Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
rMA7e8O8iY.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_326eb6a19cfdf346a5bd562595d48d974b8521d_7522e4b5_3279ce3c-6d9e-42cd-8c2d-460228f7ae03\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_33482b87b0d8e03f47394b2e9a0604dbf93164_7522e4b5_0ba2ff45-be23-4a4a-b704-a8553d49b4a2\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_33482b87b0d8e03f47394b2e9a0604dbf93164_7522e4b5_296a96e6-a1fd-4510-b036-067b4db15b33\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c018787967c562f75385d7bd4d3f68f02869ef4c_7522e4b5_ac1e9f39-e6d8-48d1-88ca-21009397ff1b\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER529D.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sun Oct 13 12:05:16 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER52BC.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sun Oct 13 12:05:16 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5398.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER53A8.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER53C8.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER53D7.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5D6B.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sun Oct 13 12:05:19 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5DAA.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5E09.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6961.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sun Oct 13 12:05:22 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A2D.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A6D.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 8 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\rMA7e8O8iY.dll,GzDHLPTXbfjnZdGY
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",#1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5984 -s 600
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6348 -s 608
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\rMA7e8O8iY.dll,bnihrxnmrpio
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6160 -s 600
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\rMA7e8O8iY.dll,bnpghteyxrum
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 560 -s 592
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",GzDHLPTXbfjnZdGY
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",bnihrxnmrpio
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",bnpghteyxrum
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",snozacqpuormqulw
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",rbfyvzbrlz
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",fnyxctjuscq
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProgramId
|
||
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
FileId
|
||
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LowerCaseLongPath
|
||
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LongPathHash
|
||
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Name
|
||
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
OriginalFileName
|
||
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Publisher
|
||
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Version
|
||
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinFileVersion
|
||
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinaryType
|
||
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductName
|
||
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductVersion
|
||
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LinkDate
|
||
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinProductVersion
|
||
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageFullName
|
||
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Size
|
||
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Language
|
||
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
IsOsComponent
|
||
\REGISTRY\A\{0866624a-aba2-39c2-467e-616e58f08e5b}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 12 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6C790000
|
unkown
|
page readonly
|
||
26FF000
|
stack
|
page read and write
|
||
269A000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
F5F000
|
heap
|
page read and write
|
||
2690000
|
heap
|
page read and write
|
||
6C790000
|
unkown
|
page readonly
|
||
2ABE000
|
stack
|
page read and write
|
||
F6D000
|
heap
|
page read and write
|
||
6C791000
|
unkown
|
page execute read
|
||
6C7AC000
|
unkown
|
page readonly
|
||
263E000
|
stack
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
2C70000
|
remote allocation
|
page read and write
|
||
4BF0000
|
heap
|
page read and write
|
||
350A000
|
heap
|
page read and write
|
||
6C791000
|
unkown
|
page execute read
|
||
124F000
|
stack
|
page read and write
|
||
2E0000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
267F000
|
stack
|
page read and write
|
||
272B000
|
stack
|
page read and write
|
||
6C790000
|
unkown
|
page readonly
|
||
2B0000
|
heap
|
page read and write
|
||
2C3B000
|
stack
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
15B000
|
stack
|
page read and write
|
||
4CF5000
|
heap
|
page read and write
|
||
3F30000
|
remote allocation
|
page read and write
|
||
6C7A1000
|
unkown
|
page readonly
|
||
347F000
|
stack
|
page read and write
|
||
6C7AE000
|
unkown
|
page readonly
|
||
4CF0000
|
heap
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
6C7AC000
|
unkown
|
page readonly
|
||
2CAA000
|
heap
|
page read and write
|
||
6C7AE000
|
unkown
|
page readonly
|
||
26BE000
|
stack
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
6C7AC000
|
unkown
|
page readonly
|
||
2770000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
2D0000
|
heap
|
page read and write
|
||
6C7A1000
|
unkown
|
page readonly
|
||
2D2A000
|
heap
|
page read and write
|
||
6C790000
|
unkown
|
page readonly
|
||
2C0000
|
heap
|
page read and write
|
||
6C7A9000
|
unkown
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
2EEA000
|
heap
|
page read and write
|
||
2C4F000
|
stack
|
page read and write
|
||
6C7AC000
|
unkown
|
page readonly
|
||
260000
|
heap
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
2FAB000
|
stack
|
page read and write
|
||
4950000
|
heap
|
page read and write
|
||
6C791000
|
unkown
|
page execute read
|
||
30E0000
|
heap
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
6C7AC000
|
unkown
|
page readonly
|
||
26C0000
|
heap
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
28BC000
|
stack
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
2B3A000
|
heap
|
page read and write
|
||
1AB000
|
stack
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
4BDF000
|
stack
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
6C791000
|
unkown
|
page execute read
|
||
268F000
|
stack
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
28BC000
|
stack
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
E1E000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
315E000
|
stack
|
page read and write
|
||
114F000
|
stack
|
page read and write
|
||
319F000
|
stack
|
page read and write
|
||
1EC000
|
stack
|
page read and write
|
||
6C7AE000
|
unkown
|
page readonly
|
||
200000
|
heap
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
6C790000
|
unkown
|
page readonly
|
||
4560000
|
remote allocation
|
page read and write
|
||
6C7AE000
|
unkown
|
page readonly
|
||
2B0E000
|
stack
|
page read and write
|
||
6C790000
|
unkown
|
page readonly
|
||
1D0000
|
heap
|
page read and write
|
||
4640000
|
heap
|
page read and write
|
||
6C7AE000
|
unkown
|
page readonly
|
||
6C791000
|
unkown
|
page execute read
|
||
6C790000
|
unkown
|
page readonly
|
||
6C791000
|
unkown
|
page execute read
|
||
6C7A1000
|
unkown
|
page readonly
|
||
276C000
|
stack
|
page read and write
|
||
303B000
|
stack
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
273B000
|
stack
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
48A0000
|
heap
|
page read and write
|
||
4250000
|
heap
|
page read and write
|
||
250000
|
heap
|
page read and write
|
||
6C7AE000
|
unkown
|
page readonly
|
||
6C7A1000
|
unkown
|
page readonly
|
||
6C7AE000
|
unkown
|
page readonly
|
||
3490000
|
heap
|
page read and write
|
||
6C791000
|
unkown
|
page execute read
|
||
3250000
|
heap
|
page read and write
|
||
6C7A9000
|
unkown
|
page read and write
|
||
4B9E000
|
stack
|
page read and write
|
||
6C7A9000
|
unkown
|
page read and write
|
||
307C000
|
stack
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
6C7A1000
|
unkown
|
page readonly
|
||
264E000
|
stack
|
page read and write
|
||
6C7AE000
|
unkown
|
page readonly
|
||
3FD0000
|
heap
|
page read and write
|
||
288A000
|
heap
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
263E000
|
stack
|
page read and write
|
||
C5C000
|
stack
|
page read and write
|
||
2C4A000
|
heap
|
page read and write
|
||
2BAF000
|
stack
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
47C0000
|
remote allocation
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
277C000
|
stack
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
D5C000
|
stack
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
6C7A9000
|
unkown
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
3530000
|
heap
|
page read and write
|
||
4E0F000
|
stack
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
46A0000
|
heap
|
page read and write
|
||
6C7A1000
|
unkown
|
page readonly
|
||
2A20000
|
heap
|
page read and write
|
||
32AA000
|
heap
|
page read and write
|
||
287B000
|
stack
|
page read and write
|
||
6C7A1000
|
unkown
|
page readonly
|
||
2B7F000
|
stack
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
239F000
|
stack
|
page read and write
|
||
6C791000
|
unkown
|
page execute read
|
||
2D40000
|
heap
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
6C7A1000
|
unkown
|
page readonly
|
||
6C7AC000
|
unkown
|
page readonly
|
||
6C791000
|
unkown
|
page execute read
|
||
6C790000
|
unkown
|
page readonly
|
||
2C7C000
|
stack
|
page read and write
|
||
F68000
|
heap
|
page read and write
|
||
287B000
|
stack
|
page read and write
|
||
6C7AC000
|
unkown
|
page readonly
|
||
235E000
|
stack
|
page read and write
|
||
2E5F000
|
stack
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
6C7AE000
|
unkown
|
page readonly
|
||
2930000
|
heap
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
6C7A9000
|
unkown
|
page read and write
|
||
2C80000
|
remote allocation
|
page read and write
|
||
6C791000
|
unkown
|
page execute read
|
||
19C000
|
stack
|
page read and write
|
||
6C7A1000
|
unkown
|
page readonly
|
||
6C7AC000
|
unkown
|
page readonly
|
||
293A000
|
heap
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
45B0000
|
heap
|
page read and write
|
||
6C7AC000
|
unkown
|
page readonly
|
||
6C7A9000
|
unkown
|
page read and write
|
||
12B000
|
stack
|
page read and write
|
||
2B7F000
|
stack
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
47E0000
|
heap
|
page read and write
|
||
6C7AC000
|
unkown
|
page readonly
|
||
6C790000
|
unkown
|
page readonly
|
||
4450000
|
heap
|
page read and write
|
||
2A55000
|
heap
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
6C7AE000
|
unkown
|
page readonly
|
||
6C7A9000
|
unkown
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
2B2F000
|
stack
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
4790000
|
heap
|
page read and write
|
||
237E000
|
stack
|
page read and write
|
||
4620000
|
heap
|
page read and write
|
||
6C7A1000
|
unkown
|
page readonly
|
||
4955000
|
heap
|
page read and write
|
||
4130000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
23BF000
|
stack
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
6C7A9000
|
unkown
|
page read and write
|
||
6C7A9000
|
unkown
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
4C20000
|
remote allocation
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
6C790000
|
unkown
|
page readonly
|
||
4050000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
16C000
|
stack
|
page read and write
|
||
2FEC000
|
stack
|
page read and write
|
||
267F000
|
stack
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
2755000
|
heap
|
page read and write
|
||
6C7A9000
|
unkown
|
page read and write
|
||
F5B000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
2A8E000
|
stack
|
page read and write
|
There are 221 hidden memdumps, click here to show them.