IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_fil_4ae1b8f93a1c042e2414641401d156f19dc19b3_d75f6fa5_d9c7960c-7b33-4c11-89b0-f4abeeebb822\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_fil_4ae1b8f93a1c042e2414641401d156f19dc19b3_d75f6fa5_ddd5b7b4-0d9e-491c-be0f-54ed85a4510c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER88DD.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Oct 2 16:46:53 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER894C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER897C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9E1B.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Oct 2 16:46:58 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9E6A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9E9A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\file.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\file.dll,Java_sun_tracing_dtrace_JVM_activate0
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",#1
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\file.dll,Java_sun_tracing_dtrace_JVM_defineClass0
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2836 -s 328
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\file.dll,Java_sun_tracing_dtrace_JVM_dispose0
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_activate0
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_defineClass0
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_dispose0
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_isSupported0
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_isEnabled0
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3500 -s 324
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
OriginalFileName
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageFullName
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageRelativeId
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
\REGISTRY\A\{fb568cfe-d8fc-aae1-2902-5dcee967ef16}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Usn
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1AF61D70000
heap
page read and write
1F553F98000
heap
page read and write
1E587C30000
heap
page read and write
150E8720000
heap
page read and write
1E587CE0000
heap
page read and write
17FF87E000
stack
page read and write
7FF8BFAB6000
unkown
page readonly
13D2B73E000
heap
page read and write
17FF54C000
stack
page read and write
20DD21D0000
heap
page read and write
1F50CE15000
heap
page read and write
13D2D300000
heap
page read and write
1F554090000
heap
page read and write
1B960F30000
heap
page read and write
564370F000
stack
page read and write
1BB535B0000
heap
page read and write
13D2B710000
heap
page read and write
1F95A8D5000
heap
page read and write
1BB533C0000
heap
page read and write
90A089C000
stack
page read and write
1E587F45000
heap
page read and write
13D2B9F0000
heap
page read and write
1B960D58000
heap
page read and write
1B906FE000
stack
page read and write
46D0BEC000
stack
page read and write
20DD1EDC000
heap
page read and write
BF7A52C000
stack
page read and write
A5068FF000
stack
page read and write
1B960E50000
heap
page read and write
946AFE000
stack
page read and write
1AF61F30000
heap
page read and write
15419DF000
stack
page read and write
20DD1E30000
heap
page read and write
1F50CB88000
heap
page read and write
1E587C20000
heap
page read and write
1AF62175000
heap
page read and write
1F554265000
heap
page read and write
1F95A8D0000
heap
page read and write
1BB536A0000
heap
page read and write
1F95A630000
heap
page read and write
150E8440000
heap
page read and write
A50697F000
stack
page read and write
7FF8BFAB6000
unkown
page readonly
150E8620000
heap
page read and write
150E87C0000
heap
page read and write
13D2B9F5000
heap
page read and write
1E587F40000
heap
page read and write
1F5540B0000
heap
page read and write
1F50CB40000
heap
page read and write
1541C7F000
stack
page read and write
1F95A880000
heap
page read and write
7FF8BFAB1000
unkown
page execute read
7FF8BFAB3000
unkown
page readonly
13D2B900000
heap
page read and write
1F50CB80000
heap
page read and write
BF7A5AE000
stack
page read and write
1BB53735000
heap
page read and write
564368C000
stack
page read and write
1F95A600000
heap
page read and write
20DD1ED7000
heap
page read and write
BF7A87E000
stack
page read and write
1F50CA60000
heap
page read and write
1B9038C000
stack
page read and write
1F95A638000
heap
page read and write
1E587CE8000
heap
page read and write
150E87C5000
heap
page read and write
154195C000
stack
page read and write
1BB533B0000
heap
page read and write
1F95A5D0000
heap
page read and write
1AF63A90000
heap
page read and write
13D2B738000
heap
page read and write
1E589860000
heap
page read and write
295973C000
stack
page read and write
1B9067F000
stack
page read and write
2959A7F000
stack
page read and write
1F5541A0000
heap
page read and write
46D0EFF000
stack
page read and write
1BB533E0000
heap
page read and write
1F50CE10000
heap
page read and write
7FF8BFAB3000
unkown
page readonly
1AF61E70000
heap
page read and write
1F50CD00000
heap
page read and write
90A099E000
stack
page read and write
1F50CB60000
heap
page read and write
946B7E000
stack
page read and write
1B960D6F000
heap
page read and write
13D2B730000
heap
page read and write
1B960D50000
heap
page read and write
1E587C50000
heap
page read and write
46D0FFE000
stack
page read and write
1F95A5E0000
heap
page read and write
17FF5CE000
stack
page read and write
13D2B920000
heap
page read and write
20DD1ECD000
heap
page read and write
1AF62170000
heap
page read and write
1AF61E50000
heap
page read and write
7FF8BFAB0000
unkown
page readonly
20DD1EC0000
heap
page read and write
150E8528000
heap
page read and write
29597BF000
stack
page read and write
946A7C000
stack
page read and write
A50687C000
stack
page read and write
150E8520000
heap
page read and write
1B960D5F000
heap
page read and write
1F553EB0000
heap
page read and write
1BB533E8000
heap
page read and write
1B961040000
heap
page read and write
1BB53730000
heap
page read and write
1B961045000
heap
page read and write
90A091F000
stack
page read and write
1AF61F38000
heap
page read and write
20DD1E40000
heap
page read and write
1B962900000
heap
page read and write
7FF8BFAB0000
unkown
page readonly
7FF8BFAB1000
unkown
page execute read
1F554260000
heap
page read and write
1F553F90000
heap
page read and write
20DD1E70000
heap
page read and write
1B960F50000
heap
page read and write
150E8640000
heap
page read and write
There are 110 hidden memdumps, click here to show them.