IOC Report
rRFQ_025261-97382.exe

loading gif

Files

File Path
Type
Category
Malicious
rRFQ_025261-97382.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RegSvcs.exe_5bfa5ea0315cdaca1a7b99df22c7fbd6fc2a1cb_d4dab669_9df69206-636c-4235-adee-284acc9437f2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC640.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Jul 24 12:40:18 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC799.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC7B9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\autA153.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autA193.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\brontothere
data
dropped
C:\Users\user\AppData\Local\Temp\trickstress
FGDC-STD-001-1998
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rRFQ_025261-97382.exe
"C:\Users\user\Desktop\rRFQ_025261-97382.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\rRFQ_025261-97382.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 1484

URLs

Name
IP
Malicious
http://upx.sf.net
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.org/
158.101.44.242
http://checkip.dyndns.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://checkip.dyndns.org/q
unknown
https://reallyfreegeoip.org/xml/
unknown

Domains

Name
IP
Malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
158.101.44.242

IPs

IP
Domain
Country
Malicious
158.101.44.242
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
ProgramId
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
FileId
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
LowerCaseLongPath
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
LongPathHash
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
Name
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
OriginalFileName
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
Publisher
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
Version
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
BinFileVersion
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
BinaryType
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
ProductName
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
ProductVersion
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
LinkDate
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
BinProductVersion
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
AppxPackageFullName
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
AppxPackageRelativeId
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
Size
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
Language
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
IsOsComponent
\REGISTRY\A\{cc77e875-d234-0570-ff8c-7acb40876916}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
Usn
There are 25 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2B41000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
4020000
direct allocation
page read and write
malicious
50BD000
stack
page read and write
19D6000
heap
page read and write
603E000
stack
page read and write
438E000
direct allocation
page read and write
1964000
heap
page read and write
C00000
heap
page read and write
EED000
trusted library allocation
page execute and read and write
2C16000
trusted library allocation
page read and write
188C000
heap
page read and write
F10000
heap
page read and write
89B000
stack
page read and write
15BF000
stack
page read and write
4080000
direct allocation
page read and write
4319000
direct allocation
page read and write
211000
unkown
page execute read
317000
unkown
page readonly
244E000
stack
page read and write
545E000
stack
page read and write
117E000
stack
page read and write
41F0000
direct allocation
page read and write
4173000
direct allocation
page read and write
51D0000
heap
page read and write
1360000
trusted library allocation
page read and write
19C5000
heap
page read and write
19B5000
heap
page read and write
136B000
trusted library allocation
page read and write
1117000
trusted library allocation
page execute and read and write
210000
unkown
page readonly
1996000
heap
page read and write
1130000
trusted library allocation
page read and write
18C9000
heap
page read and write
1003000
heap
page read and write
1858000
heap
page read and write
1989000
heap
page read and write
18C8000
heap
page read and write
997000
stack
page read and write
2A25000
trusted library allocation
page read and write
210000
unkown
page readonly
431D000
direct allocation
page read and write
1110000
trusted library allocation
page read and write
D1E000
stack
page read and write
F90000
heap
page read and write
1997000
heap
page read and write
4080000
direct allocation
page read and write
ED0000
trusted library allocation
page read and write
F29000
stack
page read and write
11A0000
trusted library allocation
page read and write
2E4000
unkown
page readonly
F00000
trusted library allocation
page read and write
1850000
heap
page read and write
F99000
heap
page read and write
4220000
direct allocation
page read and write
507D000
stack
page read and write
41F0000
direct allocation
page read and write
EE4000
trusted library allocation
page read and write
4349000
direct allocation
page read and write
4349000
direct allocation
page read and write
5490000
heap
page execute and read and write
D85000
heap
page read and write
1380000
trusted library allocation
page read and write
19B5000
heap
page read and write
569E000
stack
page read and write
1740000
heap
page read and write
18C8000
heap
page read and write
11B0000
trusted library allocation
page read and write
3B47000
trusted library allocation
page read and write
4080000
direct allocation
page read and write
559E000
stack
page read and write
204E000
stack
page read and write
43BE000
direct allocation
page read and write
1996000
heap
page read and write
188B000
heap
page read and write
1883000
heap
page read and write
F4B000
heap
page read and write
15DD000
stack
page read and write
434D000
direct allocation
page read and write
2C02000
trusted library allocation
page read and write
519E000
stack
page read and write
2D2000
unkown
page readonly
189B000
heap
page read and write
4CDE000
stack
page read and write
2AC000
unkown
page readonly
FDE000
stack
page read and write
188B000
heap
page read and write
1180000
trusted library allocation
page execute and read and write
17B0000
heap
page read and write
2BEA000
trusted library allocation
page read and write
4319000
direct allocation
page read and write
19C5000
heap
page read and write
51E0000
heap
page read and write
29EE000
stack
page read and write
F18000
heap
page read and write
D20000
heap
page read and write
1883000
heap
page read and write
15EF000
stack
page read and write
18C8000
heap
page read and write
18C8000
heap
page read and write
41A3000
direct allocation
page read and write
F97000
heap
page read and write
2E4000
unkown
page readonly
1790000
direct allocation
page execute and read and write
317000
unkown
page readonly
FE0000
heap
page read and write
18E8000
heap
page read and write
F0A000
trusted library allocation
page execute and read and write
43BE000
direct allocation
page read and write
2AC000
unkown
page readonly
4050000
direct allocation
page read and write
2A30000
heap
page execute and read and write
56DE000
stack
page read and write
15CF000
stack
page read and write
438E000
direct allocation
page read and write
15FF000
stack
page read and write
2DC000
unkown
page read and write
2C05000
trusted library allocation
page read and write
1710000
heap
page read and write
110E000
stack
page read and write
2D2000
unkown
page readonly
18B8000
heap
page read and write
1112000
trusted library allocation
page read and write
41A3000
direct allocation
page read and write
2BF9000
trusted library allocation
page read and write
F2E000
heap
page read and write
4220000
direct allocation
page read and write
18A9000
heap
page read and write
4319000
direct allocation
page read and write
431D000
direct allocation
page read and write
4050000
direct allocation
page read and write
4220000
direct allocation
page read and write
11C0000
heap
page read and write
2BEF000
trusted library allocation
page read and write
1996000
heap
page read and write
EE3000
trusted library allocation
page execute and read and write
188C000
heap
page read and write
3B69000
trusted library allocation
page read and write
400000
system
page execute and read and write
1190000
heap
page read and write
F48000
heap
page read and write
434D000
direct allocation
page read and write
1780000
heap
page read and write
4173000
direct allocation
page read and write
D6E000
stack
page read and write
1884000
heap
page read and write
434D000
direct allocation
page read and write
111B000
trusted library allocation
page execute and read and write
189D000
heap
page read and write
1714000
heap
page read and write
4050000
direct allocation
page read and write
5F3F000
stack
page read and write
5E3E000
stack
page read and write
43BE000
direct allocation
page read and write
41F0000
direct allocation
page read and write
3B41000
trusted library allocation
page read and write
19B6000
heap
page read and write
EF0000
trusted library allocation
page read and write
FC9000
heap
page read and write
F06000
trusted library allocation
page execute and read and write
D80000
heap
page read and write
4349000
direct allocation
page read and write
18C8000
heap
page read and write
2E0000
unkown
page write copy
11B6000
trusted library allocation
page read and write
18C8000
heap
page read and write
41A3000
direct allocation
page read and write
E8F000
stack
page read and write
170E000
stack
page read and write
211000
unkown
page execute read
E90000
heap
page read and write
1390000
heap
page read and write
2DC000
unkown
page write copy
438E000
direct allocation
page read and write
431D000
direct allocation
page read and write
1874000
heap
page read and write
2B3E000
stack
page read and write
2BE7000
trusted library allocation
page read and write
4173000
direct allocation
page read and write
There are 169 hidden memdumps, click here to show them.