read and write
B42000
heap
page read and write
542E000
heap
page read and write
58A7000
unkown
page read and write
C40000
direct allocation
page read and write
B32000
heap
page read and write
E01000
stack
page read and write
FB0000
direct allocation
page read and write
5F0000
direct allocation
page read and write
3CEE000
stack
page read and write
B53000
heap
page read and write
406F000
stack
page read and write
B32000
heap
page read and write
B42000
heap
page read and write
FB0000
direct allocation
page read and write
813000
heap
page read and write
2DFF000
stack
page read and write
5822000
unkown
page read and write
B42000
heap
page read and write
4D82000
unkown
page read and write
B32000
heap
page read and write
F67000
heap
page read and write
128F000
stack
page read and write
FB0000
direct allocation
page read and write
B32000
heap
page read and write
5560000
unkown
page read and write
5101000
heap
page read and write
B32000
heap
page read and write
50D7000
unkown
page read and write
41AF000
stack
page read and write
19399D50000
heap
page read and write
B43000
heap
page read and write
B32000
heap
page read and write
B32000
heap
page read and write
B42000
heap
page read and write
B42000
heap
page read and write
B32000
heap
page read and write
5136000
heap
page read and write
B42000
heap
page read and write
B42000
heap
page read and write
B32000
heap
page read and write
4DF0000
direct allocation
page read and write
B32000
heap
page read and write
46AF000
stack
page read and write
58C1000
unkown
page read and write
4951000
heap
page read and write
B42000
heap
page read and write
FB0000
direct allocation
page read and write
B42000
heap
page read and write
446E000
stack
page read and write
570000
heap
page read and write
B32000
heap
page read and write
4E38000
direct allocation
page read and write
B42000
heap
page read and write
5F0000
unkown
page readonly
B32000
heap
page read and write
B42000
heap
page read and write
B42000
heap
page read and write
4FBD000
unkown
page read and write
F50000
heap
page read and write
B42000
heap
page read and write
580000
heap
page read and write
4E3F000
stack
page read and write
B10000
heap
page read and write
629000
unkown
page execute and read and write
A6D000
heap
page read and write
4F60000
direct allocation
page execute and read and write
4DA0000
direct allocation
page read and write
B42000
heap
page read and write
19399BB0000
heap
page read and write
19399CC0000
heap
page readonly
B32000
heap
page read and write
5F1000
unkown
page execute and write copy
B0C000
heap
page read and write
2D7F000
stack
page read and write
There are 437 hidden memdumps, click here to show them.