IOC Report
0eVxwphG1t.exe

loading gif

Files

File Path
Type
Category
Malicious
0eVxwphG1t.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_0eVxwphG1t.exe_95a65930a35ae566542ba72920c749d8fab6edd_085328c0_0326773b-bcb6-43e9-8356-2e517094e74f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\WindowsUpdate.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC6DF.tmp.dmp
Mini DuMP crash report, 16 streams, Thu Oct 31 19:01:10 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC867.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC897.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsUpdate.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Oct 31 17:57:58 2024, mtime=Thu Oct 31 17:57:58 2024, atime=Thu Oct 31 17:57:58 2024, length=57856, window=hide
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\0eVxwphG1t.exe
"C:\Users\user\Desktop\0eVxwphG1t.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3552 -s 1836

URLs

Name
IP
Malicious
join-ez.gl.at.ply.gg
malicious
http://upx.sf.net
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
join-ez.gl.at.ply.gg
147.185.221.23
malicious

IPs

IP
Domain
Country
Malicious
147.185.221.23
join-ez.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{6eaaad6f-a808-9dce-4213-e7a87515d220}\Root\InventoryApplicationFile\0evxwphg1t.exe|4eb9d437e129952f
ProgramId
\REGISTRY\A\{6eaaad6f-a808-9dce-4213-e7a87515d220}\Root\InventoryApplicationFile\0evxwphg1t.exe|4eb9d437e129952f
FileId
\REGISTRY\A\{6eaaad6f-a808-9dce-4213-e7a87515d220}\Root\InventoryApplicationFile\0evxwphg1t.exe|4eb9d437e129952f
LowerCaseLongPath
\REGISTRY\A\{6eaaad6f-a808-9dce-4213-e7a87515d220}\Root\InventoryApplicationFile\0evxwphg1t.exe|4eb9d437e129952f
LongPathHash
\REGISTRY\A\{6eaaad6f-a808-9dce-4213-e7a87515d220}\Root\InventoryApplicationFile\0evxwphg1t.exe|4eb9d437e129952f
Name
\REGISTRY\A\{6eaaad6f-a808-9dce-4213-e7a87515d220}\Root\InventoryApplicationFile\0evxwphg1t.exe|4eb9d437e129952f
OriginalFileName
\REGISTRY\A\{6eaaad6f-a808-9dce-4213-e7a87515d220}\Root\InventoryApplicationFile\0evxwphg1t.exe|4eb9d437e129952f
Publisher
\REGISTRY\A\{6eaaad6f-a808-9dce-4213-e7a87515d220}\Root\InventoryApplicationFile\0evxwphg1t.exe|4eb9d437e129952f
Version
\REGISTRY\A\{6eaaad6f-a808-9dce-4213-e7a87515d220}\Root\InventoryApplicationFile\0evxwphg1t.exe|4eb9d437e129952f
BinFileVersion
\REGISTRY\A\{6eaaad6f-a808-9dce-4213-e7a87515d220}\Root\InventoryApplicationFile\0evxwphg1t.exe|4eb9d437e129952f
BinaryType
\REGISTRY\A\{6eaaad6f-a808-9dce-4213-e7a87515d220}\Root\InventoryApplicationFile\0evxwphg1t.exe|4eb9d437e129952f
ProductName
\REGISTRY\A\{6eaaad6f-a808-9dce-4213-e7a87515d220}\Root\InventoryApplicationFile\0evxwphg1t.exe|4eb9d437e129952f
ProductVersion
\REGISTRY\A\{6eaaad6f-a808-9dce-4213-e7a87515d220}\Root\InventoryApplicationFile\0evxwphg1t.exe|4eb9d437e129952f
LinkDate
\REGISTRY\A\{6eaaad6f-a808-9dce-4213-e7a87515d220}\Root\InventoryApplicationFile\0evxwphg1t.exe|4eb9d437e129952f
BinProductVersion
\REGISTRY\A\{6eaaad6f-a808-9dce-4213-e7a87515d220}\Root\InventoryApplicationFile\0evxwphg1t.exe|4eb9d437e129952f
AppxPackageFullName
\REGISTRY\A\{6eaaad6f-a808-9dce-4213-e7a87515d220}\Root\InventoryApplicationFile\0evxwphg1t.exe|4eb9d437e129952f
AppxPackageRelativeId
\REGISTRY\A\{6eaaad6f-a808-9dce-4213-e7a87515d220}\Root\InventoryApplicationFile\0evxwphg1t.exe|4eb9d437e129952f
Size
\REGISTRY\A\{6eaaad6f-a808-9dce-4213-e7a87515d220}\Root\InventoryApplicationFile\0evxwphg1t.exe|4eb9d437e129952f
Language
\REGISTRY\A\{6eaaad6f-a808-9dce-4213-e7a87515d220}\Root\InventoryApplicationFile\0evxwphg1t.exe|4eb9d437e129952f
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
622000
unkown
page readonly
malicious
1B7B0000
heap
page read and write
1BBD4000
stack
page read and write
A63000
heap
page read and write
7FFD34660000
trusted library allocation
page read and write
620000
unkown
page readonly
1BF5C000
stack
page read and write
7FFD3467D000
trusted library allocation
page execute and read and write
D70000
trusted library allocation
page read and write
ECE000
stack
page read and write
2921000
trusted library allocation
page read and write
7FF4A6980000
trusted library allocation
page execute and read and write
28E0000
heap
page read and write
DC0000
heap
page read and write
AA2000
heap
page read and write
A30000
heap
page read and write
1C15A000
stack
page read and write
1ACAE000
heap
page read and write
1B73B000
heap
page read and write
7C0000
heap
page read and write
D40000
heap
page read and write
DA0000
heap
page execute and read and write
2910000
heap
page read and write
CFE000
stack
page read and write
FCE000
stack
page read and write
7FFD34700000
trusted library allocation
page read and write
2D8D000
trusted library allocation
page read and write
7D0000
heap
page read and write
12921000
trusted library allocation
page read and write
2EB1000
trusted library allocation
page read and write
1B4DE000
stack
page read and write
A5C000
heap
page read and write
1B79D000
heap
page read and write
7FFD34674000
trusted library allocation
page read and write
A00000
heap
page read and write
7FFD34800000
trusted library allocation
page execute and read and write
7FFD34710000
trusted library allocation
page execute and read and write
7FFD34670000
trusted library allocation
page read and write
1B390000
heap
page execute and read and write
A36000
heap
page read and write
7FFD346AC000
trusted library allocation
page execute and read and write
AF9000
heap
page read and write
1C35A000
stack
page read and write
286E000
stack
page read and write
1B718000
heap
page read and write
1B785000
heap
page read and write
7FFD34654000
trusted library allocation
page read and write
7FFD3466D000
trusted library allocation
page execute and read and write
1B3D3000
heap
page read and write
7FFD34650000
trusted library allocation
page read and write
1B799000
heap
page read and write
1B3D0000
heap
page read and write
D00000
heap
page read and write
1BAD9000
stack
page read and write
D30000
trusted library allocation
page read and write
7FFD34736000
trusted library allocation
page execute and read and write
7FFD34663000
trusted library allocation
page read and write
D45000
heap
page read and write
7FFD347F2000
trusted library allocation
page read and write
A75000
heap
page read and write
D60000
trusted library allocation
page read and write
A72000
heap
page read and write
7FFD34770000
trusted library allocation
page execute and read and write
7FFD34706000
trusted library allocation
page read and write
D73000
trusted library allocation
page read and write
DC5000
heap
page read and write
1BC1F000
stack
page read and write
1B74F000
heap
page read and write
12928000
trusted library allocation
page read and write
620000
unkown
page readonly
1AEAD000
stack
page read and write
2969000
trusted library allocation
page read and write
7FFD34653000
trusted library allocation
page execute and read and write
1C25C000
stack
page read and write
7FFD3470C000
trusted library allocation
page execute and read and write
AA7000
heap
page read and write
1BC60000
heap
page read and write
1B38F000
stack
page read and write
7FFD3465D000
trusted library allocation
page execute and read and write
1B6E0000
heap
page read and write
AF4000
heap
page read and write
A3C000
heap
page read and write
774000
stack
page read and write
1B6DE000
stack
page read and write
There are 74 hidden memdumps, click here to show them.