IOC Report
db_Usr.sql

loading gif

Files

File Path
Type
Category
Malicious
db_Usr.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_db__1b87ef64a16ad462376f2db4ab981261bef3b791_c73d58ab_b2f3ca5e-b9ba-4fcb-873e-24a2179dcc68\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_db__2f24483d5cae89ea74bb89d749f146a03c193cde_c73d58ab_2446f0af-ab7b-41de-b85f-917e3e32776e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_db__2f24483d5cae89ea74bb89d749f146a03c193cde_c73d58ab_9f936d4a-ed4d-4bd6-86dd-a6521ac0b55c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_db__2f24483d5cae89ea74bb89d749f146a03c193cde_c73d58ab_f7d2f3ff-f520-43dc-8b1d-015fa9db15e6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER119B.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Apr 25 20:04:01 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER11D9.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Apr 25 20:04:01 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1238.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1267.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER12C6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1304.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B0E.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Apr 25 20:04:07 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2BAC.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2C49.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3ACE.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Apr 25 20:04:11 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3C94.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3D12.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\db_Usr.dll,GetAnalyzerInterfaceByType
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\db_Usr.dll,GetAnalyzerTypes
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\db_Usr.dll,GetConfiguratorInterfaceByType
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",GetAnalyzerInterfaceByType
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",GetAnalyzerTypes
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",GetConfiguratorInterfaceByType
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\db_Usr.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",#1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2956 -s 332
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4068 -s 316
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6180 -s 328
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3496 -s 328
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

IPs

IP
Domain
Country
Malicious
185.219.221.136
unknown
Sweden
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
OriginalFileName
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageFullName
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageRelativeId
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
\REGISTRY\A\{8286b274-b65a-51ac-8b1e-e808d3197a98}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Usn
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
59E14FF000
stack
page read and write
FFC90FF000
stack
page read and write
1FB369F0000
heap
page read and write
180053000
unkown
page read and write
18005B000
unkown
page readonly
180001000
unkown
page execute read
20644E58000
heap
page read and write
180000000
unkown
page readonly
18005B000
unkown
page readonly
972C4FF000
stack
page read and write
180061000
unkown
page readonly
180053000
unkown
page read and write
180054000
unkown
page write copy
DCB2EFC000
stack
page read and write
195B4460000
direct allocation
page execute and read and write
180058000
unkown
page read and write
2D900538000
heap
page read and write
180000000
unkown
page readonly
20C5A6D0000
heap
page read and write
18005B000
unkown
page readonly
180001000
unkown
page execute read
180001000
unkown
page execute read
18127B68000
heap
page read and write
180058000
unkown
page read and write
18127D55000
heap
page read and write
180061000
unkown
page readonly
1FB36818000
heap
page read and write
18127D50000
heap
page read and write
1FB36AA0000
heap
page read and write
18003B000
unkown
page readonly
8EAB5BF000
stack
page read and write
195B41D0000
heap
page read and write
2425D5B0000
heap
page read and write
180058000
unkown
page read and write
180053000
unkown
page read and write
321047F000
stack
page read and write
180001000
unkown
page execute read
59E157F000
stack
page read and write
18003B000
unkown
page readonly
2A2C0E20000
heap
page read and write
180000000
unkown
page readonly
DCB2FFF000
stack
page read and write
FFC91FF000
stack
page read and write
195B44D5000
heap
page read and write
180061000
unkown
page readonly
180058000
unkown
page read and write
2425D3C8000
heap
page read and write
18003B000
unkown
page readonly
2D900350000
heap
page read and write
1FB36A10000
heap
page read and write
180000000
unkown
page readonly
180000000
unkown
page readonly
18127B60000
heap
page read and write
2A2C1030000
heap
page read and write
20C5C1A0000
heap
page read and write
180001000
unkown
page execute read
180061000
unkown
page readonly
18005B000
unkown
page readonly
1FB382F0000
heap
page read and write
20644DC0000
heap
page read and write
180000000
unkown
page readonly
180053000
unkown
page read and write
20644CB0000
heap
page read and write
180061000
unkown
page readonly
32101CC000
stack
page read and write
1FB36AA5000
heap
page read and write
20644D90000
heap
page read and write
FFC8D7C000
stack
page read and write
18005B000
unkown
page readonly
2A2C1125000
heap
page read and write
180053000
unkown
page read and write
20646710000
remote allocation
page read and write
18127C80000
heap
page read and write
DCB2F7E000
stack
page read and write
59E147C000
stack
page read and write
195B4320000
heap
page read and write
18003B000
unkown
page readonly
180054000
unkown
page write copy
8EAB53C000
stack
page read and write
1FB36810000
heap
page read and write
180001000
unkown
page execute read
2A2C2A00000
heap
page read and write
2425D745000
heap
page read and write
18003B000
unkown
page readonly
20644DC5000
heap
page read and write
180054000
unkown
page write copy
180061000
unkown
page readonly
20C5A6F0000
heap
page read and write
18127A80000
heap
page read and write
180058000
unkown
page read and write
180053000
unkown
page read and write
195B432F000
heap
page read and write
2D900520000
heap
page read and write
180054000
unkown
page write copy
20C5A5F0000
heap
page read and write
180061000
unkown
page readonly
2A2C0F30000
heap
page read and write
20C5A8E0000
heap
page read and write
2A2C0F38000
heap
page read and write
181296B0000
heap
page read and write
972C47F000
stack
page read and write
180001000
unkown
page execute read
2425D740000
heap
page read and write
2D900430000
heap
page read and write
180058000
unkown
page read and write
1FB36910000
heap
page read and write
20644E50000
heap
page read and write
FF6B58C000
stack
page read and write
2425D3C0000
heap
page read and write
18003B000
unkown
page readonly
18005B000
unkown
page readonly
2A2C1120000
heap
page read and write
8EAB87F000
stack
page read and write
180054000
unkown
page write copy
2425D6A0000
heap
page read and write
20C5A6F8000
heap
page read and write
195B5E20000
heap
page read and write
180053000
unkown
page read and write
195B4328000
heap
page read and write
20644DD0000
heap
page read and write
2425D590000
heap
page read and write
180054000
unkown
page write copy
195B42B0000
heap
page read and write
195B44D0000
heap
page read and write
20646780000
heap
page read and write
18003B000
unkown
page readonly
2425D3B0000
heap
page read and write
18127C60000
heap
page read and write
20C5A8E5000
heap
page read and write
180000000
unkown
page readonly
195B42D0000
heap
page read and write
20C5A870000
direct allocation
page execute and read and write
2A2C0F3F000
heap
page read and write
18005B000
unkown
page readonly
2D9007F0000
heap
page read and write
972C1FC000
stack
page read and write
32104FF000
stack
page read and write
2D900470000
heap
page read and write
180058000
unkown
page read and write
2D90052D000
heap
page read and write
20C5A7F0000
heap
page read and write
7A7467C000
stack
page read and write
2A2C0F00000
heap
page read and write
180054000
unkown
page write copy
There are 134 hidden memdumps, click here to show them.