IOC Report
6gmoJJZr1e.exe

loading gif

Files

File Path
Type
Category
Malicious
6gmoJJZr1e.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_6gm_9b1d9c974cdc3e984dfdab69b0a88852c0a1104e_548d04a3_3f19492b-0eed-400a-afd1-e598d38770c0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_6gm_9b1d9c974cdc3e984dfdab69b0a88852c0a1104e_548d04a3_563ae1a6-ee2b-4b5b-920d-2c39c7262e81\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_6gm_9b1d9c974cdc3e984dfdab69b0a88852c0a1104e_548d04a3_8abe9583-1d52-4e8c-8b02-0ee72f6ed599\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER72E6.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Nov 25 20:01:11 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7382.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Nov 25 20:01:11 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER75B6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7614.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7634.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER76E0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7883.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Nov 25 20:01:12 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER78E2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7912.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\6gmoJJZr1e.dll,ReflectiveLoader
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\6gmoJJZr1e.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\6gmoJJZr1e.dll",ReflectiveLoader
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\6gmoJJZr1e.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6gmoJJZr1e.dll",#1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7172 -s 332
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7180 -s 352
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7596 -s 344

URLs

Name
IP
Malicious
3.78.244.11
malicious
http://upx.sf.net
unknown
http://127.0.0.1:%u/
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
OriginalFileName
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageFullName
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageRelativeId
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
\REGISTRY\A\{cb0ef725-d155-7e32-49e4-809fb9367959}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Usn
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFB0C682000
unkown
page readonly
malicious
1C688500000
direct allocation
page execute and read and write
malicious
218AB7A0000
direct allocation
page execute and read and write
malicious
1AFB2A50000
direct allocation
page execute and read and write
malicious
7FFB0C682000
unkown
page readonly
malicious
7FFB0C682000
unkown
page readonly
malicious
7FFB0C69E000
unkown
page read and write
1AFB2AA4000
direct allocation
page execute and read and write
1AFB0EC0000
heap
page read and write
1C688670000
heap
page read and write
218AB790000
heap
page read and write
7FFB0C69E000
unkown
page read and write
1C688554000
direct allocation
page execute and read and write
7FFB0C692000
unkown
page write copy
1C6869E7000
heap
page read and write
403667E000
stack
page read and write
218A9C50000
heap
page read and write
403638E000
stack
page read and write
237D50B0000
heap
page read and write
218A9E50000
heap
page read and write
1C686BB0000
heap
page read and write
7FFB0C6A4000
unkown
page readonly
7FFB0C6A4000
unkown
page readonly
218A9C60000
heap
page read and write
237D50B0000
heap
page read and write
674EBFE000
stack
page read and write
1AFB1190000
heap
page read and write
7FFB0C650000
unkown
page readonly
1C6869EE000
heap
page read and write
7FFB0C698000
unkown
page read and write
218A9C68000
heap
page read and write
7FFB0C651000
unkown
page execute read
1C686D50000
heap
page read and write
CB1F4F000
stack
page read and write
218A9EC5000
heap
page read and write
218AB7F4000
direct allocation
page execute and read and write
403630C000
stack
page read and write
2ACBCFF000
stack
page read and write
2ACB9FC000
stack
page read and write
1AFB10D0000
heap
page read and write
1C6869E0000
heap
page read and write
1AFB0EE0000
heap
page read and write
1AFB2A40000
heap
page read and write
7FFB0C692000
unkown
page write copy
1C686BD0000
heap
page read and write
1C6869C0000
heap
page read and write
7FFB0C6A3000
unkown
page read and write
237D4ED8000
heap
page read and write
7FFB0C698000
unkown
page read and write
7FFB0C650000
unkown
page readonly
CB1FCE000
stack
page read and write
1AFB0EE8000
heap
page read and write
237D5120000
heap
page read and write
674EAFE000
stack
page read and write
237D4EDC000
heap
page read and write
674E75C000
stack
page read and write
237D5120000
heap
page read and write
7FFB0C69E000
unkown
page read and write
7FFB0C6A3000
unkown
page read and write
237D4EC0000
heap
page read and write
1AFB10B0000
heap
page read and write
CB1ECC000
stack
page read and write
237D4ECD000
heap
page read and write
1C686D55000
heap
page read and write
7FFB0C692000
unkown
page write copy
2ACBC7F000
stack
page read and write
218A9E30000
heap
page read and write
218A9EC0000
heap
page read and write
7FFB0C650000
unkown
page readonly
7FFB0C651000
unkown
page execute read
237D5090000
heap
page read and write
237D4EA0000
heap
page read and write
237D4EC9000
heap
page read and write
7FFB0C698000
unkown
page read and write
7FFB0C6A4000
unkown
page readonly
7FFB0C651000
unkown
page execute read
1AFB1195000
heap
page read and write
7FFB0C6A3000
unkown
page read and write
There are 68 hidden memdumps, click here to show them.