IOC Report
VAIIBIHmtT.exe

loading gif

Files

File Path
Type
Category
Malicious
VAIIBIHmtT.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\ScreenUpdateSync[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\81C9.tmp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_81C9.tmp.exe_bc4642c7ae948eef13e4a6859ea587aa7a3_86f4c257_ac90cbf8-af1c-4af1-a963-43fca99a69d8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER842A.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Oct 25 20:37:15 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8516.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8536.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\VAIIBIHmtT.exe
"C:\Users\user\Desktop\VAIIBIHmtT.exe"
malicious
C:\Users\user\Desktop\VAIIBIHmtT.exe
"C:\Users\user\Desktop\VAIIBIHmtT.exe"
malicious
C:\Users\user\AppData\Local\Temp\81C9.tmp.exe
"C:\Users\user\AppData\Local\Temp\81C9.tmp.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7456 -s 1188

URLs

Name
IP
Malicious
http://62.204.41.177/edd20096ecef326d.php
62.204.41.177
malicious
http://62.204.41.177/
62.204.41.177
malicious
http://62.204.41.177
unknown
malicious
https://post-to-me.com/track_prt.php?sub=&cc=DE
unknown
https://post-to-me.com/track_prt.php?sub=
unknown
http://62.204.41.177/edd20096ecef326d.phpM
unknown
https://post-to-me.com/track_prt.php?sub=0&cc=DE
104.21.56.70
http://176.113.115.37/ScreenUpdateSync.exe8
unknown
http://62.204.41.177/edd20096ecef326d.phpQ
unknown
http://176.113.115.37/ScreenUpdateSync.exe48rt8k8rt4rwe5rbSOFTWARE
unknown
https://post-to-me.com/
unknown
http://upx.sf.net
unknown
http://62.204.41.177)
unknown
http://62.204.41.177/=
unknown
http://176.113.115.37/ScreenUpdateSync.exe
unknown
http://62.204.41.177/ows
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
post-to-me.com
104.21.56.70

IPs

IP
Domain
Country
Malicious
62.204.41.177
unknown
United Kingdom
malicious
176.113.115.37
unknown
Russian Federation
104.21.56.70
post-to-me.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\prtscreen
Enabled
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
ProgramId
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
FileId
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
LowerCaseLongPath
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
LongPathHash
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
Name
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
OriginalFileName
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
Publisher
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
Version
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
BinFileVersion
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
BinaryType
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
ProductName
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
ProductVersion
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
LinkDate
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
BinProductVersion
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
AppxPackageFullName
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
AppxPackageRelativeId
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
Size
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
Language
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B70000
direct allocation
page read and write
malicious
B20000
direct allocation
page execute and read and write
malicious
825000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
305C000
stack
page read and write
BE0000
heap
page read and write
740000
direct allocation
page execute and read and write
5DE000
stack
page read and write
19C000
stack
page read and write
7A3000
heap
page read and write
21F0000
heap
page read and write
4B1000
unkown
page execute and read and write
331B000
heap
page read and write
8EF000
stack
page read and write
73F000
stack
page read and write
630000
heap
page read and write
4E2000
unkown
page execute and read and write
1F0000
heap
page read and write
4EE000
stack
page read and write
63E000
stack
page read and write
195000
stack
page read and write
330E000
heap
page read and write
468000
unkown
page readonly
19C000
stack
page read and write
401000
unkown
page execute read
1F0000
heap
page read and write
7CE000
heap
page read and write
740000
heap
page read and write
3300000
heap
page read and write
7CA000
heap
page read and write
28CF000
stack
page read and write
1A78E000
stack
page read and write
3356000
heap
page read and write
75F000
heap
page read and write
76D000
heap
page read and write
6BE000
stack
page read and write
2ECF000
stack
page read and write
4AE000
stack
page read and write
550000
heap
page read and write
401000
unkown
page execute read
26CF000
stack
page read and write
27CF000
stack
page read and write
4F0000
heap
page read and write
43B000
unkown
page write copy
41A000
unkown
page execute read
458000
unkown
page write copy
7AB000
heap
page read and write
760000
heap
page read and write
2D90000
remote allocation
page read and write
A1E000
stack
page read and write
2287000
heap
page read and write
40E000
unkown
page execute read
75D000
heap
page read and write
400000
unkown
page readonly
1AA0E000
stack
page read and write
1A9CD000
stack
page read and write
6F0000
heap
page read and write
765000
heap
page read and write
457000
unkown
page write copy
B1F000
stack
page read and write
9B000
stack
page read and write
32F0000
heap
page read and write
9EF000
stack
page read and write
64A000
unkown
page execute and read and write
3356000
heap
page read and write
1A64F000
stack
page read and write
7E0000
heap
page read and write
876000
heap
page read and write
2450000
heap
page read and write
1A74F000
stack
page read and write
B90000
heap
page read and write
3319000
heap
page read and write
468000
unkown
page readonly
457000
unkown
page read and write
1F0000
heap
page read and write
9B000
stack
page read and write
7FB000
heap
page execute and read and write
9DE000
stack
page read and write
315F000
stack
page read and write
766000
heap
page read and write
3810000
heap
page read and write
2260000
heap
page read and write
2D90000
remote allocation
page read and write
5F0000
direct allocation
page execute and read and write
CBE000
stack
page read and write
520000
heap
page read and write
775000
heap
page read and write
9C000
stack
page read and write
3301000
heap
page read and write
9BE000
stack
page read and write
C7E000
stack
page read and write
400000
unkown
page readonly
7A8000
heap
page read and write
7AE000
stack
page read and write
7A6000
heap
page read and write
774000
heap
page read and write
4BD000
unkown
page execute and read and write
19A000
stack
page read and write
401000
unkown
page execute read
51B000
unkown
page readonly
1AB0E000
stack
page read and write
21DE000
stack
page read and write
400000
unkown
page readonly
2D90000
remote allocation
page read and write
7EA000
heap
page read and write
86C000
heap
page read and write
CD3000
heap
page read and write
772000
heap
page read and write
333E000
heap
page read and write
41A000
unkown
page execute read
438000
unkown
page readonly
400000
remote allocation
page execute and read and write
29CF000
stack
page read and write
775000
heap
page read and write
400000
unkown
page readonly
753000
heap
page read and write
7B0000
heap
page read and write
7C0000
heap
page read and write
BF0000
heap
page read and write
45D000
unkown
page read and write
3347000
heap
page read and write
736000
heap
page read and write
525000
heap
page read and write
67E000
stack
page read and write
333C000
heap
page read and write
6F8000
heap
page read and write
7EE000
heap
page read and write
1A88F000
stack
page read and write
CD0000
heap
page read and write
775000
heap
page read and write
65C000
unkown
page execute and read and write
1A54F000
stack
page read and write
41A000
unkown
page execute read
401000
unkown
page execute read
2DCE000
stack
page read and write
1A8CE000
stack
page read and write
85A000
heap
page read and write
C3E000
stack
page read and write
468000
unkown
page readonly
457000
unkown
page write copy
2280000
heap
page read and write
59E000
stack
page read and write
There are 132 hidden memdumps, click here to show them.