IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_27c76d217e7db32957fa7abe56b83776a3685_227d8efd_7922f88d-aa2a-4d2c-9ec8-5d144dfb4073\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD643.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 25 19:58:52 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD73E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD78D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6500 -s 1384

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{6b28a402-de88-9394-3ed3-89a8b139cd4e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
\REGISTRY\A\{6b28a402-de88-9394-3ed3-89a8b139cd4e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
\REGISTRY\A\{6b28a402-de88-9394-3ed3-89a8b139cd4e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
\REGISTRY\A\{6b28a402-de88-9394-3ed3-89a8b139cd4e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
\REGISTRY\A\{6b28a402-de88-9394-3ed3-89a8b139cd4e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
\REGISTRY\A\{6b28a402-de88-9394-3ed3-89a8b139cd4e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
\REGISTRY\A\{6b28a402-de88-9394-3ed3-89a8b139cd4e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
\REGISTRY\A\{6b28a402-de88-9394-3ed3-89a8b139cd4e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
\REGISTRY\A\{6b28a402-de88-9394-3ed3-89a8b139cd4e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
\REGISTRY\A\{6b28a402-de88-9394-3ed3-89a8b139cd4e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
\REGISTRY\A\{6b28a402-de88-9394-3ed3-89a8b139cd4e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
\REGISTRY\A\{6b28a402-de88-9394-3ed3-89a8b139cd4e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
\REGISTRY\A\{6b28a402-de88-9394-3ed3-89a8b139cd4e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
\REGISTRY\A\{6b28a402-de88-9394-3ed3-89a8b139cd4e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
\REGISTRY\A\{6b28a402-de88-9394-3ed3-89a8b139cd4e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
\REGISTRY\A\{6b28a402-de88-9394-3ed3-89a8b139cd4e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
\REGISTRY\A\{6b28a402-de88-9394-3ed3-89a8b139cd4e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
\REGISTRY\A\{6b28a402-de88-9394-3ed3-89a8b139cd4e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
\REGISTRY\A\{6b28a402-de88-9394-3ed3-89a8b139cd4e}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2811622C000
heap
page read and write
2811624A000
heap
page read and write
98EEDEB000
stack
page read and write
7FF67B7AE000
unkown
page readonly
28116220000
heap
page read and write
2811623B000
heap
page read and write
2811623F000
heap
page read and write
7FF67B7FC000
unkown
page write copy
98EF1FE000
stack
page read and write
98EEDE6000
stack
page read and write
7FF67B7AE000
unkown
page readonly
28116170000
heap
page read and write
98EF0FF000
stack
page read and write
7FF67B830000
unkown
page readonly
28117B50000
unclassified section
page execute and read and write
7FF67B830000
unkown
page readonly
7FF67B6A1000
unkown
page execute read
28117B40000
heap
page read and write
7FF67B832000
unkown
page readonly
281161A0000
heap
page read and write
7FF67B82A000
unkown
page read and write
7FF67B832000
unkown
page readonly
7FF67B6A1000
unkown
page execute read
7FF67B6A0000
unkown
page readonly
28116090000
heap
page read and write
7FF67B7FC000
unkown
page write copy
7FF67B6A0000
unkown
page readonly
There are 17 hidden memdumps, click here to show them.