IOC Report
dekont_20240423_388993774837743.exe

loading gif

Files

File Path
Type
Category
Malicious
dekont_20240423_388993774837743.exe
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_dekont_20240423__f29aed481361345eef85fedfd8f72632aa8e00_c74f1f47_6ea974dd-8f19-446a-b783-c735a24ea101\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC9B9.tmp.dmp
Mini DuMP crash report, 16 streams, Wed Apr 24 05:11:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCB31.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCBA0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\dekont_20240423_388993774837743.exe
"C:\Users\user\Desktop\dekont_20240423_388993774837743.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6492 -s 1072

URLs

Name
IP
Malicious
http://hatiplertekstil.com
unknown
http://upx.sf.net
unknown
https://account.dyn.com/
unknown
http://mail.hatiplertekstil.com
unknown

Domains

Name
IP
Malicious
hatiplertekstil.com
93.190.220.113
malicious
mail.hatiplertekstil.com
unknown
malicious

IPs

IP
Domain
Country
Malicious
93.190.220.113
hatiplertekstil.com
Turkey
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{44886331-5d3f-8c09-1f06-60059a27ac16}\Root\InventoryApplicationFile\dekont_20240423_|2c79dc46326379e7
ProgramId
\REGISTRY\A\{44886331-5d3f-8c09-1f06-60059a27ac16}\Root\InventoryApplicationFile\dekont_20240423_|2c79dc46326379e7
FileId
\REGISTRY\A\{44886331-5d3f-8c09-1f06-60059a27ac16}\Root\InventoryApplicationFile\dekont_20240423_|2c79dc46326379e7
LowerCaseLongPath
\REGISTRY\A\{44886331-5d3f-8c09-1f06-60059a27ac16}\Root\InventoryApplicationFile\dekont_20240423_|2c79dc46326379e7
LongPathHash
\REGISTRY\A\{44886331-5d3f-8c09-1f06-60059a27ac16}\Root\InventoryApplicationFile\dekont_20240423_|2c79dc46326379e7
Name
\REGISTRY\A\{44886331-5d3f-8c09-1f06-60059a27ac16}\Root\InventoryApplicationFile\dekont_20240423_|2c79dc46326379e7
OriginalFileName
\REGISTRY\A\{44886331-5d3f-8c09-1f06-60059a27ac16}\Root\InventoryApplicationFile\dekont_20240423_|2c79dc46326379e7
Publisher
\REGISTRY\A\{44886331-5d3f-8c09-1f06-60059a27ac16}\Root\InventoryApplicationFile\dekont_20240423_|2c79dc46326379e7
Version
\REGISTRY\A\{44886331-5d3f-8c09-1f06-60059a27ac16}\Root\InventoryApplicationFile\dekont_20240423_|2c79dc46326379e7
BinFileVersion
\REGISTRY\A\{44886331-5d3f-8c09-1f06-60059a27ac16}\Root\InventoryApplicationFile\dekont_20240423_|2c79dc46326379e7
BinaryType
\REGISTRY\A\{44886331-5d3f-8c09-1f06-60059a27ac16}\Root\InventoryApplicationFile\dekont_20240423_|2c79dc46326379e7
ProductName
\REGISTRY\A\{44886331-5d3f-8c09-1f06-60059a27ac16}\Root\InventoryApplicationFile\dekont_20240423_|2c79dc46326379e7
ProductVersion
\REGISTRY\A\{44886331-5d3f-8c09-1f06-60059a27ac16}\Root\InventoryApplicationFile\dekont_20240423_|2c79dc46326379e7
LinkDate
\REGISTRY\A\{44886331-5d3f-8c09-1f06-60059a27ac16}\Root\InventoryApplicationFile\dekont_20240423_|2c79dc46326379e7
BinProductVersion
\REGISTRY\A\{44886331-5d3f-8c09-1f06-60059a27ac16}\Root\InventoryApplicationFile\dekont_20240423_|2c79dc46326379e7
AppxPackageFullName
\REGISTRY\A\{44886331-5d3f-8c09-1f06-60059a27ac16}\Root\InventoryApplicationFile\dekont_20240423_|2c79dc46326379e7
AppxPackageRelativeId
\REGISTRY\A\{44886331-5d3f-8c09-1f06-60059a27ac16}\Root\InventoryApplicationFile\dekont_20240423_|2c79dc46326379e7
Size
\REGISTRY\A\{44886331-5d3f-8c09-1f06-60059a27ac16}\Root\InventoryApplicationFile\dekont_20240423_|2c79dc46326379e7
Language
\REGISTRY\A\{44886331-5d3f-8c09-1f06-60059a27ac16}\Root\InventoryApplicationFile\dekont_20240423_|2c79dc46326379e7
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1EA20347000
trusted library allocation
page read and write
malicious
32CE000
trusted library allocation
page read and write
malicious
32D6000
trusted library allocation
page read and write
malicious
3281000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
1EA107E3000
trusted library allocation
page read and write
malicious
1EA0EB80000
heap
page read and write
1560000
trusted library allocation
page read and write
7FFB1E851000
unkown
page execute read
1EA0E7B0000
heap
page read and write
32F5000
trusted library allocation
page read and write
15F7000
heap
page read and write
32EF000
trusted library allocation
page read and write
1EA0E760000
trusted library allocation
page read and write
1EA10441000
trusted library allocation
page read and write
1EA28AA0000
heap
page read and write
1615000
heap
page read and write
14B0000
heap
page read and write
7FFAACBC0000
trusted library allocation
page read and write
CC852FE000
stack
page read and write
FC0000
heap
page read and write
7FFAACBCD000
trusted library allocation
page execute and read and write
15AB000
heap
page read and write
318F000
stack
page read and write
6DE0000
heap
page read and write
1500000
heap
page read and write
1EA0E502000
unkown
page readonly
177E000
stack
page read and write
7FFB1E870000
unkown
page read and write
704BD000
unkown
page read and write
1EA0E6F0000
heap
page read and write
1470000
trusted library allocation
page read and write
CC854FE000
stack
page read and write
1EA0E8C0000
heap
page execute and read and write
5850000
heap
page execute and read and write
7FFB1E872000
unkown
page readonly
5890000
heap
page read and write
1490000
trusted library allocation
page read and write
12F9000
stack
page read and write
323E000
trusted library allocation
page read and write
FE0000
heap
page read and write
15D9000
heap
page read and write
1631000
heap
page read and write
1EA0E6D0000
heap
page read and write
7FFB1E875000
unkown
page readonly
32F3000
trusted library allocation
page read and write
5878000
trusted library allocation
page read and write
4281000
trusted library allocation
page read and write
7FFAACCC0000
trusted library allocation
page execute and read and write
CC853FC000
stack
page read and write
5DE0000
trusted library allocation
page execute and read and write
14A5000
trusted library allocation
page execute and read and write
14D0000
trusted library allocation
page read and write
CC84FFF000
stack
page read and write
6DF0000
trusted library allocation
page read and write
323B000
trusted library allocation
page read and write
704B6000
unkown
page readonly
CC856FF000
stack
page read and write
7FFB1E866000
unkown
page readonly
1EA10330000
heap
page execute and read and write
15B7000
heap
page read and write
67CE000
stack
page read and write
CC850FE000
stack
page read and write
14A2000
trusted library allocation
page read and write
698E000
stack
page read and write
4289000
trusted library allocation
page read and write
3270000
heap
page execute and read and write
5E4B000
trusted library allocation
page read and write
7FFAACC50000
trusted library allocation
page read and write
665D000
heap
page read and write
7FFAACD90000
trusted library allocation
page read and write
1580000
heap
page read and write
F2A000
stack
page read and write
1EA0E7F0000
heap
page read and write
32F1000
trusted library allocation
page read and write
7FFAACBCB000
trusted library allocation
page execute and read and write
15B9000
heap
page read and write
57FC000
stack
page read and write
6E00000
heap
page read and write
7FFAACBA4000
trusted library allocation
page read and write
6DCD000
stack
page read and write
6CCE000
stack
page read and write
6600000
heap
page read and write
5DD0000
trusted library allocation
page read and write
F90000
heap
page read and write
1EA0E500000
unkown
page readonly
1EA0E995000
heap
page read and write
18BC000
stack
page read and write
5894000
heap
page read and write
CC859FE000
stack
page read and write
7FF41F390000
trusted library allocation
page execute and read and write
3198000
trusted library allocation
page read and write
144E000
stack
page read and write
CC855FF000
stack
page read and write
5E2D000
stack
page read and write
7FFAACC5C000
trusted library allocation
page execute and read and write
CC857FD000
stack
page read and write
140E000
stack
page read and write
1EA0EB85000
heap
page read and write
7FFAACD5F000
trusted library allocation
page read and write
32CC000
trusted library allocation
page read and write
56C0000
heap
page read and write
7FFAACBC4000
trusted library allocation
page read and write
1EA28370000
trusted library allocation
page read and write
1588000
heap
page read and write
7FFAACD70000
trusted library allocation
page read and write
1EA10430000
trusted library allocation
page read and write
7FFB1E850000
unkown
page readonly
1EA0E893000
heap
page read and write
1EA1045A000
trusted library allocation
page read and write
42E4000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1550000
trusted library allocation
page read and write
1EA0E710000
heap
page read and write
5DD7000
trusted library allocation
page read and write
704A0000
unkown
page readonly
7FFAACBB3000
trusted library allocation
page read and write
6ACE000
stack
page read and write
1480000
trusted library allocation
page read and write
7FFAACD40000
trusted library allocation
page read and write
584E000
stack
page read and write
32E9000
trusted library allocation
page read and write
CC858FA000
stack
page read and write
7FFAACC56000
trusted library allocation
page read and write
1EA10341000
trusted library allocation
page read and write
154E000
stack
page read and write
7FFAACD5A000
trusted library allocation
page read and write
7FFAACD80000
trusted library allocation
page read and write
1EA0E81B000
heap
page read and write
1EA0E780000
trusted library allocation
page read and write
67D0000
trusted library allocation
page execute and read and write
325D000
trusted library allocation
page read and write
1473000
trusted library allocation
page execute and read and write
3251000
trusted library allocation
page read and write
1460000
trusted library allocation
page read and write
1EA0E7F2000
heap
page read and write
7FFAACDB0000
trusted library allocation
page execute and read and write
704A1000
unkown
page execute read
69CE000
stack
page read and write
1EA10498000
trusted library allocation
page read and write
599C000
stack
page read and write
7FFAACBFC000
trusted library allocation
page execute and read and write
18E0000
heap
page read and write
14E0000
trusted library allocation
page execute and read and write
7FFAACD60000
trusted library allocation
page read and write
1EA0E7DB000
heap
page read and write
7FFAACD9D000
trusted library allocation
page read and write
704BF000
unkown
page readonly
149A000
trusted library allocation
page execute and read and write
1EA101A3000
heap
page read and write
CC84EF2000
stack
page read and write
7FFAACBBD000
trusted library allocation
page execute and read and write
1EA28A00000
trusted library section
page read and write
1EA104AA000
trusted library allocation
page read and write
148D000
trusted library allocation
page execute and read and write
7FFAACD50000
trusted library allocation
page read and write
7FFAACD44000
trusted library allocation
page read and write
187E000
stack
page read and write
7FFAACC86000
trusted library allocation
page execute and read and write
5880000
trusted library allocation
page read and write
1EA0E790000
trusted library allocation
page read and write
6E10000
trusted library allocation
page execute and read and write
14AB000
trusted library allocation
page execute and read and write
7FFAACBA0000
trusted library allocation
page read and write
32E3000
trusted library allocation
page read and write
1474000
trusted library allocation
page read and write
5870000
trusted library allocation
page read and write
3230000
trusted library allocation
page read and write
1EA0E81D000
heap
page read and write
7FFAACDA0000
trusted library allocation
page read and write
7FFAACC60000
trusted library allocation
page execute and read and write
14B5000
heap
page read and write
1EA0E5F0000
heap
page read and write
1EA104CE000
trusted library allocation
page read and write
1EA1046E000
trusted library allocation
page read and write
1EA0E823000
heap
page read and write
5A9E000
stack
page read and write
7FFAACBA3000
trusted library allocation
page execute and read and write
42A9000
trusted library allocation
page read and write
588C000
trusted library allocation
page read and write
1EA10476000
trusted library allocation
page read and write
7FFAACBA2000
trusted library allocation
page read and write
1EA10480000
trusted library allocation
page read and write
1EA0E7BC000
heap
page read and write
1EA10463000
trusted library allocation
page read and write
1EA20620000
trusted library allocation
page read and write
1496000
trusted library allocation
page execute and read and write
1EA104A1000
trusted library allocation
page read and write
1EA0E566000
unkown
page readonly
1EA0E990000
heap
page read and write
165F000
heap
page read and write
6B0E000
stack
page read and write
537D000
stack
page read and write
1EA10489000
trusted library allocation
page read and write
6683000
heap
page read and write
6B4F000
stack
page read and write
7FFAACBAD000
trusted library allocation
page execute and read and write
1492000
trusted library allocation
page read and write
5E30000
trusted library allocation
page read and write
1EA10449000
trusted library allocation
page read and write
324E000
trusted library allocation
page read and write
1EA0E910000
heap
page read and write
FA0000
heap
page read and write
5DC6000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
15DD000
heap
page read and write
1EA0E8A8000
heap
page read and write
14F0000
trusted library allocation
page read and write
1EA10438000
trusted library allocation
page read and write
678E000
stack
page read and write
14A7000
trusted library allocation
page execute and read and write
14A0000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
3256000
trusted library allocation
page read and write
1EA0E793000
trusted library allocation
page read and write
1EA0E891000
heap
page read and write
7FFAACDC0000
trusted library allocation
page read and write
147D000
trusted library allocation
page execute and read and write
CC851FF000
stack
page read and write
1EA20341000
trusted library allocation
page read and write
3242000
trusted library allocation
page read and write
7F650000
trusted library allocation
page execute and read and write
1EA10452000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
7060000
heap
page read and write
1EA104B2000
trusted library allocation
page read and write
There are 216 hidden memdumps, click here to show them.