IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\gaUkmAzGb_el0KBPcRFr18l.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_ff31866d17fa18c7913366427148ad386_8682c2da_5ca5d425-8a52-4555-bdfc-fbe386d59aef\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE007.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 26 09:06:11 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE0F3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE113.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\spanKRfwTJj1oH7F\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanKRfwTJj1oH7F\1WonyWgTlWBJWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanKRfwTJj1oH7F\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanKRfwTJj1oH7F\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanKRfwTJj1oH7F\GQbFHuRC5t7nLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanKRfwTJj1oH7F\LJ0Ouc26bvKFWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanKRfwTJj1oH7F\OGqN14Hqc_tTHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanKRfwTJj1oH7F\RrlgkTLYOV84Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\spanKRfwTJj1oH7F\Rxxkzr6lX3hbHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanKRfwTJj1oH7F\ThP4m_kOyXD9Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanKRfwTJj1oH7F\UgGJ3iGDvYBdLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanKRfwTJj1oH7F\e5Yph_sHMcOsHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanKRfwTJj1oH7F\l4mPY5f2P8ThHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanKRfwTJj1oH7F\nCO5UlAAWThWWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanKRfwTJj1oH7F\nG2tiL1Y5ubwWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanKRfwTJj1oH7F\qapciQaJUl5zWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanKRfwTJj1oH7F\sNnNIz9ALqmOWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\trixyKRfwTJj1oH7F\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyKRfwTJj1oH7F\History\Firefox_fqs92o4p.default-release.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyKRfwTJj1oH7F\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyKRfwTJj1oH7F\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyKRfwTJj1oH7F\screenshot.png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7484 -s 1776

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://duckduckgo.com/ac/?q=
unknown
https://sectigo.com/CPS0
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://ocsp.sectigo.com0
unknown
https://db-ip.com/
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://t.me/RiseProSUPPORT
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://ipinfo.io/x
unknown
https://t.me/risepro_bot
unknown
https://db-ip.com/demo/home.php?s=102.129.152.2206
unknown
https://t.me/risepro_botdd
unknown
https://ipinfo.io:443/widget/demo/102.129.152.220
unknown
https://db-ip.com:443/demo/home.php?s=102.129.152.220
unknown
https://t.me/risepro_bot)
unknown
https://ipinfo.io/
unknown
https://ipinfo.io/widget/demo/102.129.152.220
34.117.186.192
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://ipinfo.io/s
unknown
http://www.winimage.com/zLibDll
unknown
https://t.me/risepro_bot52.220
unknown
https://support.mozilla.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://db-ip.com/demo/home.php?s=102.129.152.220
104.26.4.15
There are 28 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
104.26.4.15

IPs

IP
Domain
Country
Malicious
45.15.156.9
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
104.26.4.15
db-ip.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{e929168e-8995-15d9-dc2d-7a82467e6229}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
\REGISTRY\A\{e929168e-8995-15d9-dc2d-7a82467e6229}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
\REGISTRY\A\{e929168e-8995-15d9-dc2d-7a82467e6229}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
\REGISTRY\A\{e929168e-8995-15d9-dc2d-7a82467e6229}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
\REGISTRY\A\{e929168e-8995-15d9-dc2d-7a82467e6229}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
\REGISTRY\A\{e929168e-8995-15d9-dc2d-7a82467e6229}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
\REGISTRY\A\{e929168e-8995-15d9-dc2d-7a82467e6229}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
\REGISTRY\A\{e929168e-8995-15d9-dc2d-7a82467e6229}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
\REGISTRY\A\{e929168e-8995-15d9-dc2d-7a82467e6229}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
\REGISTRY\A\{e929168e-8995-15d9-dc2d-7a82467e6229}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
\REGISTRY\A\{e929168e-8995-15d9-dc2d-7a82467e6229}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
\REGISTRY\A\{e929168e-8995-15d9-dc2d-7a82467e6229}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
\REGISTRY\A\{e929168e-8995-15d9-dc2d-7a82467e6229}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
\REGISTRY\A\{e929168e-8995-15d9-dc2d-7a82467e6229}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
\REGISTRY\A\{e929168e-8995-15d9-dc2d-7a82467e6229}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
\REGISTRY\A\{e929168e-8995-15d9-dc2d-7a82467e6229}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
\REGISTRY\A\{e929168e-8995-15d9-dc2d-7a82467e6229}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
\REGISTRY\A\{e929168e-8995-15d9-dc2d-7a82467e6229}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
\REGISTRY\A\{e929168e-8995-15d9-dc2d-7a82467e6229}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
677F000
heap
page read and write
malicious
6660000
heap
page read and write
malicious
66FE000
heap
page read and write
66DB000
heap
page read and write
66CB000
heap
page read and write
671F000
heap
page read and write
1C90000
heap
page read and write
1A94000
heap
page read and write
66C6000
heap
page read and write
66F4000
heap
page read and write
66C2000
heap
page read and write
1D18000
heap
page read and write
66BE000
heap
page read and write
66D0000
heap
page read and write
35C0000
trusted library allocation
page read and write
66FE000
heap
page read and write
66D1000
heap
page read and write
6718000
heap
page read and write
1D17000
heap
page read and write
1A94000
heap
page read and write
66A4000
heap
page read and write
5DD0000
remote allocation
page read and write
66C6000
heap
page read and write
6710000
heap
page read and write
1B9E000
stack
page read and write
66E3000
heap
page read and write
66C2000
heap
page read and write
D40000
unkown
page readonly
1C42000
heap
page read and write
6760000
trusted library allocation
page read and write
66FE000
heap
page read and write
66F2000
heap
page read and write
3621000
heap
page read and write
3621000
heap
page read and write
1C5E000
heap
page read and write
1D17000
heap
page read and write
6760000
trusted library allocation
page read and write
1A94000
heap
page read and write
6701000
heap
page read and write
3630000
heap
page read and write
1D14000
heap
page read and write
66EE000
heap
page read and write
669E000
heap
page read and write
1A94000
heap
page read and write
3621000
heap
page read and write
66CD000
heap
page read and write
1A94000
heap
page read and write
3621000
heap
page read and write
63BE000
stack
page read and write
66F3000
heap
page read and write
EC7000
unkown
page execute read
66CB000
heap
page read and write
1D13000
heap
page read and write
D41000
unkown
page execute read
EC2000
unkown
page read and write
62BE000
stack
page read and write
6ECA000
heap
page read and write
1A94000
heap
page read and write
66ED000
heap
page read and write
66A0000
heap
page read and write
1C59000
heap
page read and write
66BE000
heap
page read and write
1BDE000
stack
page read and write
66E3000
heap
page read and write
66DB000
heap
page read and write
66DC000
heap
page read and write
66CB000
heap
page read and write
1D13000
heap
page read and write
6760000
trusted library allocation
page read and write
5DD0000
remote allocation
page read and write
66C2000
heap
page read and write
35C0000
heap
page read and write
66A0000
heap
page read and write
3621000
heap
page read and write
1C27000
heap
page read and write
583C000
heap
page read and write
66FE000
heap
page read and write
1CAF000
heap
page read and write
66B0000
heap
page read and write
66E0000
heap
page read and write
37FE000
stack
page read and write
66FA000
heap
page read and write
66FE000
heap
page read and write
66A0000
heap
page read and write
3621000
heap
page read and write
671F000
heap
page read and write
3621000
heap
page read and write
6713000
heap
page read and write
1C20000
heap
page read and write
66C2000
heap
page read and write
6677000
heap
page read and write
66B0000
heap
page read and write
66B1000
heap
page read and write
66BE000
heap
page read and write
183B000
stack
page read and write
66D0000
heap
page read and write
66AE000
heap
page read and write
3800000
heap
page read and write
6760000
trusted library allocation
page read and write
1189000
unkown
page execute read
1A94000
heap
page read and write
66E3000
heap
page read and write
3620000
heap
page read and write
D40000
unkown
page readonly
66B0000
heap
page read and write
3621000
heap
page read and write
671F000
heap
page read and write
6706000
heap
page read and write
1C54000
heap
page read and write
1A94000
heap
page read and write
66B0000
heap
page read and write
66B0000
heap
page read and write
1D1D000
heap
page read and write
6EC0000
heap
page read and write
66B6000
heap
page read and write
192E000
stack
page read and write
6760000
trusted library allocation
page read and write
1554000
unkown
page readonly
1D0F000
heap
page read and write
3621000
heap
page read and write
1D18000
heap
page read and write
6760000
trusted library allocation
page read and write
6661000
heap
page read and write
6670000
heap
page read and write
63C0000
trusted library allocation
page read and write
66C6000
heap
page read and write
1C83000
heap
page read and write
3621000
heap
page read and write
1D13000
heap
page read and write
E9A000
unkown
page readonly
66C6000
heap
page read and write
6713000
heap
page read and write
1E1E000
stack
page read and write
3757000
heap
page read and write
1A94000
heap
page read and write
66C7000
heap
page read and write
64D3000
heap
page read and write
66C2000
heap
page read and write
66C6000
heap
page read and write
1188000
unkown
page read and write
1A94000
heap
page read and write
66AE000
heap
page read and write
5B2E000
stack
page read and write
66AB000
heap
page read and write
66DC000
heap
page read and write
66C2000
heap
page read and write
1BE0000
heap
page read and write
1C7C000
heap
page read and write
1D19000
heap
page read and write
66A0000
heap
page read and write
3621000
heap
page read and write
6760000
trusted library allocation
page read and write
66FE000
heap
page read and write
66D7000
heap
page read and write
66FE000
heap
page read and write
66E9000
heap
page read and write
66F4000
heap
page read and write
3750000
heap
page read and write
1C6F000
heap
page read and write
73D9000
heap
page read and write
6695000
heap
page read and write
66B0000
heap
page read and write
1C6A000
heap
page read and write
6682000
heap
page read and write
1D16000
heap
page read and write
66D0000
heap
page read and write
3621000
heap
page read and write
66BE000
heap
page read and write
5C6D000
stack
page read and write
1A94000
heap
page read and write
1A94000
heap
page read and write
64E3000
heap
page read and write
5DD0000
remote allocation
page read and write
1A90000
heap
page read and write
66E2000
heap
page read and write
66FE000
heap
page read and write
5DAD000
stack
page read and write
66AB000
heap
page read and write
3610000
heap
page read and write
66DC000
heap
page read and write
6760000
trusted library allocation
page read and write
6717000
heap
page read and write
671F000
heap
page read and write
6760000
trusted library allocation
page read and write
66B5000
heap
page read and write
6703000
heap
page read and write
6684000
heap
page read and write
1C4B000
heap
page read and write
1A94000
heap
page read and write
5CAD000
stack
page read and write
1C72000
heap
page read and write
3621000
heap
page read and write
66C2000
heap
page read and write
66A9000
heap
page read and write
66C2000
heap
page read and write
193A000
stack
page read and write
66C6000
heap
page read and write
1D1A000
heap
page read and write
3621000
heap
page read and write
627F000
stack
page read and write
1C62000
heap
page read and write
6670000
heap
page read and write
3621000
heap
page read and write
66DB000
heap
page read and write
66A5000
heap
page read and write
1D18000
heap
page read and write
66C6000
heap
page read and write
66A4000
heap
page read and write
66C2000
heap
page read and write
1A94000
heap
page read and write
3621000
heap
page read and write
66B9000
heap
page read and write
683D000
heap
page read and write
3621000
heap
page read and write
6760000
trusted library allocation
page read and write
6760000
trusted library allocation
page read and write
66D7000
heap
page read and write
EEF000
unkown
page read and write
6710000
heap
page read and write
6704000
heap
page read and write
1D10000
heap
page read and write
66C2000
heap
page read and write
66B0000
heap
page read and write
64C0000
heap
page read and write
6760000
trusted library allocation
page read and write
3621000
heap
page read and write
6703000
heap
page read and write
6713000
heap
page read and write
1C68000
heap
page read and write
66FE000
heap
page read and write
6760000
trusted library allocation
page read and write
66A0000
heap
page read and write
66D4000
heap
page read and write
66C2000
heap
page read and write
66FE000
heap
page read and write
66CB000
heap
page read and write
1A94000
heap
page read and write
1970000
heap
page read and write
66EB000
heap
page read and write
66C6000
heap
page read and write
1189000
unkown
page execute read
66A0000
heap
page read and write
1A94000
heap
page read and write
66C6000
heap
page read and write
1A94000
heap
page read and write
66F4000
heap
page read and write
3820000
heap
page read and write
66A0000
heap
page read and write
3621000
heap
page read and write
617E000
stack
page read and write
5B6D000
stack
page read and write
1A94000
heap
page read and write
66A5000
heap
page read and write
66B0000
heap
page read and write
6760000
trusted library allocation
page read and write
6760000
trusted library allocation
page read and write
1C86000
heap
page read and write
66DE000
heap
page read and write
66C6000
heap
page read and write
66D7000
heap
page read and write
66E4000
heap
page read and write
66AE000
heap
page read and write
1A94000
heap
page read and write
1C9A000
heap
page read and write
3621000
heap
page read and write
66E4000
heap
page read and write
1A94000
heap
page read and write
1A94000
heap
page read and write
66D1000
heap
page read and write
66B0000
heap
page read and write
66CB000
heap
page read and write
63C0000
heap
page read and write
66AA000
heap
page read and write
3621000
heap
page read and write
66C1000
heap
page read and write
66B0000
heap
page read and write
EF5000
unkown
page execute read
6713000
heap
page read and write
66A7000
heap
page read and write
6597000
heap
page read and write
66AF000
heap
page read and write
1CB4000
heap
page read and write
66E8000
heap
page read and write
66C6000
heap
page read and write
3621000
heap
page read and write
66CB000
heap
page read and write
1A8E000
stack
page read and write
1554000
unkown
page readonly
66E6000
heap
page read and write
66C6000
heap
page read and write
1D1A000
heap
page read and write
1A94000
heap
page read and write
66B0000
heap
page read and write
66DB000
heap
page read and write
66CC000
heap
page read and write
66C2000
heap
page read and write
1D16000
heap
page read and write
6717000
heap
page read and write
66C2000
heap
page read and write
1A94000
heap
page read and write
3621000
heap
page read and write
There are 291 hidden memdumps, click here to show them.