IOC Report
QualityUpdateAssistant.dll

loading gif

Files

File Path
Type
Category
Malicious
QualityUpdateAssistant.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
initial sample
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll64.exe_f1e2a93da88b32cda8c0398fc0f16d5f7ea571e1_606702e6_15d5ab69-9905-49c3-8179-a8d144bd5245\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_Qua_69d6fdc2216b7557c151bb744884d1a78ca7bd0_cb9a354e_aa478cdb-a592-4df8-bd48-f5f1f889ca29\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_Qua_69d6fdc2216b7557c151bb744884d1a78ca7bd0_cb9a354e_cbaa4629-6e7a-4c66-8044-c5a78e9f22e9\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_Qua_69d6fdc2216b7557c151bb744884d1a78ca7bd0_cb9a354e_ef734fa1-f744-4e89-a5e4-a6e6eee6643c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4F0F.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 26 08:22:41 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4F3E.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 26 08:22:41 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER500A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER501A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5069.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER50D7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5A1B.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 26 08:22:44 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5A5A.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 26 08:22:44 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5B93.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5BB2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5BC3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5BE2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\Logs\LcuAssistant.001.etl
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\system32\Logs\LcuAssistant.002.etl (copy)
data
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll",#1
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\QualityUpdateAssistant.dll,Execute
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll",#1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7160 -s 516
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3876 -s 516
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll",Execute
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6548 -s 508
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6456 -s 488

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
OriginalFileName
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageFullName
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageRelativeId
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Usn
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\loaddll64.exe|f3d72086358f9008
ProgramId
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\loaddll64.exe|f3d72086358f9008
FileId
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\loaddll64.exe|f3d72086358f9008
LowerCaseLongPath
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\loaddll64.exe|f3d72086358f9008
LongPathHash
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\loaddll64.exe|f3d72086358f9008
Name
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\loaddll64.exe|f3d72086358f9008
OriginalFileName
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\loaddll64.exe|f3d72086358f9008
Publisher
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\loaddll64.exe|f3d72086358f9008
Version
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\loaddll64.exe|f3d72086358f9008
BinFileVersion
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\loaddll64.exe|f3d72086358f9008
BinaryType
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\loaddll64.exe|f3d72086358f9008
ProductName
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\loaddll64.exe|f3d72086358f9008
ProductVersion
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\loaddll64.exe|f3d72086358f9008
LinkDate
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\loaddll64.exe|f3d72086358f9008
BinProductVersion
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\loaddll64.exe|f3d72086358f9008
AppxPackageFullName
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\loaddll64.exe|f3d72086358f9008
AppxPackageRelativeId
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\loaddll64.exe|f3d72086358f9008
Size
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\loaddll64.exe|f3d72086358f9008
Language
\REGISTRY\A\{530b3e17-87ba-243c-e99c-ec6617a2fb73}\Root\InventoryApplicationFile\loaddll64.exe|f3d72086358f9008
Usn
There are 29 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1D155620000
heap
page read and write
1D153B29000
heap
page read and write
7FF8B9091000
unkown
page execute read
1D153CD5000
heap
page read and write
1D153B2D000
heap
page read and write
226FD4EB000
heap
page read and write
7FF8B90DF000
unkown
page readonly
1D153B20000
heap
page read and write
1D256F50000
heap
page read and write
7FF8B9103000
unkown
page read and write
1D256FF0000
heap
page read and write
7FF8B9090000
unkown
page readonly
7781FAC000
stack
page read and write
226FD4A8000
heap
page read and write
9BE407F000
stack
page read and write
7FF8B9090000
unkown
page readonly
21CBBB65000
heap
page read and write
21CBB920000
heap
page read and write
226FD820000
heap
page read and write
1D153C40000
heap
page read and write
1D258A20000
heap
page read and write
21CBD4B0000
heap
page read and write
21CBBB60000
heap
page read and write
7FF8B9091000
unkown
page execute read
7FF8B9091000
unkown
page execute read
1D256F95000
heap
page read and write
21CBB928000
heap
page read and write
854D7FE000
stack
page read and write
778227E000
stack
page read and write
226FD420000
heap
page read and write
B86C5AE000
stack
page read and write
7FF8B90DF000
unkown
page readonly
1D256F60000
heap
page read and write
21CBB8C0000
heap
page read and write
1D153A30000
heap
page read and write
1D153B65000
heap
page read and write
854D6FE000
stack
page read and write
B86C52C000
stack
page read and write
21CBB92E000
heap
page read and write
1D153C20000
heap
page read and write
1D153B70000
heap
page read and write
21CBB8E0000
heap
page read and write
9BE40FE000
stack
page read and write
7FF8B9103000
unkown
page read and write
1D25703B000
heap
page read and write
226FD3F0000
heap
page read and write
854D38B000
stack
page read and write
1D153CD0000
heap
page read and write
21CBB8B0000
heap
page read and write
7FF8B9103000
unkown
page read and write
B86C87E000
stack
page read and write
9BE3DBC000
stack
page read and write
7FF8B9106000
unkown
page readonly
226FD4A0000
heap
page read and write
7FF8B9090000
unkown
page readonly
1D256F90000
heap
page read and write
226FD845000
heap
page read and write
1D153C40000
heap
page read and write
226FD840000
heap
page read and write
1D256FF8000
heap
page read and write
1D153B60000
heap
page read and write
7FF8B9106000
unkown
page readonly
77822FE000
stack
page read and write
1D256FA0000
heap
page read and write
226FD400000
heap
page read and write
7FF8B90DF000
unkown
page readonly
7FF8B9106000
unkown
page readonly
There are 57 hidden memdumps, click here to show them.