IOC Report
unpacked (1).bin

loading gif

Files

File Path
Type
Category
Malicious
unpacked (1).dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_7bde5861e98b2ac3cc37e329f3101f62f0fff922_82810a17_1492a377\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9984.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Mar 17 02:54:08 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9C05.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9C74.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\unpacked (1).dll"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\unpacked (1).dll",#1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\unpacked (1).dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5144 -s 644

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProgramId
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
FileId
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LowerCaseLongPath
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LongPathHash
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Name
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Publisher
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Version
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinFileVersion
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinaryType
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductName
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductVersion
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LinkDate
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinProductVersion
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Size
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Language
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsPeFile
\REGISTRY\A\{860d3b95-22c5-1cf1-5e3f-b2b7548e796f}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
D6D000
stack
page read and write
2B352732000
heap
page read and write
2B351EA2000
heap
page read and write
2B351E86000
heap
page read and write
20E05B00000
heap
page read and write
FF64DFA000
stack
page read and write
2B461A6D000
heap
page read and write
2B461830000
heap
page read and write
2B351EA0000
heap
page read and write
25E0D5E0000
heap
page read and write
220BFE75000
heap
page read and write
2B351D10000
trusted library allocation
page read and write
349E000
stack
page read and write
FF6497B000
stack
page read and write
2B352772000
heap
page read and write
E8B000
heap
page read and write
22BC5037000
heap
page read and write
10001000
unkown
page execute read
E7729FC000
stack
page read and write
2B351F13000
heap
page read and write
34DF000
stack
page read and write
2B461A42000
heap
page read and write
10003000
unkown
page readonly
20E05A51000
heap
page read and write
27681C00000
heap
page read and write
2B461A45000
heap
page read and write
2B461930000
trusted library allocation
page read and write
2B35276F000
heap
page read and write
27681B70000
trusted library allocation
page read and write
2B352772000
heap
page read and write
2B351E41000
heap
page read and write
9F8757D000
stack
page read and write
290A0A00000
heap
page read and write
220BFE5A000
heap
page read and write
2B461A65000
heap
page read and write
220BFDB0000
heap
page read and write
27681D18000
heap
page read and write
2B461A63000
heap
page read and write
EFD767F000
stack
page read and write
2B351E84000
heap
page read and write
290A0B02000
heap
page read and write
FF6451B000
stack
page read and write
B1FE87F000
stack
page read and write
220BFE64000
heap
page read and write
10004000
unkown
page write copy
20E05A64000
heap
page read and write
2B461A31000
heap
page read and write
2B352737000
heap
page read and write
20E05A66000
heap
page read and write
B118EFB000
stack
page read and write
290A09C0000
heap
page read and write
27681BE0000
remote allocation
page read and write
2B352727000
heap
page read and write
9F8727D000
stack
page read and write
E85478E000
stack
page read and write
10006000
unkown
page readonly
10008000
unkown
page readonly
FF64B7B000
stack
page read and write
2B351E5D000
heap
page read and write
E854B7E000
stack
page read and write
290A0A64000
heap
page read and write
20E05A43000
heap
page read and write
2B351E23000
heap
page read and write
2B35275F000
heap
page read and write
2B461A61000
heap
page read and write
22BC505D000
heap
page read and write
2B35273B000
heap
page read and write
10008000
unkown
page readonly
22BC5034000
heap
page read and write
22BC5002000
heap
page read and write
276819F0000
heap
page read and write
25E0E113000
heap
page read and write
FF64CFF000
stack
page read and write
2B352702000
heap
page read and write
27681BA0000
trusted library allocation
page read and write
290A0960000
heap
page read and write
20E05860000
heap
page read and write
27681C6E000
heap
page read and write
290A1402000
trusted library allocation
page read and write
22BC5013000
heap
page read and write
9F8777F000
stack
page read and write
9F8787F000
stack
page read and write
290A0A51000
heap
page read and write
2B352740000
heap
page read and write
9F8707B000
stack
page read and write
E77327C000
stack
page read and write
25E0DE80000
trusted library allocation
page read and write
2B352730000
heap
page read and write
9F8717F000
stack
page read and write
EFD747F000
stack
page read and write
10000000
unkown
page readonly
2B352755000
heap
page read and write
25E0D664000
heap
page read and write
22BC5A02000
trusted library allocation
page read and write
2B461A6A000
heap
page read and write
220BFE29000
heap
page read and write
2B461A7E000
heap
page read and write
20E05A13000
heap
page read and write
2B461A3D000
heap
page read and write
2B352772000
heap
page read and write
220BFF02000
heap
page read and write
22BC4F80000
heap
page read and write
2B352758000
heap
page read and write
2B351F02000
heap
page read and write
79808FD000
stack
page read and write
2B352615000
heap
page read and write
2B461A64000
heap
page read and write
2B461A5A000
heap
page read and write
290A0A3C000
heap
page read and write
2B352730000
heap
page read and write
22BC5041000
heap
page read and write
22BC5890000
trusted library allocation
page read and write
2B351F00000
heap
page read and write
25E0D640000
heap
page read and write
27681BE0000
remote allocation
page read and write
C6C000
stack
page read and write
27681C48000
heap
page read and write
2B461A75000
heap
page read and write
20E05A5B000
heap
page read and write
20E05A02000
heap
page read and write
2B461A77000
heap
page read and write
2B461A5E000
heap
page read and write
EFD7A7C000
stack
page read and write
9F8767E000
stack
page read and write
220BFDE0000
trusted library allocation
page read and write
2B351E43000
heap
page read and write
25E0E13A000
heap
page read and write
2B4617D0000
heap
page read and write
FF64BFE000
stack
page read and write
27681C89000
heap
page read and write
2B352600000
heap
page read and write
2B351E7F000
heap
page read and write
290A0A13000
heap
page read and write
B1FE47B000
stack
page read and write
7980BFC000
stack
page read and write
220C0802000
trusted library allocation
page read and write
B1FE3FE000
stack
page read and write
2B461A58000
heap
page read and write
E772DFB000
stack
page read and write
22BC4F90000
heap
page read and write
2B351C10000
heap
page read and write
2B461A59000
heap
page read and write
2B461A29000
heap
page read and write
326D000
stack
page read and write
2B461A13000
heap
page read and write
E772CFF000
stack
page read and write
3500000
heap
page read and write
2B352700000
heap
page read and write
22BC5029000
heap
page read and write
B1FE1FC000
stack
page read and write
2B351E53000
heap
page read and write
2B35275A000
heap
page read and write
20E06202000
trusted library allocation
page read and write
27681C62000
heap
page read and write
2B352752000
heap
page read and write
20E05A78000
heap
page read and write
2B351BB0000
heap
page read and write
2B352602000
heap
page read and write
2B352755000
heap
page read and write
25E0E100000
heap
page read and write
E854D7E000
stack
page read and write
B1FE77D000
stack
page read and write
2B352732000
heap
page read and write
290A0B13000
heap
page read and write
B11907E000
stack
page read and write
B1FDFFC000
stack
page read and write
27681D00000
heap
page read and write
290A0B00000
heap
page read and write
2B461A6B000
heap
page read and write
20E059D0000
trusted library allocation
page read and write
220BFE13000
heap
page read and write
2B461A74000
heap
page read and write
20E058D0000
heap
page read and write
2B461A41000
heap
page read and write
798067E000
stack
page read and write
22BC5000000
heap
page read and write
2B351E36000
heap
page read and write
20E05A2A000
heap
page read and write
27681C48000
heap
page read and write
27681C47000
heap
page read and write
25E0D580000
heap
page read and write
B1FE2FE000
stack
page read and write
220BFD40000
heap
page read and write
220BFD50000
heap
page read and write
2B461A46000
heap
page read and write
DD0000
heap
page read and write
25E0D6BC000
heap
page read and write
79806FE000
stack
page read and write
2B35275A000
heap
page read and write
25E0D6CB000
heap
page read and write
27681A50000
heap
page read and write
2B461A62000
heap
page read and write
22BC5102000
heap
page read and write
E772F7C000
stack
page read and write
E77317E000
stack
page read and write
2B462202000
trusted library allocation
page read and write
2B351E00000
heap
page read and write
2B35276A000
heap
page read and write
FF64A7F000
stack
page read and write
290A0A28000
heap
page read and write
F80000
heap
page read and write
EFD777C000
stack
page read and write
2B351BA0000
heap
page read and write
3310000
heap
page read and write
220BFE41000
heap
page read and write
3360000
heap
page read and write
7980A7D000
stack
page read and write
25E0D702000
heap
page read and write
B118CFB000
stack
page read and write
22BC4FF0000
heap
page read and write
276835A0000
trusted library allocation
page read and write
2B461A5D000
heap
page read and write
2B461A79000
heap
page read and write
9F8747F000
stack
page read and write
20E05A00000
heap
page read and write
290A0A02000
heap
page read and write
25E0D600000
heap
page read and write
2B461A00000
heap
page read and write
290A0950000
heap
page read and write
2B461A57000
heap
page read and write
2B461A60000
heap
page read and write
2B352729000
heap
page read and write
B1FE67F000
stack
page read and write
20E05B02000
heap
page read and write
220BFE6F000
heap
page read and write
2B351EB5000
heap
page read and write
C00000
heap
page read and write
290A0A7A000
heap
page read and write
10004000
unkown
page write copy
2B461B02000
heap
page read and write
2B352766000
heap
page read and write
27681C57000
heap
page read and write
10006000
unkown
page readonly
2B4617C0000
heap
page read and write
FF64F7F000
stack
page read and write
25E0D66E000
heap
page read and write
2B351E99000
heap
page read and write
2B351E7C000
heap
page read and write
2B351EB0000
heap
page read and write
276819E0000
heap
page read and write
290A09F0000
trusted library allocation
page read and write
32AB000
stack
page read and write
27681D13000
heap
page read and write
9F86E7C000
stack
page read and write
25E0D6CD000
heap
page read and write
27681BE0000
remote allocation
page read and write
E854E7E000
stack
page read and write
2B351E29000
heap
page read and write
2B461A84000
heap
page read and write
EFD72FE000
stack
page read and write
25E0D570000
heap
page read and write
E773079000
stack
page read and write
B1FDF7F000
stack
page read and write
22BC58C0000
remote allocation
page read and write
2B351E59000
heap
page read and write
2B461A7A000
heap
page read and write
B1FE57C000
stack
page read and write
20E061A0000
trusted library allocation
page read and write
EFD757F000
stack
page read and write
220BFE02000
heap
page read and write
E80000
heap
page read and write
10003000
unkown
page read and write
20E05A50000
heap
page read and write
2B461A68000
heap
page read and write
B1187DC000
stack
page read and write
27681C13000
heap
page read and write
E772E7F000
stack
page read and write
2B352757000
heap
page read and write
220BFE77000
heap
page read and write
2B351E13000
heap
page read and write
336A000
heap
page read and write
25E0E002000
heap
page read and write
22BC58C0000
remote allocation
page read and write
290A0A78000
heap
page read and write
20E05870000
heap
page read and write
9F8797F000
stack
page read and write
E77337F000
stack
page read and write
2B352752000
heap
page read and write
2B461A44000
heap
page read and write
2B351E70000
heap
page read and write
27683602000
trusted library allocation
page read and write
2B352756000
heap
page read and write
10000000
unkown
page readonly
2B352762000
heap
page read and write
20E05B13000
heap
page read and write
25E0D613000
heap
page read and write
25E0D68A000
heap
page read and write
E85468B000
stack
page read and write
2B461A3A000
heap
page read and write
3200000
heap
page read and write
E85470E000
stack
page read and write
25E0D629000
heap
page read and write
27681C58000
heap
page read and write
20E05A3C000
heap
page read and write
10001000
unkown
page execute read
22BC58C0000
remote allocation
page read and write
27681D02000
heap
page read and write
2B461A7B000
heap
page read and write
79801EB000
stack
page read and write
25E0D713000
heap
page read and write
9F87A7F000
stack
page read and write
25E0D6E1000
heap
page read and write
798097F000
stack
page read and write
2B461A4E000
heap
page read and write
2B352755000
heap
page read and write
2B461A40000
heap
page read and write
220BFE00000
heap
page read and write
25E0D666000
heap
page read and write
220BFF13000
heap
page read and write
2B352772000
heap
page read and write
EFD6EBB000
stack
page read and write
2B352713000
heap
page read and write
2B351E96000
heap
page read and write
2B35275B000
heap
page read and write
27681C58000
heap
page read and write
27681B50000
trusted library allocation
page read and write
E854C7E000
stack
page read and write
EFD787C000
stack
page read and write
27681C40000
heap
page read and write
2B461A47000
heap
page read and write
2B352752000
heap
page read and write
220BFE65000
heap
page read and write
27681C2A000
heap
page read and write
B1FDBBB000
stack
page read and write
B118DFE000
stack
page read and write
3340000
heap
page read and write
2B35272C000
heap
page read and write
There are 317 hidden memdumps, click here to show them.