IOC Report
RJQySowVRb.exe

loading gif

Files

File Path
Type
Category
Malicious
RJQySowVRb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RJQySowVRb.exe_578156fadb6f1169ab472cfee580afe94862df50_4a02f318_6adae49a-b05d-4a0e-a1d6-d9dc6368ff1a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D3B.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 17:32:03 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E26.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E47.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RJQySowVRb.exe
"C:\Users\user\Desktop\RJQySowVRb.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 1228

URLs

Name
IP
Malicious
http://62.204.41.150
unknown
malicious
http://62.204.41.150/
62.204.41.150
malicious
http://62.204.41.150/edd20096ecef326d.php
62.204.41.150
malicious
http://62.204.41.150/edd20096ecef326d.phpS
unknown
http://upx.sf.net
unknown
http://62.204.41.150/edd20096ecef326d.phpx
unknown
http://62.204.41.150/x
unknown
http://62.204.41.150/:
unknown
http://62.204.41.150/edd20096ecef326d.phpT
unknown
http://62.204.41.150/edd20096ecef326d.phpd
unknown
http://62.204.41.150=
unknown
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
62.204.41.150
unknown
United Kingdom
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
ProgramId
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
FileId
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
LowerCaseLongPath
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
LongPathHash
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
Name
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
OriginalFileName
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
Publisher
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
Version
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
BinFileVersion
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
BinaryType
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
ProductName
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
ProductVersion
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
LinkDate
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
BinProductVersion
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
AppxPackageFullName
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
AppxPackageRelativeId
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
Size
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
Language
\REGISTRY\A\{f7cb1475-435b-d40f-d41b-d71921e3bb91}\Root\InventoryApplicationFile\rjqysowvrb.exe|265dd022950c56ba
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
22D0000
direct allocation
page execute and read and write
malicious
979000
heap
page read and write
malicious
2320000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
19D000
stack
page read and write
7A0000
heap
page read and write
1A76F000
stack
page read and write
8EE000
stack
page read and write
1AC6F000
stack
page read and write
23CE000
stack
page read and write
4B1000
unkown
page execute and read and write
B2F000
stack
page read and write
1AB6E000
stack
page read and write
78E000
stack
page read and write
1A9ED000
stack
page read and write
401000
unkown
page execute read
194000
stack
page read and write
2453000
heap
page read and write
65C000
unkown
page execute and read and write
1AA2E000
stack
page read and write
44B000
unkown
page write copy
4E2000
unkown
page execute and read and write
1A7AE000
stack
page read and write
2330000
heap
page read and write
1A8AF000
stack
page read and write
64A000
unkown
page execute and read and write
255F000
stack
page read and write
2590000
heap
page read and write
9C000
stack
page read and write
94D000
heap
page execute and read and write
740000
heap
page read and write
7A5000
heap
page read and write
930000
heap
page read and write
41D000
unkown
page readonly
1A66F000
stack
page read and write
1AB2E000
stack
page read and write
4BD000
unkown
page execute and read and write
2380000
heap
page read and write
93E000
heap
page read and write
9AE000
heap
page read and write
9CA000
heap
page read and write
8AF000
stack
page read and write
244E000
stack
page read and write
400000
unkown
page readonly
40F000
unkown
page readonly
240E000
stack
page read and write
460000
unkown
page readonly
2450000
heap
page read and write
1F0000
heap
page read and write
93A000
heap
page read and write
994000
heap
page read and write
1A8EE000
stack
page read and write
There are 42 hidden memdumps, click here to show them.