IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\OSzk73DYdvwL_Z1T3wG2Xn4.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MsBuild.exe_def71577c93c62276593e1719d29da3156f6704e_ada2e197_0b0c9cd9-e953-4c9c-9f50-00a18747cfae\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFA8D.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 25 17:32:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFBB6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFC06.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Protect544cd51a.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\span8ZtiuIBRtR58\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span8ZtiuIBRtR58\1k08OjVYyhv3History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span8ZtiuIBRtR58\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span8ZtiuIBRtR58\5ImqJntoqRogLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span8ZtiuIBRtR58\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\span8ZtiuIBRtR58\KISHi3j12f6KLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span8ZtiuIBRtR58\RKYfFZrWSM45Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span8ZtiuIBRtR58\Sn1EKiduguQ2Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\span8ZtiuIBRtR58\XJMhsXwyh3XQCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\span8ZtiuIBRtR58\XwfXJKJ1NYY6Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span8ZtiuIBRtR58\ajumioWrPFqJWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\span8ZtiuIBRtR58\eMxEXdLM25EuHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span8ZtiuIBRtR58\ehuS8lsYyNyrHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span8ZtiuIBRtR58\iVComgRBB9Y1Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\span8ZtiuIBRtR58\owW251H0_itRWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\span8ZtiuIBRtR58\qGXIM4UI3tzeWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\span8ZtiuIBRtR58\rZ5_naNfUpjNHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\span8ZtiuIBRtR58\thqzuRPPOYh_Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\trixy8ZtiuIBRtR58\Cookies\Chrome_Default.txt
ASCII text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy8ZtiuIBRtR58\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy8ZtiuIBRtR58\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixy8ZtiuIBRtR58\screenshot.png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 1688

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://ipinfo.io/widget/demo/185.152.66.230
34.117.186.192
https://duckduckgo.com/ac/?q=
unknown
https://sectigo.com/CPS0
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://ocsp.sectigo.com0
unknown
https://db-ip.com:443/demo/home.php?s=185.152.66.230A
unknown
https://t.me/RiseProSUPPORTi
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://db-ip.com/demo/home.php?s=185.152.66.230
172.67.75.166
http://upx.sf.net
unknown
https://ipinfo.io/widget/demo/185.152.66.230sx
unknown
https://t.me/RiseProSUPPORT
unknown
https://www.google.com/accounts/ClientLogin
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://android.apis.google.com/c2dm/send
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://db-ip.com/demo/home.php?s=185.152.66.230l
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://t.me/risepro_bot
unknown
https://ipinfo.io/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://www.nero.com
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.security.us.panasonic.com
unknown
https://ipinfo.io:443/widget/demo/185.152.66.230
unknown
https://db-ip.com/w
unknown
http://www.winimage.com/zLibDll
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
172.67.75.166
fp2e7a.wpc.phicdn.net
192.229.211.108

IPs

IP
Domain
Country
Malicious
45.15.156.9
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
172.67.75.166
db-ip.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProgramId
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
FileId
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LowerCaseLongPath
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LongPathHash
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Name
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
OriginalFileName
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Publisher
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Version
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinFileVersion
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinaryType
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductName
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductVersion
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LinkDate
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinProductVersion
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageFullName
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageRelativeId
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Size
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Language
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
IsOsComponent
\REGISTRY\A\{7fc68dcc-b64d-25a4-3dda-8e33169bf9ab}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
132000
unkown
page readonly
malicious
5376000
heap
page read and write
malicious
5AFE000
stack
page read and write
EE0000
heap
page read and write
C5E000
stack
page read and write
C70000
heap
page read and write
11A4000
heap
page read and write
6D411000
unkown
page read and write
1180000
heap
page read and write
D31000
heap
page read and write
CF2000
heap
page read and write
5394000
heap
page read and write
6D3F4000
unkown
page readonly
D4E000
stack
page read and write
A90000
heap
page read and write
55B0000
heap
page read and write
4FD0000
trusted library section
page read and write
EE5000
heap
page read and write
2653000
trusted library allocation
page execute and read and write
26EE000
stack
page read and write
4516000
trusted library allocation
page read and write
54FE000
stack
page read and write
9B0000
heap
page read and write
EDE000
stack
page read and write
53A3000
heap
page read and write
53AF000
heap
page read and write
111E000
heap
page read and write
4FE0000
heap
page read and write
522A000
trusted library section
page read and write
CBE000
heap
page read and write
406B000
trusted library allocation
page read and write
53FE000
stack
page read and write
1100000
heap
page read and write
6D370000
unkown
page readonly
282E000
stack
page read and write
2B4D000
stack
page read and write
558F000
stack
page read and write
2670000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
3ED3000
trusted library allocation
page read and write
1184000
heap
page read and write
5000000
heap
page read and write
2A79000
trusted library allocation
page read and write
2ABE000
stack
page read and write
4FF0000
trusted library allocation
page read and write
6D41A000
unkown
page read and write
2A85000
trusted library allocation
page read and write
4FE6000
heap
page read and write
4FC0000
heap
page execute and read and write
2B00000
heap
page read and write
FEF000
stack
page read and write
5601000
heap
page read and write
2AE7000
trusted library allocation
page read and write
5050000
trusted library allocation
page execute and read and write
85B000
stack
page read and write
400000
remote allocation
page execute and read and write
ADE000
stack
page read and write
117B000
heap
page read and write
4447000
trusted library allocation
page read and write
118F000
heap
page read and write
56B0000
heap
page read and write
C60000
heap
page read and write
45D2000
trusted library allocation
page read and write
534F000
stack
page read and write
6D40E000
unkown
page read and write
102E000
stack
page read and write
2687000
trusted library allocation
page execute and read and write
4EA0000
trusted library allocation
page read and write
D38000
heap
page read and write
5780000
heap
page read and write
117E000
heap
page read and write
2AAD000
trusted library allocation
page read and write
29ED000
stack
page read and write
548E000
stack
page read and write
267A000
trusted library allocation
page execute and read and write
1199000
heap
page read and write
5060000
heap
page execute and read and write
504E000
stack
page read and write
AF0000
heap
page read and write
D34000
heap
page read and write
4FB0000
heap
page read and write
3A11000
trusted library allocation
page read and write
4F1E000
stack
page read and write
2AE4000
trusted library allocation
page read and write
958000
stack
page read and write
524E000
stack
page read and write
284B000
heap
page read and write
1172000
heap
page read and write
4EC0000
heap
page read and write
BFF000
stack
page read and write
2676000
trusted library allocation
page execute and read and write
2B57000
heap
page read and write
268B000
trusted library allocation
page execute and read and write
4EA7000
trusted library allocation
page read and write
10E0000
heap
page read and write
2840000
heap
page read and write
475D000
trusted library allocation
page read and write
2654000
trusted library allocation
page read and write
2650000
trusted library allocation
page read and write
2A11000
trusted library allocation
page read and write
2858000
trusted library allocation
page read and write
541B000
heap
page read and write
2680000
trusted library allocation
page read and write
1030000
heap
page read and write
4D50000
trusted library allocation
page read and write
26A0000
trusted library allocation
page read and write
2682000
trusted library allocation
page read and write
5E70000
heap
page read and write
6D410000
unkown
page write copy
112E000
heap
page read and write
116E000
heap
page read and write
CDA000
heap
page read and write
6D413000
unkown
page write copy
266D000
trusted library allocation
page execute and read and write
4F9E000
stack
page read and write
6D41C000
unkown
page read and write
506A000
heap
page execute and read and write
58D000
remote allocation
page execute and read and write
D5A000
stack
page read and write
5A0000
unkown
page readonly
2830000
trusted library allocation
page execute and read and write
2B50000
heap
page read and write
1129000
heap
page read and write
2ADE000
trusted library allocation
page read and write
5170000
trusted library section
page read and write
CE4000
heap
page read and write
4DF0000
trusted library allocation
page execute and read and write
2AD8000
trusted library allocation
page read and write
5BFE000
stack
page read and write
12DF000
stack
page read and write
27EE000
stack
page read and write
265D000
trusted library allocation
page execute and read and write
59BE000
stack
page read and write
590000
remote allocation
page execute and read and write
4E9E000
stack
page read and write
10E8000
heap
page read and write
DC0000
heap
page read and write
1114000
heap
page read and write
6D371000
unkown
page execute read
264F000
stack
page read and write
4D5C000
stack
page read and write
130000
unkown
page readonly
5880000
heap
page execute and read and write
4F5E000
stack
page read and write
6D41E000
unkown
page readonly
CA0000
trusted library allocation
page read and write
516F000
stack
page read and write
1110000
heap
page read and write
1127000
heap
page read and write
CB0000
heap
page read and write
4D9E000
stack
page read and write
4C5E000
stack
page read and write
2A00000
heap
page execute and read and write
C10000
heap
page read and write
5ABF000
stack
page read and write
4EB0000
trusted library allocation
page read and write
55FE000
stack
page read and write
4068000
trusted library allocation
page read and write
5350000
heap
page read and write
AF5000
heap
page read and write
3ED0000
trusted library allocation
page read and write
2663000
trusted library allocation
page read and write
2AC0000
heap
page read and write
46A1000
trusted library allocation
page read and write
4D60000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
C5B000
stack
page read and write
1122000
heap
page read and write
53C6000
heap
page read and write
CB8000
heap
page read and write
29F3000
trusted library allocation
page read and write
52F8000
trusted library section
page read and write
1124000
heap
page read and write
2685000
trusted library allocation
page execute and read and write
There are 164 hidden memdumps, click here to show them.