IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_3524697aa2453b3e919c4615a9f9b77b6fec82a_95c5483c_7625f84b-010b-4c55-8b33-ee1b0c902343\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER32F8.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Nov 24 02:21:58 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER36F0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3730.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 1460

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{13844ff6-70a0-9295-f2a7-5e107a1c561c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
\REGISTRY\A\{13844ff6-70a0-9295-f2a7-5e107a1c561c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
\REGISTRY\A\{13844ff6-70a0-9295-f2a7-5e107a1c561c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
\REGISTRY\A\{13844ff6-70a0-9295-f2a7-5e107a1c561c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
\REGISTRY\A\{13844ff6-70a0-9295-f2a7-5e107a1c561c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
\REGISTRY\A\{13844ff6-70a0-9295-f2a7-5e107a1c561c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
\REGISTRY\A\{13844ff6-70a0-9295-f2a7-5e107a1c561c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
\REGISTRY\A\{13844ff6-70a0-9295-f2a7-5e107a1c561c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
\REGISTRY\A\{13844ff6-70a0-9295-f2a7-5e107a1c561c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
\REGISTRY\A\{13844ff6-70a0-9295-f2a7-5e107a1c561c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
\REGISTRY\A\{13844ff6-70a0-9295-f2a7-5e107a1c561c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
\REGISTRY\A\{13844ff6-70a0-9295-f2a7-5e107a1c561c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
\REGISTRY\A\{13844ff6-70a0-9295-f2a7-5e107a1c561c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
\REGISTRY\A\{13844ff6-70a0-9295-f2a7-5e107a1c561c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
\REGISTRY\A\{13844ff6-70a0-9295-f2a7-5e107a1c561c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
\REGISTRY\A\{13844ff6-70a0-9295-f2a7-5e107a1c561c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
\REGISTRY\A\{13844ff6-70a0-9295-f2a7-5e107a1c561c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
\REGISTRY\A\{13844ff6-70a0-9295-f2a7-5e107a1c561c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
\REGISTRY\A\{13844ff6-70a0-9295-f2a7-5e107a1c561c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5BCE000
stack
page read and write
2CF4000
heap
page read and write
5C1000
unkown
page execute read
682000
unkown
page read and write
496B000
stack
page read and write
4860000
heap
page read and write
6133000
heap
page read and write
6193000
heap
page read and write
48AC000
stack
page read and write
6194000
heap
page read and write
60CF000
stack
page read and write
6160000
heap
page read and write
4980000
heap
page read and write
67D000
unkown
page write copy
5C0000
unkown
page readonly
2CF4000
heap
page read and write
68B000
unkown
page readonly
486A000
heap
page read and write
598D000
stack
page read and write
2CF4000
heap
page read and write
56D0000
heap
page read and write
59CE000
stack
page read and write
302E000
stack
page read and write
6146000
heap
page read and write
2F87000
heap
page read and write
614C000
heap
page read and write
5C0000
unkown
page readonly
5A11000
heap
page read and write
67B000
unkown
page read and write
2C38000
stack
page read and write
616E000
heap
page read and write
695000
unkown
page write copy
2CE0000
heap
page read and write
6172000
heap
page read and write
2F84000
heap
page read and write
6178000
heap
page read and write
5A0F000
stack
page read and write
613E000
heap
page read and write
6129000
heap
page read and write
60D0000
heap
page read and write
2ED9000
heap
page read and write
5D2F000
stack
page read and write
613B000
heap
page read and write
68B000
unkown
page readonly
594B000
stack
page read and write
799A000
heap
page read and write
5B8B000
stack
page read and write
2F48000
heap
page read and write
2E8E000
stack
page read and write
2C7C000
stack
page read and write
6125000
heap
page read and write
2E4D000
stack
page read and write
2FEE000
stack
page read and write
4866000
heap
page read and write
F334000
heap
page read and write
580B000
stack
page read and write
696000
unkown
page readonly
619C000
heap
page read and write
5A10000
heap
page read and write
5A11000
heap
page read and write
5B30000
heap
page read and write
48EF000
stack
page read and write
2EB0000
heap
page read and write
2E0E000
stack
page read and write
4900000
heap
page read and write
617E000
heap
page read and write
608E000
stack
page read and write
2CF4000
heap
page read and write
306F000
stack
page read and write
2CD0000
heap
page read and write
617F000
heap
page read and write
4910000
heap
page read and write
5A22000
heap
page read and write
2CF5000
heap
page read and write
58CB000
stack
page read and write
5CEE000
stack
page read and write
590F000
stack
page read and write
67B000
unkown
page write copy
2F98000
heap
page read and write
689000
unkown
page read and write
2CF0000
heap
page read and write
2EB8000
heap
page read and write
4984000
heap
page read and write
611E000
heap
page read and write
5C1000
unkown
page execute read
4E40000
trusted library allocation
page read and write
There are 76 hidden memdumps, click here to show them.