IOC Report
rPO_CW00402902400415.exe

loading gif

Files

File Path
Type
Category
Malicious
rPO_CW00402902400415.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rPO_CW0040290240_3337ff837319f9c3d7f3ada581f0997a8cb9321c_4b0452fd_c1c7692c-f1ab-48eb-a03e-dae1a522c1a4\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8D6B.tmp.dmp
Mini DuMP crash report, 16 streams, Wed Sep 25 11:46:59 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER93B5.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER93F4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rPO_CW00402902400415.exe
"C:\Users\user\Desktop\rPO_CW00402902400415.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6860 -s 1040

URLs

Name
IP
Malicious
http://upx.sf.net
unknown
https://account.dyn.com/
unknown
http://mail.alhoneycomb.com
unknown

Domains

Name
IP
Malicious
mail.alhoneycomb.com
74.119.238.7
malicious

IPs

IP
Domain
Country
Malicious
74.119.238.7
mail.alhoneycomb.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
ProgramId
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
FileId
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
LowerCaseLongPath
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
LongPathHash
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
Name
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
OriginalFileName
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
Publisher
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
Version
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
BinFileVersion
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
BinaryType
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
ProductName
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
ProductVersion
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
LinkDate
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
BinProductVersion
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
AppxPackageFullName
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
AppxPackageRelativeId
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
Size
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
Language
\REGISTRY\A\{5e024101-0d29-613b-8078-4d718364f6fc}\Root\InventoryApplicationFile\rpo_cw0040290240|ab8ca177057d50d6
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2421000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
1930A253000
trusted library allocation
page read and write
malicious
19319F07000
trusted library allocation
page read and write
malicious
193226C0000
heap
page execute and read and write
2830000
trusted library allocation
page read and write
5AD0000
trusted library allocation
page read and write
27BD000
trusted library allocation
page read and write
B9000
stack
page read and write
5742000
heap
page read and write
20F0000
heap
page read and write
21B8000
trusted library allocation
page read and write
2160000
trusted library allocation
page read and write
5A8E000
stack
page read and write
440000
remote allocation
page execute and read and write
2065CFE000
stack
page read and write
C123000
heap
page read and write
19308360000
heap
page read and write
1931A0CD000
trusted library allocation
page read and write
7E40000
heap
page read and write
21AE000
stack
page read and write
7FFD9BB4A000
trusted library allocation
page read and write
2854000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
2410000
heap
page execute and read and write
2697000
trusted library allocation
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
3489000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
58C0000
trusted library allocation
page execute and read and write
250F000
trusted library allocation
page read and write
19308495000
heap
page read and write
2856000
trusted library allocation
page read and write
193083E9000
heap
page read and write
193084C0000
trusted library allocation
page read and write
460000
heap
page read and write
19309F48000
trusted library allocation
page read and write
2671000
trusted library allocation
page read and write
5870000
heap
page read and write
4E8000
heap
page read and write
2140000
trusted library allocation
page read and write
2130000
trusted library allocation
page read and write
55C000
heap
page read and write
58B3000
trusted library allocation
page read and write
20660FE000
stack
page read and write
2142000
trusted library allocation
page read and write
19308362000
heap
page read and write
22A0000
heap
page read and write
7FFD9BB44000
trusted library allocation
page read and write
4E66000
trusted library allocation
page read and write
25A5000
trusted library allocation
page read and write
5AD3000
trusted library allocation
page read and write
4860000
trusted library allocation
page read and write
193084F0000
trusted library allocation
page read and write
23B0000
trusted library allocation
page read and write
7FF484B80000
trusted library allocation
page execute and read and write
19308525000
heap
page read and write
3669000
trusted library allocation
page read and write
19308490000
heap
page read and write
34E9000
trusted library allocation
page read and write
2931000
trusted library allocation
page read and write
19322810000
heap
page read and write
374A000
trusted library allocation
page read and write
3609000
trusted library allocation
page read and write
228C000
stack
page read and write
19309F01000
trusted library allocation
page read and write
3569000
trusted library allocation
page read and write
2730000
trusted library allocation
page read and write
270C000
trusted library allocation
page read and write
1930834D000
heap
page read and write
5E4E000
stack
page read and write
1930838A000
heap
page read and write
27CC000
trusted library allocation
page read and write
5809000
heap
page read and write
23FD000
trusted library allocation
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
373A000
trusted library allocation
page read and write
C0D0000
heap
page read and write
212D000
trusted library allocation
page execute and read and write
23F1000
trusted library allocation
page read and write
3689000
trusted library allocation
page read and write
2113000
trusted library allocation
page execute and read and write
35A9000
trusted library allocation
page read and write
5C8E000
stack
page read and write
4C5E000
stack
page read and write
5DCC000
stack
page read and write
2145000
trusted library allocation
page execute and read and write
5AB000
heap
page read and write
19308343000
heap
page read and write
27A8000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
57DC000
heap
page read and write
94A000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
50A000
heap
page read and write
59EE000
stack
page read and write
376A000
trusted library allocation
page read and write
514000
heap
page read and write
1930838C000
heap
page read and write
48D0000
heap
page read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
58D0000
trusted library allocation
page read and write
4CAC000
stack
page read and write
23E2000
trusted library allocation
page read and write
213A000
trusted library allocation
page execute and read and write
516000
heap
page read and write
36EA000
trusted library allocation
page read and write
27A6000
trusted library allocation
page read and write
3449000
trusted library allocation
page read and write
4D0000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
372A000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
26E0000
trusted library allocation
page read and write
19319F01000
trusted library allocation
page read and write
4A1C000
stack
page read and write
2065EFD000
stack
page read and write
193083FA000
heap
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
282E000
trusted library allocation
page read and write
4FE000
heap
page read and write
20658F3000
stack
page read and write
5832000
heap
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
57BA000
heap
page read and write
19309D70000
heap
page read and write
7FFD9BB30000
trusted library allocation
page read and write
7E20000
heap
page read and write
554000
heap
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
19309EF0000
heap
page execute and read and write
451D000
stack
page read and write
59A0000
trusted library allocation
page execute and read and write
4CE000
stack
page read and write
19308392000
heap
page read and write
48D4000
heap
page read and write
48A0000
heap
page execute and read and write
7250000
trusted library allocation
page read and write
3589000
trusted library allocation
page read and write
C10A000
heap
page read and write
58BD000
trusted library allocation
page read and write
26BB000
trusted library allocation
page read and write
5744000
heap
page read and write
2646000
trusted library allocation
page read and write
7BCC000
stack
page read and write
23AE000
stack
page read and write
4E30000
trusted library allocation
page execute and read and write
7DCD000
stack
page read and write
4E60000
trusted library allocation
page read and write
270A000
trusted library allocation
page read and write
277B000
trusted library allocation
page read and write
19308320000
heap
page read and write
1930832C000
heap
page read and write
465000
heap
page read and write
193083F7000
heap
page read and write
193084E0000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page execute and read and write
7CCC000
stack
page read and write
2136000
trusted library allocation
page execute and read and write
589000
heap
page read and write
193081B8000
unkown
page readonly
211D000
trusted library allocation
page execute and read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7F850000
trusted library allocation
page execute and read and write
2120000
trusted library allocation
page read and write
563D000
stack
page read and write
2938000
trusted library allocation
page read and write
C10F000
heap
page read and write
2798000
trusted library allocation
page read and write
57CF000
heap
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
2114000
trusted library allocation
page read and write
3421000
trusted library allocation
page read and write
36AA000
trusted library allocation
page read and write
579000
heap
page read and write
7FFD9BB6E000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
7FD0000
trusted library allocation
page read and write
2132000
trusted library allocation
page read and write
57FE000
heap
page read and write
20661FE000
stack
page read and write
2290000
trusted library allocation
page execute and read and write
7AE000
stack
page read and write
2065FFE000
stack
page read and write
23DE000
trusted library allocation
page read and write
57D000
heap
page read and write
7E30000
heap
page read and write
4DAC000
stack
page read and write
3529000
trusted library allocation
page read and write
3509000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
19308460000
heap
page read and write
58A0000
trusted library allocation
page read and write
82E000
stack
page read and write
92F000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
23D0000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
2065DFC000
stack
page read and write
567B000
stack
page read and write
19308240000
heap
page read and write
7E0000
heap
page read and write
253A000
trusted library allocation
page read and write
4B5E000
stack
page read and write
25FB000
trusted library allocation
page read and write
2734000
trusted library allocation
page read and write
4E0000
heap
page read and write
5ACE000
stack
page read and write
5759000
heap
page read and write
48E0000
heap
page read and write
7FFD9B994000
trusted library allocation
page read and write
23DB000
trusted library allocation
page read and write
4E2C000
stack
page read and write
5CCC000
stack
page read and write
58A6000
trusted library allocation
page read and write
7FCA000
heap
page read and write
5B2000
heap
page read and write
5880000
heap
page read and write
28E0000
trusted library allocation
page read and write
370A000
trusted library allocation
page read and write
36CA000
trusted library allocation
page read and write
35E9000
trusted library allocation
page read and write
940000
heap
page read and write
2804000
trusted library allocation
page read and write
34A9000
trusted library allocation
page read and write
3629000
trusted library allocation
page read and write
5740000
heap
page read and write
20659FE000
stack
page read and write
35C9000
trusted library allocation
page read and write
2147000
trusted library allocation
page execute and read and write
7FFD9B9BB000
trusted library allocation
page execute and read and write
1B9000
stack
page read and write
19321F30000
trusted library allocation
page read and write
5750000
heap
page read and write
19308420000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
480000
heap
page read and write
23EE000
trusted library allocation
page read and write
5825000
heap
page read and write
5E60000
trusted library allocation
page execute and read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9BA46000
trusted library allocation
page read and write
5E0E000
stack
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
193084F3000
trusted library allocation
page read and write
3431000
trusted library allocation
page read and write
290C000
trusted library allocation
page read and write
3649000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
193225C0000
trusted library section
page read and write
19308520000
heap
page read and write
4B1C000
stack
page read and write
2110000
trusted library allocation
page read and write
19308440000
heap
page read and write
193081B2000
unkown
page readonly
946000
heap
page read and write
23F6000
trusted library allocation
page read and write
34C9000
trusted library allocation
page read and write
214B000
trusted library allocation
page execute and read and write
5746000
heap
page read and write
2673000
trusted library allocation
page read and write
25AB000
trusted library allocation
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
193081B0000
unkown
page readonly
3549000
trusted library allocation
page read and write
4870000
trusted library allocation
page read and write
23C0000
trusted library allocation
page read and write
25FD000
trusted library allocation
page read and write
25D7000
trusted library allocation
page read and write
7FC0000
heap
page read and write
7FFD9BB70000
trusted library allocation
page read and write
2963000
trusted library allocation
page read and write
2560000
trusted library allocation
page read and write
2065BFF000
stack
page read and write
2065AFE000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
3679000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
7FFD9B992000
trusted library allocation
page read and write
There are 272 hidden memdumps, click here to show them.