IOC Report
ptEox2MzMA.exe

loading gif

Files

File Path
Type
Category
Malicious
ptEox2MzMA.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_ptEox2MzMA.exe_47e57728e48516d112f9363fd48ab36552b4b78_13fce69d_32f2423b-432f-44af-8dc5-c4415dbd71bf\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF556.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Aug 30 10:43:31 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF5F4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF623.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ptEox2MzMA.exe
"C:\Users\user\Desktop\ptEox2MzMA.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3884 -s 1044

URLs

Name
IP
Malicious
http://120.46.149.112:8888/safekey
120.46.149.112
http://120.46.149.112:8888/safekeyE
unknown
http://120.46.149.112:8888/safekeyD~q
unknown
http://upx.sf.net
unknown
http://120.46.149.112:8888/safekey9
unknown
http://120.46.149.112:8888/safekey(
unknown

Domains

Name
IP
Malicious
171.39.242.20.in-addr.arpa
unknown
malicious

IPs

IP
Domain
Country
Malicious
120.46.149.112
unknown
China

Registry

Path
Value
Malicious
\REGISTRY\A\{4325ec1e-d045-20de-d590-ec5c2916f718}\Root\InventoryApplicationFile\pteox2mzma.exe|53c8a5c244347d0e
ProgramId
\REGISTRY\A\{4325ec1e-d045-20de-d590-ec5c2916f718}\Root\InventoryApplicationFile\pteox2mzma.exe|53c8a5c244347d0e
FileId
\REGISTRY\A\{4325ec1e-d045-20de-d590-ec5c2916f718}\Root\InventoryApplicationFile\pteox2mzma.exe|53c8a5c244347d0e
LowerCaseLongPath
\REGISTRY\A\{4325ec1e-d045-20de-d590-ec5c2916f718}\Root\InventoryApplicationFile\pteox2mzma.exe|53c8a5c244347d0e
LongPathHash
\REGISTRY\A\{4325ec1e-d045-20de-d590-ec5c2916f718}\Root\InventoryApplicationFile\pteox2mzma.exe|53c8a5c244347d0e
Name
\REGISTRY\A\{4325ec1e-d045-20de-d590-ec5c2916f718}\Root\InventoryApplicationFile\pteox2mzma.exe|53c8a5c244347d0e
OriginalFileName
\REGISTRY\A\{4325ec1e-d045-20de-d590-ec5c2916f718}\Root\InventoryApplicationFile\pteox2mzma.exe|53c8a5c244347d0e
Publisher
\REGISTRY\A\{4325ec1e-d045-20de-d590-ec5c2916f718}\Root\InventoryApplicationFile\pteox2mzma.exe|53c8a5c244347d0e
Version
\REGISTRY\A\{4325ec1e-d045-20de-d590-ec5c2916f718}\Root\InventoryApplicationFile\pteox2mzma.exe|53c8a5c244347d0e
BinFileVersion
\REGISTRY\A\{4325ec1e-d045-20de-d590-ec5c2916f718}\Root\InventoryApplicationFile\pteox2mzma.exe|53c8a5c244347d0e
BinaryType
\REGISTRY\A\{4325ec1e-d045-20de-d590-ec5c2916f718}\Root\InventoryApplicationFile\pteox2mzma.exe|53c8a5c244347d0e
ProductName
\REGISTRY\A\{4325ec1e-d045-20de-d590-ec5c2916f718}\Root\InventoryApplicationFile\pteox2mzma.exe|53c8a5c244347d0e
ProductVersion
\REGISTRY\A\{4325ec1e-d045-20de-d590-ec5c2916f718}\Root\InventoryApplicationFile\pteox2mzma.exe|53c8a5c244347d0e
LinkDate
\REGISTRY\A\{4325ec1e-d045-20de-d590-ec5c2916f718}\Root\InventoryApplicationFile\pteox2mzma.exe|53c8a5c244347d0e
BinProductVersion
\REGISTRY\A\{4325ec1e-d045-20de-d590-ec5c2916f718}\Root\InventoryApplicationFile\pteox2mzma.exe|53c8a5c244347d0e
AppxPackageFullName
\REGISTRY\A\{4325ec1e-d045-20de-d590-ec5c2916f718}\Root\InventoryApplicationFile\pteox2mzma.exe|53c8a5c244347d0e
AppxPackageRelativeId
\REGISTRY\A\{4325ec1e-d045-20de-d590-ec5c2916f718}\Root\InventoryApplicationFile\pteox2mzma.exe|53c8a5c244347d0e
Size
\REGISTRY\A\{4325ec1e-d045-20de-d590-ec5c2916f718}\Root\InventoryApplicationFile\pteox2mzma.exe|53c8a5c244347d0e
Language
\REGISTRY\A\{4325ec1e-d045-20de-d590-ec5c2916f718}\Root\InventoryApplicationFile\pteox2mzma.exe|53c8a5c244347d0e
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
24CDE1AA000
heap
page read and write
24CDE185000
heap
page read and write
24CDDFE0000
heap
page read and write
24CDFE30000
heap
page execute and read and write
7FF6D2640000
unkown
page readonly
24CDE3C0000
heap
page read and write
24CDE0EC000
heap
page read and write
24CDE198000
heap
page read and write
7FF6D2640000
unkown
page readonly
24CDE18A000
heap
page read and write
24CDE18C000
heap
page read and write
24CDE18C000
heap
page read and write
24CDFE80000
heap
page execute and read and write
24CDE185000
heap
page read and write
9BC20FE000
stack
page read and write
24CDE0E9000
heap
page read and write
24CDE198000
heap
page read and write
24CDE17C000
heap
page read and write
9BC21FF000
stack
page read and write
24CDE198000
heap
page read and write
9BC22F8000
stack
page read and write
9BC1FFE000
stack
page read and write
24CDE1A4000
heap
page read and write
24CDE0C0000
heap
page read and write
24CDE18E000
heap
page read and write
9BC1CFE000
stack
page read and write
7FF6D2642000
unkown
page readonly
24CDE1AA000
heap
page read and write
24CDE1E0000
heap
page read and write
24CDE192000
heap
page read and write
9BC1DFF000
stack
page read and write
7FF6D2641000
unkown
page execute read
24CDE185000
heap
page read and write
24CDE1AE000
heap
page read and write
7FF6D2641000
unkown
page execute read
24CDE0E0000
heap
page read and write
24CDE171000
heap
page read and write
24CDE198000
heap
page read and write
24CDE1AA000
heap
page read and write
24CDE19E000
heap
page read and write
9BC23FE000
stack
page read and write
9BC1EFE000
stack
page read and write
24CDE3C5000
heap
page read and write
7FF6D2644000
unkown
page readonly
9BC19EA000
stack
page read and write
24CDE177000
heap
page read and write
7FF6D2642000
unkown
page readonly
7FF6D2644000
unkown
page readonly
There are 38 hidden memdumps, click here to show them.