IOC Report
oaUNY8P657.exe

loading gif

Files

File Path
Type
Category
Malicious
oaUNY8P657.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\sms561F.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_sms561F.tmp_942c3da8370deac9a4ef501abf272bdc1219b_47ac16bd_5ad1f071-b479-4c6d-8e86-ee4719fcda92\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7417.tmp.dmp
Mini DuMP crash report, 16 streams, Sun Nov 17 18:20:16 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7B9A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7C08.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\oaUNY8P657.exe
"C:\Users\user\Desktop\oaUNY8P657.exe"
malicious
C:\Users\user\Desktop\oaUNY8P657.exe
"C:\Users\user\Desktop\oaUNY8P657.exe"
malicious
C:\Users\user\AppData\Local\Temp\sms561F.tmp
"C:\Users\user~1\AppData\Local\Temp\sms561F.tmp"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7508 -s 1664

URLs

Name
IP
Malicious
left-noon.gl.at.ply.gg
malicious
https://i.ibb.co/Dwrj41N/Image.png
unknown
http://upx.sf.net
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://go.micu
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sms561F_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
234C000
trusted library allocation
page read and write
malicious
1F9C5F20000
heap
page read and write
malicious
1E2000
unkown
page readonly
malicious
7FF78CB20000
unkown
page readonly
400000
remote allocation
page execute and read and write
1B217000
heap
page read and write
7A2000
heap
page read and write
7FFAAC370000
trusted library allocation
page read and write
2230000
heap
page read and write
7FFB0B631000
unkown
page execute read
21E766B0000
heap
page read and write
7FFAAC420000
trusted library allocation
page execute and read and write
70D000
heap
page read and write
531000
stack
page read and write
21E766F0000
heap
page read and write
23D5000
trusted library allocation
page read and write
7FF78CB48000
unkown
page readonly
716000
heap
page read and write
1AD9B000
stack
page read and write
7FF78CB21000
unkown
page execute read
754000
heap
page read and write
21E0000
trusted library allocation
page read and write
233E000
stack
page read and write
21D0000
trusted library allocation
page read and write
7FF78CB20000
unkown
page readonly
660000
heap
page read and write
7FF78CB20000
unkown
page readonly
1AC90000
heap
page execute and read and write
7FF78CB24000
unkown
page readonly
1B6FE000
stack
page read and write
21E76700000
heap
page read and write
915000
heap
page read and write
724000
heap
page read and write
7FFAAC446000
trusted library allocation
page execute and read and write
23E5000
trusted library allocation
page read and write
23E8000
trusted library allocation
page read and write
7FF78CB20000
unkown
page readonly
705000
heap
page read and write
70F000
heap
page read and write
7FF78CB28000
unkown
page read and write
23D2000
trusted library allocation
page read and write
1AFBE000
stack
page read and write
79D000
heap
page read and write
1B1CB000
heap
page read and write
8DE000
stack
page read and write
910000
heap
page read and write
7FFAAC510000
trusted library allocation
page execute and read and write
6EC000
heap
page read and write
1B219000
heap
page read and write
7FFAAC480000
trusted library allocation
page execute and read and write
7FFAAC380000
trusted library allocation
page read and write
7FFAAC37D000
trusted library allocation
page execute and read and write
7FF78CB48000
unkown
page readonly
1F9C5E2F000
heap
page read and write
7FF78CB44000
unkown
page readonly
7FFB0B652000
unkown
page readonly
7FFAAC38D000
trusted library allocation
page execute and read and write
21E765D0000
heap
page read and write
2341000
trusted library allocation
page read and write
7FF78CB21000
unkown
page execute read
7FF78CB24000
unkown
page readonly
1B223000
heap
page read and write
7FFAAC500000
trusted library allocation
page read and write
1E0000
unkown
page readonly
1F9C5E20000
heap
page read and write
6A0000
heap
page read and write
7FF78CB28000
unkown
page write copy
7FF78CB28000
unkown
page write copy
BB5000
heap
page read and write
1B1ED000
heap
page read and write
1B5FE000
stack
page read and write
1B1C3000
heap
page read and write
2400000
trusted library allocation
page read and write
7FF78CB28000
unkown
page write copy
7FF78CB2B000
unkown
page readonly
1F9C5DF0000
heap
page read and write
1F9C5E28000
heap
page read and write
74E000
heap
page read and write
7FF78CB44000
unkown
page readonly
7FF78CB44000
unkown
page readonly
7FF78CB23000
unkown
page write copy
7FF78CB44000
unkown
page readonly
7FF78CB24000
unkown
page readonly
F320FE5000
stack
page read and write
7FF47A0F0000
trusted library allocation
page execute and read and write
1A8CC000
stack
page read and write
1F9C5D70000
heap
page read and write
21E76772000
heap
page read and write
BB0000
heap
page read and write
580000
heap
page read and write
7FF78CB23000
unkown
page write copy
7FFAAC373000
trusted library allocation
page read and write
7FF78CB21000
unkown
page execute read
1B1BB000
stack
page read and write
1AEBE000
stack
page read and write
2210000
heap
page execute and read and write
21E3000
trusted library allocation
page read and write
1F6000
unkown
page readonly
7FFB0B630000
unkown
page readonly
2368000
trusted library allocation
page read and write
7FFAAC38B000
trusted library allocation
page execute and read and write
21E7676C000
heap
page read and write
7FFB0B655000
unkown
page readonly
1F9C5D90000
heap
page read and write
1E0000
unkown
page readonly
7FFAAC363000
trusted library allocation
page execute and read and write
12341000
trusted library allocation
page read and write
21E76766000
heap
page read and write
7A0000
heap
page read and write
3177FFC000
stack
page read and write
31780FF000
stack
page read and write
12348000
trusted library allocation
page read and write
79B000
heap
page read and write
7FF78CB21000
unkown
page execute read
7FFAAC3BC000
trusted library allocation
page execute and read and write
7FF78CB48000
unkown
page readonly
680000
heap
page read and write
1B0BE000
stack
page read and write
1B7FD000
stack
page read and write
23D8000
trusted library allocation
page read and write
1B4FF000
stack
page read and write
23F6000
trusted library allocation
page read and write
7FFB0B646000
unkown
page readonly
F3211FF000
stack
page read and write
23DE000
trusted library allocation
page read and write
7FF78CB24000
unkown
page readonly
31781FF000
stack
page read and write
7FFB0B650000
unkown
page read and write
1B1C0000
heap
page read and write
6E0000
heap
page read and write
7FFAAC364000
trusted library allocation
page read and write
722000
heap
page read and write
1F9C5C90000
heap
page read and write
A1F000
stack
page read and write
21E76760000
heap
page read and write
23DB000
trusted library allocation
page read and write
7FF78CB2B000
unkown
page readonly
7FF78CB23000
unkown
page write copy
7FF78CB2B000
unkown
page readonly
7FFAAC41C000
trusted library allocation
page execute and read and write
7DE000
heap
page read and write
7FFAAC36D000
trusted library allocation
page execute and read and write
7FFAAC502000
trusted library allocation
page read and write
7FFAAC410000
trusted library allocation
page read and write
F3213FF000
stack
page read and write
7FF78CB2B000
unkown
page readonly
7FF78CB23000
unkown
page write copy
1ADB0000
heap
page read and write
8F0000
trusted library allocation
page read and write
7FF78CB48000
unkown
page readonly
720000
heap
page read and write
There are 141 hidden memdumps, click here to show them.