IOCReport

loading gif

Files

File Path
Type
Category
Malicious
A8xYhQFvXo.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_5a155b1e9b8901355626d9881b9ed599cf1223_82810a17_1b0352d0\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_9155b230567b23dc90309f27732428df1d2d4b15_82810a17_1a0b4812\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_9155b230567b23dc90309f27732428df1d2d4b15_82810a17_1b8b63b8\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3DB2.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jan 30 22:23:04 2021, 0x1205a4 type
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4043.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\Temp\WER413E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\Temp\WER493B.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jan 30 22:23:07 2021, 0x1205a4 type
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4C88.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4DF0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5CB4.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jan 30 22:23:12 2021, 0x1205a4 type
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5EA9.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
clean
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5F65.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
clean
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe 'C:\Users\user\Desktop\A8xYhQFvXo.dll'
clean
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\A8xYhQFvXo.dll,Hello001
clean
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6652 -s 712
clean
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\A8xYhQFvXo.dll,Hello002
clean
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6896 -s 712
clean
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\A8xYhQFvXo.dll,Hello003
clean
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7004 -s 712
clean

URLs

Name
IP
Malicious
https://01%s08%s15%s22%sWebGL%d%02d%s.club/http://01%s08%s15%s22%sFrankLin%d%02d%s.xyz/post_info.
unknown
clean
https://upload.twitter.com/i/media/upload.jsoncommand=FINALIZE&media_id=
unknown
clean
https://twitter.com/compose/tweetsec-fetch-dest:
unknown
clean
https://www.instagram.com/
unknown
clean
https://www.messenger.com/
unknown
clean
https://upload.twitter.com/i/media/upload.json%dcommand=INIT&total_bytes=&media_type=image%2Fjpeg&me
unknown
clean
https://upload.twitter.com/i/media/upload.json?command=APPEND&media_id=%s&segment_index=0accept:
unknown
clean
https://api.twitter.com/1.1/statuses/update.jsoninclude_profile_interstitial_type=1&include_blocking
unknown
clean
https://www.messenger.com/origin:
unknown
clean
https://twitter.com/
unknown
clean
https://twitter.com/ookie:
unknown
clean
https://api.twitter.com/1.1/statuses/update.json
unknown
clean
https://curl.haxx.se/docs/http-cookies.html
unknown
clean
https://twitter.comsec-fetch-dest:
unknown
clean
https://upload.twitter.com/i/media/upload.json
unknown
clean
https://twitter.com/compose/tweetsec-fetch-mode:
unknown
clean
https://www.instagram.comsec-fetch-mode:
unknown
clean
https://www.instagram.com/accounts/login/ajax/facebook/
unknown
clean
https://www.instagram.com/sec-fetch-site:
unknown
clean
https://twitter.comReferer:
unknown
clean
https://www.messenger.com/accept:
unknown
clean
http://www.interestvideo.com/video1.php
unknown
clean
https://www.messenger.com
unknown
clean
https://www.instagram.com/accept:
unknown
clean
https://www.messenger.com/login/nonce/
unknown
clean
https://www.messenger.com/login/nonce/ookie:
unknown
clean
https://upload.twitter.com/i/media/upload.json?command=APPEND&media_id=%s&segment_index=0
unknown
clean
https://www.instagram.com/graphql/query/?query_hash=149bef52a3b2af88c0fec37913fe1cbc&variables=%7B%2
unknown
clean
There are 18 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
C:\Windows\SysWOW64\WerFault.exe
AmiHivePermissionsCorrect
clean
C:\Windows\SysWOW64\WerFault.exe
AmiHiveOwnerCorrect
clean
C:\Windows\SysWOW64\WerFault.exe
ProgramId
clean
C:\Windows\SysWOW64\WerFault.exe
FileId
clean
C:\Windows\SysWOW64\WerFault.exe
LowerCaseLongPath
clean
C:\Windows\SysWOW64\WerFault.exe
LongPathHash
clean
C:\Windows\SysWOW64\WerFault.exe
Name
clean
C:\Windows\SysWOW64\WerFault.exe
Publisher
clean
C:\Windows\SysWOW64\WerFault.exe
Version
clean
C:\Windows\SysWOW64\WerFault.exe
BinFileVersion
clean
C:\Windows\SysWOW64\WerFault.exe
BinaryType
clean
C:\Windows\SysWOW64\WerFault.exe
ProductName
clean
C:\Windows\SysWOW64\WerFault.exe
ProductVersion
clean
C:\Windows\SysWOW64\WerFault.exe
LinkDate
clean
C:\Windows\SysWOW64\WerFault.exe
BinProductVersion
clean
C:\Windows\SysWOW64\WerFault.exe
Size
clean
C:\Windows\SysWOW64\WerFault.exe
Language
clean
C:\Windows\SysWOW64\WerFault.exe
IsPeFile
clean
C:\Windows\SysWOW64\WerFault.exe
IsOsComponent
clean
C:\Windows\SysWOW64\WerFault.exe
ExceptionRecord
clean
C:\Windows\SysWOW64\WerFault.exe
DeviceTicket
clean
C:\Windows\SysWOW64\WerFault.exe
DeviceId
clean
C:\Windows\SysWOW64\WerFault.exe
ApplicationFlags
clean
C:\Windows\SysWOW64\WerFault.exe
0018C0020EB01841
clean
C:\Windows\SysWOW64\WerFault.exe
ClockTimeSeconds
clean
C:\Windows\SysWOW64\WerFault.exe
TickCount
clean
C:\Windows\SysWOW64\WerFault.exe
ExceptionRecord
clean
C:\Windows\SysWOW64\WerFault.exe
ExceptionRecord
clean
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
10171000
unkown image
page readonly
clean
31AB000
unkown
page read and write
clean
F1E000
stack
page read and write
clean
2C5E000
unkown
page readonly
clean
10409000
unkown image
page readonly
clean
2CF1000
unkown
page readonly
clean
2CF5000
unkown
page readonly
clean
2CB2000
unkown
page readonly
clean
358A000
heap default
page read and write
clean
2AFB000
unkown
page readonly
clean
2C68000
unkown
page readonly
clean
D80000
unkown
page read and write
clean
2C5E000
unkown
page readonly
clean
2D1E000
unkown
page readonly
clean
315A000
heap default
page read and write
clean
33F0000
unkown
page readonly
clean
E92000
unkown
page read and write
clean
2D45000
unkown
page readonly
clean
10409000
unkown image
page readonly
clean
2CA6000
unkown
page readonly
clean
2CB7000
unkown
page readonly
clean
4640000
heap private
page read and write
clean
2C4D000
unkown
page readonly
clean
C7B000
stack
page read and write
clean
3470000
unkown
page readonly
clean
A4E000
stack
page read and write
clean
344E000
unkown
page read and write
clean
2D54000
unkown
page readonly
clean
2C8A000
unkown
page readonly
clean
2F9E000
stack
page read and write
clean
2D20000
unkown
page readonly
clean
2C9B000
unkown
page readonly
clean
ED0000
heap private
page read and write
clean
10401000
unkown image
page read and write
clean
5230000
heap private
page read and write
clean
4A90000
heap private
page read and write
clean
A00000
heap default
page read and write
clean
2CF5000
unkown
page readonly
clean
10289000
unkown image
page read and write
clean
EB0000
unkown
page read and write
clean
136F000
stack
page read and write
clean
4E5E000
unkown
page read and write
clean
10289000
unkown image
page read and write
clean
2B95000
unkown
page readonly
clean
2CC0000
unkown
page readonly
clean
AF0000
heap private
page read and write
clean
2C82000
unkown
page readonly
clean
48F0000
heap private
page read and write
clean
A2E000
unkown
page read and write
clean
DB0000
unkown
page readonly
clean
1390000
heap default
page read and write
clean
2CAF000
unkown
page readonly
clean
2D54000
unkown
page readonly
clean
E60000
unkown
page readonly
clean
990000
unkown
page readonly
clean
2CC2000
unkown
page readonly
clean
31A7000
unkown
page read and write
clean
2CCF000
unkown
page readonly
clean
BBA000
heap default
page read and write
clean
3250000
unkown
page readonly
clean
2CE2000
unkown
page readonly
clean
10FB000
stack
page read and write
clean
122E000
unkown
page read and write
clean
2D55000
unkown
page readonly
clean
1100000
unkown
page readonly
clean
489E000
stack
page read and write
clean
1028B000
unkown image
page write copy
clean
2CEC000
unkown
page readonly
clean
2D06000
unkown
page readonly
clean
2D22000
unkown
page readonly
clean
2C91000
unkown
page readonly
clean
3570000
unkown
page readonly
clean
2DA6000
unkown
page readonly
clean
2CBE000
unkown
page readonly
clean
2C96000
unkown
page readonly
clean
329B000
stack
page read and write
clean
2D40000
unkown
page readonly
clean
4510000
unkown
page readonly
clean
2D46000
unkown
page readonly
clean
6F6000
unkown
page read and write
clean
2C96000
unkown
page readonly
clean
E9F000
unkown
page read and write
clean
2CBC000
unkown
page readonly
clean
2C6F000
unkown
page readonly
clean
2C8D000
unkown
page readonly
clean
3400000
unkown
page readonly
clean
3300000
unkown
page readonly
clean
2DB4000
unkown
page readonly
clean
313E000
unkown
page read and write
clean
1590000
unkown
page readonly
clean
2CBE000
unkown
page readonly
clean
2BD8000
unkown
page readonly
clean
2D60000
unkown
page readonly
clean
2CC0000
unkown
page readonly
clean
101CE000
unkown image
page readonly
clean
5050000
heap private
page read and write
clean
2B85000
unkown
page readonly
clean
34CF000
stack
page read and write
clean
3480000
heap default
page read and write
clean
2CB2000
unkown
page readonly
clean
2D4B000
unkown
page readonly
clean
970000
unkown
page read and write
clean
DA0000
unkown
page readonly
clean
2D17000
unkown
page readonly
clean
D70000
unkown
page read and write
clean
2CA6000
unkown
page readonly
clean
3550000
unkown
page read and write
clean
2B78000
unkown
page readonly
clean
2CBE000
unkown
page readonly
clean
2CC8000
unkown
page readonly
clean
2C8A000
unkown
page readonly
clean
2CE5000
unkown
page readonly
clean
2CF6000
unkown
page readonly
clean
2CE0000
unkown
page readonly
clean
2BE5000
unkown
page readonly
clean
ADE000
stack
page read and write
clean
2CEA000
unkown
page readonly
clean
2CAF000
unkown
page readonly
clean
2CFB000
unkown
page readonly
clean
10000000
unkown image
page readonly
clean
EAE000
unkown
page read and write
clean
2B78000
unkown
page readonly
clean
CB0000
unkown
page readonly
clean
10289000
unkown image
page read and write
clean
1028B000
unkown image
page write copy
clean
2CD3000
unkown
page readonly
clean
2CA4000
unkown
page readonly
clean
350E000
unkown
page read and write
clean
10000000
unkown image
page readonly
clean
2DC0000
unkown
page readonly
clean
10171000
unkown image
page readonly
clean
2D46000
unkown
page readonly
clean
10000000
unkown image
page readonly
clean
2D5A000
unkown
page readonly
clean
CB0000
unkown
page readonly
clean
2D12000
unkown
page readonly
clean
2D40000
unkown
page readonly
clean
4E9F000
stack
page read and write
clean
D80000
unkown
page readonly
clean
2CE0000
unkown
page readonly
clean
10001000
unkown image
page execute read
clean
2D68000
unkown
page readonly
clean
2D00000
unkown
page readonly
clean
2CBC000
unkown
page readonly
clean
2CE5000
unkown
page readonly
clean
2DA0000
unkown
page readonly
clean
2CD3000
unkown
page readonly
clean
DCE000
unkown
page read and write
clean
2D6E000
unkown
page read and write
clean
E96000
unkown
page read and write
clean
10001000
unkown image
page execute read
clean
2DC8000
unkown
page readonly
clean
2DAB000
unkown
page readonly
clean
2CA4000
unkown
page readonly
clean
4670000
heap private
page read and write
clean
2CA0000
unkown
page readonly
clean
10000000
unkown image
page readonly
clean
2CA0000
unkown
page readonly
clean
3150000
heap default
page read and write
clean
2CFA000
unkown
page readonly
clean
BAF000
stack
page read and write
clean
83B000
stack
page read and write
clean
325C000
unkown
page read and write
clean
158E000
stack
page read and write
clean
2C91000
unkown
page readonly
clean
2C6F000
unkown
page readonly
clean
3580000
heap default
page read and write
clean
2D40000
unkown
page readonly
clean
2C61000
unkown
page readonly
clean
2CED000
unkown
page readonly
clean
2CC2000
unkown
page readonly
clean
A50000
unkown
page readonly
clean
E10000
heap default
page read and write
clean
4900000
unkown
page readonly
clean
2DC0000
unkown
page read and write
clean
2AFB000
unkown
page readonly
clean
1028B000
unkown image
page write copy
clean
9F0000
unkown
page readonly
clean
AE0000
unkown
page read and write
clean
10000000
unkown image
page readonly
clean
2C8D000
unkown
page readonly
clean
354E000
stack
page read and write
clean
11E0000
heap default
page read and write
clean
A9E000
unkown
page read and write
clean
2D68000
unkown
page readonly
clean
2D68000
unkown
page readonly
clean
E5E000
stack
page read and write
clean
B6E000
unkown
page read and write
clean
10401000
unkown image
page read and write
clean
2DC8000
unkown
page readonly
clean
10001000
unkown image
page execute read
clean
DD0000
unkown
page readonly
clean
9EE000
unkown
page read and write
clean
3450000
heap private
page read and write
clean
101CE000
unkown image
page readonly
clean
2CC1000
unkown
page readonly
clean
2B5B000
unkown
page readonly
clean
2E90000
heap private
page read and write
clean
2C68000
unkown
page readonly
clean
6F2000
unkown
page read and write
clean
2CB7000
unkown
page readonly
clean
C3C000
unkown
page read and write
clean
3460000
unkown
page readonly
clean
10000000
unkown image
page readonly
clean
2C61000
unkown
page readonly
clean
10401000
unkown image
page read and write
clean
4EA0000
unkown
page readonly
clean
B10000
unkown
page readonly
clean
2D0F000
unkown
page readonly
clean
2D33000
unkown
page readonly
clean
2B85000
unkown
page readonly
clean
2D4C000
unkown
page readonly
clean
2CEC000
unkown
page readonly
clean
2C9B000
unkown
page readonly
clean
DFD000
unkown
page read and write
clean
10409000
unkown image
page readonly
clean
D0D000
unkown
page read and write
clean
2BF5000
unkown
page readonly
clean
3680000
unkown
page readonly
clean
9A0000
unkown
page readonly
clean
A2A000
unkown
page read and write
clean
E00000
unkown
page readonly
clean
2D68000
unkown
page readonly
clean
2CFA000
unkown
page readonly
clean
2C4D000
unkown
page readonly
clean
2D1C000
unkown
page readonly
clean
10000000
unkown image
page readonly
clean
2D04000
unkown
page readonly
clean
2C82000
unkown
page readonly
clean
139B000
heap default
page read and write
clean
8A0000
unkown
page readonly
clean
101CE000
unkown image
page readonly
clean
10000000
unkown image
page readonly
clean
10171000
unkown image
page readonly
clean
5FC000
unkown
page read and write
clean
2D4B000
unkown
page readonly
clean
2D60000
unkown
page readonly
clean
F20000
unkown
page readonly
clean
2CAD000
unkown
page readonly
clean
2B95000
unkown
page readonly
clean
33D0000
unkown
page read and write
clean
BB0000
heap default
page read and write
clean
There are 232 hidden memdumps, click here to show them.