IOC Report
msvcp110.dll

loading gif

Files

File Path
Type
Category
Malicious
msvcp110.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_aspnet_regiis.ex_c7496913b9c4ddf6a8ea5944b8f620d91bfba12_edfe2fff_6d2334a9-d117-4c9d-a14b-c975bce9f6c7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_aspnet_regiis.ex_c7496913b9c4ddf6a8ea5944b8f620d91bfba12_edfe2fff_73e42fea-b641-47b7-9191-6583a7169bb0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_aspnet_regiis.ex_c7496913b9c4ddf6a8ea5944b8f620d91bfba12_edfe2fff_e6cff271-b88a-43cf-821c-19466915ba55\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER264A.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 24 19:50:50 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2745.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2765.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2A03.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 24 19:50:51 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2AA0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2AE0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBC16.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 24 19:50:23 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC0CA.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC119.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\msvcp110.dll,GetGameData
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\msvcp110.dll",#1
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\msvcp110.dll",GetGameData
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\msvcp110.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\msvcp110.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 1244
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 1260
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5276 -s 1268
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://95.217.125.57
unknown
malicious
http://95.217.125.57/
95.217.125.57
malicious
http://95.217.125.57/2f571d994666c8cb.php
malicious
http://95.217.125.57/b
unknown
http://95.217.125.57/~
unknown
http://95.217.125.57R/
unknown
http://95.217.125.57/jXl
unknown
http://95.217.125.57/R
unknown
http://95.217.125.57/1
unknown
http://95.217.125.57/IXK
unknown
http://upx.sf.net
unknown
http://95.217.125.57h
unknown
http://95.217.125.57/.
unknown
http://95.217.125.57/2=
unknown
http://95.217.125.57/Y
unknown
There are 5 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
95.217.125.57
unknown
Germany
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
ProgramId
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
FileId
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
LowerCaseLongPath
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
LongPathHash
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
Name
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
OriginalFileName
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
Publisher
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
Version
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
BinFileVersion
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
BinaryType
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
ProductName
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
ProductVersion
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
LinkDate
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
BinProductVersion
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
AppxPackageFullName
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
AppxPackageRelativeId
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
Size
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
Language
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
IsOsComponent
\REGISTRY\A\{3721b53b-1291-730f-0807-7f557202b832}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3557000
heap
page read and write
malicious
740000
remote allocation
page execute and read and write
malicious
3000000
remote allocation
page execute and read and write
malicious
321A000
remote allocation
page execute and read and write
malicious
3517000
heap
page read and write
malicious
7DA000
remote allocation
page execute and read and write
malicious
3180000
remote allocation
page execute and read and write
malicious
309A000
remote allocation
page execute and read and write
malicious
3027000
heap
page read and write
malicious
1CE2F000
stack
page read and write
3062000
remote allocation
page execute and read and write
2D7F000
stack
page read and write
1D08D000
stack
page read and write
99C000
remote allocation
page readonly
98B000
heap
page read and write
7CF000
remote allocation
page execute and read and write
3420000
heap
page read and write
C3B000
stack
page read and write
1D5DF000
stack
page read and write
37DF000
stack
page read and write
1D2DF000
stack
page read and write
C4F000
stack
page read and write
1D760000
heap
page read and write
3416000
heap
page read and write
1C74E000
stack
page read and write
3550000
heap
page read and write
3465000
heap
page read and write
1D75E000
stack
page read and write
1CE9E000
stack
page read and write
4F0000
heap
page read and write
34F0000
heap
page read and write
2E40000
heap
page read and write
5B0000
heap
page read and write
3205000
remote allocation
page execute and read and write
A3E000
stack
page read and write
530000
heap
page read and write
7FE000
stack
page read and write
93E000
stack
page read and write
A4F000
stack
page read and write
1D171000
heap
page read and write
70B000
stack
page read and write
98A000
remote allocation
page execute and read and write
D0F000
stack
page read and write
389E000
stack
page read and write
315E000
stack
page read and write
C7C000
stack
page read and write
1D65E000
stack
page read and write
306F000
heap
page read and write
33FE000
stack
page read and write
2E65000
heap
page read and write
2DAF000
stack
page read and write
980000
heap
page read and write
4E0000
heap
page read and write
324A000
remote allocation
page execute and read and write
1CF9F000
stack
page read and write
BB0000
heap
page read and write
478E000
stack
page read and write
3020000
heap
page read and write
305A000
remote allocation
page execute and read and write
302B000
remote allocation
page execute and read and write
3430000
heap
page readonly
B60000
heap
page read and write
ACF000
stack
page read and write
37DF000
stack
page read and write
1D60E000
stack
page read and write
1CBCF000
stack
page read and write
2DE0000
heap
page read and write
98F000
heap
page read and write
3557000
heap
page read and write
1D901000
heap
page read and write
2E67000
heap
page read and write
1D04D000
stack
page read and write
3088000
remote allocation
page execute and read and write
5FE000
stack
page read and write
3280000
heap
page read and write
3460000
heap
page read and write
1D2F0000
heap
page read and write
308F000
remote allocation
page execute and read and write
15B000
stack
page read and write
7A2000
remote allocation
page execute and read and write
2FC0000
heap
page read and write
79A000
remote allocation
page execute and read and write
2E50000
heap
page read and write
2F70000
heap
page read and write
1DA00000
trusted library allocation
page read and write
38DE000
stack
page read and write
36D0000
heap
page read and write
800000
heap
page read and write
2C7C000
stack
page read and write
1CC0D000
stack
page read and write
2680000
heap
page read and write
2FC3000
heap
page read and write
1D1DE000
stack
page read and write
1D46F000
stack
page read and write
2FE0000
heap
page read and write
3440000
heap
page read and write
480E000
stack
page read and write
1CACE000
stack
page read and write
305C000
stack
page read and write
76B000
remote allocation
page execute and read and write
36D3000
heap
page read and write
321F000
stack
page read and write
369D000
stack
page read and write
3417000
heap
page read and write
3085000
remote allocation
page execute and read and write
1D170000
heap
page read and write
1D5AF000
stack
page read and write
5A0000
heap
page read and write
35AF000
heap
page read and write
1D4AD000
stack
page read and write
4910000
heap
page read and write
7C5000
remote allocation
page execute and read and write
1CD0C000
stack
page read and write
3467000
heap
page read and write
A8E000
stack
page read and write
31AB000
remote allocation
page execute and read and write
2E5A000
heap
page read and write
A6A000
heap
page read and write
47CF000
stack
page read and write
D4F000
stack
page read and write
99D000
heap
page read and write
359C000
heap
page read and write
19C000
stack
page read and write
1D46D000
stack
page read and write
1D36E000
stack
page read and write
1D4DE000
stack
page read and write
3053000
heap
page read and write
D90000
heap
page read and write
34AE000
stack
page read and write
CE0000
heap
page read and write
2E3E000
stack
page read and write
1D70F000
stack
page read and write
1D18D000
stack
page read and write
1D8AF000
stack
page read and write
53A000
heap
page read and write
33B0000
heap
page read and write
1D7AE000
stack
page read and write
3208000
remote allocation
page execute and read and write
B9F000
stack
page read and write
484F000
stack
page read and write
A60000
heap
page read and write
2DF0000
heap
page readonly
DC0000
heap
page read and write
31DA000
remote allocation
page execute and read and write
3410000
heap
page read and write
33CA000
remote allocation
page execute and read and write
325C000
remote allocation
page readonly
38F0000
heap
page read and write
3068000
heap
page read and write
320F000
remote allocation
page execute and read and write
3084000
heap
page read and write
301E000
remote allocation
page readonly
355D000
heap
page read and write
8FC000
stack
page read and write
1D26F000
stack
page read and write
1CFEE000
stack
page read and write
385E000
stack
page read and write
3155000
stack
page read and write
351F000
stack
page read and write
1D270000
trusted library allocation
page read and write
CCE000
stack
page read and write
319E000
remote allocation
page readonly
1D0EE000
stack
page read and write
2F9E000
stack
page read and write
74C000
stack
page read and write
3360000
heap
page readonly
1CE4E000
stack
page read and write
7C0000
heap
page read and write
2DA5000
stack
page read and write
7B0000
heap
page read and write
4760000
heap
page read and write
52C000
stack
page read and write
3596000
heap
page read and write
1CD4E000
stack
page read and write
A7C000
heap
page read and write
2E60000
heap
page read and write
75E000
remote allocation
page readonly
590000
heap
page read and write
356D000
heap
page read and write
3130000
heap
page read and write
31E2000
remote allocation
page execute and read and write
2CAC000
stack
page read and write
7C8000
remote allocation
page execute and read and write
381E000
stack
page read and write
2D75000
stack
page read and write
38F3000
heap
page read and write
400000
heap
page read and write
1D761000
heap
page read and write
33AE000
stack
page read and write
1D900000
heap
page read and write
33DC000
remote allocation
page readonly
3510000
heap
page read and write
1D36E000
stack
page read and write
1D860000
trusted library allocation
page read and write
There are 184 hidden memdumps, click here to show them.