IOC Report
2vPsGmF7E2.exe

loading gif

Files

File Path
Type
Category
Malicious
2vPsGmF7E2.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_2vPsGmF7E2.exe_ebe7824e783d8dd956eebe3f8ae6df8cc8696_c718f7ac_f305f120-9219-4b40-a255-f29053f1022f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD106.tmp.dmp
Mini DuMP crash report, 16 streams, Thu Oct 31 19:13:17 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD29D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD30C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\2vPsGmF7E2.exe
"C:\Users\user\Desktop\2vPsGmF7E2.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5736 -s 1652

URLs

Name
IP
Malicious
completed-rally.gl.at.ply.gg
malicious
http://upx.sf.net
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://rentry.co/8wum7vax/raw
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2vPsGmF7E2_RASMANCS
FileDirectory
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
ProgramId
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
FileId
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
LowerCaseLongPath
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
LongPathHash
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
Name
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
OriginalFileName
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
Publisher
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
Version
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
BinFileVersion
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
BinaryType
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
ProductName
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
ProductVersion
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
LinkDate
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
BinProductVersion
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
AppxPackageFullName
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
AppxPackageRelativeId
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
Size
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
Language
\REGISTRY\A\{821dc42f-cf4f-52be-f882-cd5431065ba9}\Root\InventoryApplicationFile\2vpsgmf7e2.exe|9ad6cd9f8abd15f
Usn
There are 23 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7D2000
unkown
page readonly
malicious
2BAC000
trusted library allocation
page read and write
malicious
7FFAACCE0000
trusted library allocation
page execute and read and write
E40000
heap
page execute and read and write
11F5000
heap
page read and write
DDD000
heap
page read and write
7D0000
unkown
page readonly
7FF4F8C50000
trusted library allocation
page execute and read and write
CE0000
trusted library allocation
page read and write
7FFAACCA6000
trusted library allocation
page execute and read and write
ED5000
heap
page read and write
7FFAACD62000
trusted library allocation
page read and write
7FFAACBC4000
trusted library allocation
page read and write
1BDAE000
stack
page read and write
7FFB167B0000
unkown
page read and write
11DE000
stack
page read and write
D00000
heap
page read and write
2C39000
trusted library allocation
page read and write
DC3000
heap
page read and write
D42000
heap
page read and write
DCD000
heap
page read and write
11F0000
heap
page read and write
7FFAACBD0000
trusted library allocation
page read and write
1B66E000
stack
page read and write
E20000
trusted library allocation
page read and write
2C62000
trusted library allocation
page read and write
D75000
heap
page read and write
B70000
heap
page read and write
7FFAACBE0000
trusted library allocation
page read and write
1B96B000
stack
page read and write
C50000
heap
page read and write
2C3F000
trusted library allocation
page read and write
12BA8000
trusted library allocation
page read and write
D45000
heap
page read and write
7FFAACC70000
trusted library allocation
page read and write
D35000
heap
page read and write
7FFAACBDD000
trusted library allocation
page execute and read and write
7FFB16790000
unkown
page readonly
1B12D000
stack
page read and write
7FFAACC1C000
trusted library allocation
page execute and read and write
2C49000
trusted library allocation
page read and write
2C46000
trusted library allocation
page read and write
B31000
stack
page read and write
7FFAACC7C000
trusted library allocation
page execute and read and write
2BC8000
trusted library allocation
page read and write
7D0000
unkown
page readonly
ED0000
heap
page read and write
7FFAACBEB000
trusted library allocation
page execute and read and write
7FFAACD60000
trusted library allocation
page read and write
1B9C4000
heap
page read and write
7FFAACBED000
trusted library allocation
page execute and read and write
7FFB167A6000
unkown
page readonly
7FFAACBCD000
trusted library allocation
page execute and read and write
1B56A000
stack
page read and write
7FFAACD70000
trusted library allocation
page execute and read and write
1B973000
heap
page read and write
D6F000
heap
page read and write
7FFB167B5000
unkown
page readonly
7FFAACC80000
trusted library allocation
page execute and read and write
C70000
heap
page read and write
7FFAACBC3000
trusted library allocation
page execute and read and write
2C42000
trusted library allocation
page read and write
7FFAACBD3000
trusted library allocation
page read and write
2C58000
trusted library allocation
page read and write
1B76E000
stack
page read and write
FDE000
stack
page read and write
2A90000
heap
page read and write
2C3C000
trusted library allocation
page read and write
7FFB167B2000
unkown
page readonly
1B86E000
stack
page read and write
C90000
heap
page read and write
D0C000
heap
page read and write
D33000
heap
page read and write
E10000
heap
page read and write
7FFB16791000
unkown
page execute read
10DE000
stack
page read and write
E23000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
1B970000
heap
page read and write
DFE000
heap
page read and write
2B9E000
stack
page read and write
2BA1000
trusted library allocation
page read and write
1BEAE000
stack
page read and write
D2C000
heap
page read and write
12BA1000
trusted library allocation
page read and write
DC0000
heap
page read and write
1BCAE000
stack
page read and write
1BFAD000
stack
page read and write
EC0000
heap
page execute and read and write
There are 79 hidden memdumps, click here to show them.