IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\yxO4w5Hk0r4xrYhuxKTloSg.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Windows\System32\GroupPolicy\GPT.INI
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_f0dd97822b734f48bb93146822a7469b1ddcd7_c7a49cb5_42ec796d-5abc-499e-a351-cec9f6777abe\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1480.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Mar 28 17:54:55 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER157B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER159B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobe1duyuAkrglNe\Browsers\Chrome\Default\Cookies.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobe1duyuAkrglNe\Browsers\Firefox\v6zchhhv.default-release\History.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobe1duyuAkrglNe\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobe1duyuAkrglNe\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobe1duyuAkrglNe\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\adobe1duyuAkrglNe\screenshot.png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\heidi1duyuAkrglNe\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidi1duyuAkrglNe\2SJszHWPU8UoCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\heidi1duyuAkrglNe\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidi1duyuAkrglNe\CyoELJyQxKbtLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi1duyuAkrglNe\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\heidi1duyuAkrglNe\IYYiSPnqN_jCWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\heidi1duyuAkrglNe\KOOGs93_LdAlLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi1duyuAkrglNe\O5rp42fUmtfyWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\heidi1duyuAkrglNe\R41S5s54D443Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\heidi1duyuAkrglNe\SWWRGTsQ_i4kWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\heidi1duyuAkrglNe\UZyCI3ADcGkcLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi1duyuAkrglNe\VMtGrcHgHTqQWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidi1duyuAkrglNe\g2ON7Uibv4kuHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi1duyuAkrglNe\ngIOT28L_V1VHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi1duyuAkrglNe\t5NL48TIRlMRHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\heidi1duyuAkrglNe\wYKrzF2kZeIVWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidi1duyuAkrglNe\xpwCRkLhlYosWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\heidi1duyuAkrglNe\znKqjiZnxwQYHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Windows\SysWOW64\GroupPolicy\gpt.ini
ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\GroupPolicy\Machine\Registry.pol
RAGE Package Format (RPF),
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 24 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5520 -s 920

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://t.me/RiseProSUPPORTu
unknown
https://duckduckgo.com/ac/?q=
unknown
https://db-ip.com/demo/home.php?s=102.165.48.43
172.67.75.166
http://ns.adobe.c0/exi
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://db-ip.com/
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://t.me/RiseProSUPPORT
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://db-ip.com:443/demo/home.php?s=102.165.48.43
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://db-ip.com/demo/home.php?s=102.165.48.43c#
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://t.me/risepro_bot
unknown
https://ipinfo.io/
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://t.me/risepro_botisepro_bot
unknown
https://ipinfo.io/widget/demo/102.165.48.43
34.117.186.192
http://ns.axif/1.
unknown
http://www.winimage.com/zLibDll
unknown
https://ipinfo.io:443/widget/demo/102.165.48.43
unknown
https://support.mozilla.org
unknown
https://t.me/risepro_botackup
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
172.67.75.166

IPs

IP
Domain
Country
Malicious
193.233.132.114
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
172.67.75.166
db-ip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{86A585DE-37A6-4C2C-9642-C3B7BC68BD64}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions
Exclusions_Extensions
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{86A585DE-37A6-4C2C-9642-C3B7BC68BD64}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions
exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{86A585DE-37A6-4C2C-9642-C3B7BC68BD64}Machine\SOFTWARE\Policies\Microsoft\Windows Defender
DisableAntiSpyware
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{86A585DE-37A6-4C2C-9642-C3B7BC68BD64}Machine\SOFTWARE\Policies\Microsoft\Windows Defender
DisableRoutinelyTakingAction
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{86A585DE-37A6-4C2C-9642-C3B7BC68BD64}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableBehaviorMonitoring
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{86A585DE-37A6-4C2C-9642-C3B7BC68BD64}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableOnAccessProtection
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{86A585DE-37A6-4C2C-9642-C3B7BC68BD64}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableScanOnRealtimeEnable
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{86A585DE-37A6-4C2C-9642-C3B7BC68BD64}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{86A585DE-37A6-4C2C-9642-C3B7BC68BD64}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{86A585DE-37A6-4C2C-9642-C3B7BC68BD64}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRawWriteNotification
malicious
\REGISTRY\A\{0fc8b7df-e6e6-58b8-0331-bad4c91c4b70}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
\REGISTRY\A\{0fc8b7df-e6e6-58b8-0331-bad4c91c4b70}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
\REGISTRY\A\{0fc8b7df-e6e6-58b8-0331-bad4c91c4b70}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
\REGISTRY\A\{0fc8b7df-e6e6-58b8-0331-bad4c91c4b70}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
\REGISTRY\A\{0fc8b7df-e6e6-58b8-0331-bad4c91c4b70}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
\REGISTRY\A\{0fc8b7df-e6e6-58b8-0331-bad4c91c4b70}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
\REGISTRY\A\{0fc8b7df-e6e6-58b8-0331-bad4c91c4b70}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
\REGISTRY\A\{0fc8b7df-e6e6-58b8-0331-bad4c91c4b70}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
\REGISTRY\A\{0fc8b7df-e6e6-58b8-0331-bad4c91c4b70}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
\REGISTRY\A\{0fc8b7df-e6e6-58b8-0331-bad4c91c4b70}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
\REGISTRY\A\{0fc8b7df-e6e6-58b8-0331-bad4c91c4b70}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
\REGISTRY\A\{0fc8b7df-e6e6-58b8-0331-bad4c91c4b70}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
\REGISTRY\A\{0fc8b7df-e6e6-58b8-0331-bad4c91c4b70}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
\REGISTRY\A\{0fc8b7df-e6e6-58b8-0331-bad4c91c4b70}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
\REGISTRY\A\{0fc8b7df-e6e6-58b8-0331-bad4c91c4b70}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
\REGISTRY\A\{0fc8b7df-e6e6-58b8-0331-bad4c91c4b70}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
\REGISTRY\A\{0fc8b7df-e6e6-58b8-0331-bad4c91c4b70}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
\REGISTRY\A\{0fc8b7df-e6e6-58b8-0331-bad4c91c4b70}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
\REGISTRY\A\{0fc8b7df-e6e6-58b8-0331-bad4c91c4b70}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1447000
heap
page read and write
malicious
2EA0000
heap
page read and write
2EA0000
heap
page read and write
157F000
stack
page read and write
14FE000
stack
page read and write
35CE000
stack
page read and write
3A56000
direct allocation
page execute and read and write
2EB3000
trusted library allocation
page read and write
3F1E000
stack
page read and write
3C30000
heap
page read and write
136E000
stack
page read and write
401000
remote allocation
page execute read
900000
unkown
page readonly
3EB1000
trusted library allocation
page read and write
106B000
heap
page read and write
10B4000
heap
page read and write
1225000
heap
page read and write
B20000
unkown
page readonly
12C0000
heap
page read and write
3F19000
stack
page read and write
BBC000
stack
page read and write
57FE000
stack
page read and write
138A000
heap
page read and write
14B0000
heap
page execute and read and write
3C20000
heap
page read and write
3B3B000
heap
page read and write
147B000
heap
page read and write
1530000
heap
page read and write
2EB1000
trusted library allocation
page execute and read and write
F20000
heap
page read and write
1300000
heap
page read and write
3F5C000
stack
page read and write
3CB9000
heap
page read and write
F9E000
stack
page read and write
3C28000
heap
page read and write
1440000
trusted library allocation
page read and write
13FB000
heap
page read and write
3B46000
heap
page read and write
1370000
heap
page read and write
52E000
remote allocation
page execute and read and write
1040000
heap
page read and write
39E0000
direct allocation
page execute and read and write
EAB000
stack
page read and write
1304000
trusted library allocation
page read and write
373F000
stack
page read and write
34CE000
stack
page read and write
1434000
heap
page read and write
1500000
trusted library allocation
page execute and read and write
13D3000
heap
page read and write
902000
unkown
page readonly
3BBD000
heap
page read and write
3ADB000
stack
page read and write
2DDE000
stack
page read and write
10B0000
heap
page read and write
143F000
stack
page read and write
3EB5000
trusted library allocation
page read and write
1081000
heap
page read and write
1220000
heap
page read and write
144B000
trusted library allocation
page execute and read and write
104E000
heap
page read and write
40D0000
heap
page read and write
13CC000
heap
page read and write
39C0000
direct allocation
page execute and read and write
1510000
trusted library allocation
page read and write
55B0000
heap
page execute and read and write
12F0000
trusted library allocation
page read and write
143C000
heap
page read and write
3C38000
heap
page read and write
15C5000
heap
page read and write
13C2000
heap
page read and write
10D2000
heap
page read and write
546E000
stack
page read and write
13D1000
heap
page read and write
42DF000
stack
page read and write
3F60000
heap
page read and write
56BE000
stack
page read and write
3A9C000
stack
page read and write
50D000
remote allocation
page readonly
1000000
heap
page read and write
3C18000
heap
page read and write
1447000
trusted library allocation
page execute and read and write
1468000
heap
page read and write
533000
remote allocation
page execute read
55AE000
stack
page read and write
363E000
stack
page read and write
15C0000
heap
page read and write
FAB000
stack
page read and write
4FAE000
stack
page read and write
13E3000
heap
page read and write
130D000
trusted library allocation
page execute and read and write
EF7000
stack
page read and write
1441000
heap
page read and write
14AE000
stack
page read and write
117E000
stack
page read and write
1010000
heap
page read and write
2EB0000
heap
page read and write
1310000
trusted library allocation
page read and write
10B2000
heap
page read and write
1067000
heap
page read and write
1380000
heap
page read and write
56FE000
stack
page read and write
127E000
stack
page read and write
41DE000
stack
page read and write
142C000
heap
page read and write
1005000
heap
page read and write
1303000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
1460000
trusted library allocation
page read and write
5DE000
remote allocation
page execute and read and write
1444000
heap
page read and write
132A000
trusted library allocation
page execute and read and write
10CF000
heap
page read and write
1210000
heap
page read and write
556E000
stack
page read and write
1330000
heap
page read and write
3B29000
heap
page read and write
12BE000
stack
page read and write
3BCB000
heap
page read and write
3B20000
heap
page read and write
3890000
heap
page read and write
1048000
heap
page read and write
There are 111 hidden memdumps, click here to show them.