IOC Report
VbcXXnmIwPPhh.exe

loading gif

Files

File Path
Type
Category
Malicious
VbcXXnmIwPPhh.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\VbcXXnmIwPPhh.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1xqyadvx.hmn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gc3jpauf.ryz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lj0wzbyw.y3g.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mljpq4ed.5sw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\Documents\VIPRecovery\Screenshot.png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
"C:\Users\user\Desktop\VbcXXnmIwPPhh.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VbcXXnmIwPPhh.exe"
malicious
C:\Users\user\Desktop\VbcXXnmIwPPhh.exe
"C:\Users\user\Desktop\VbcXXnmIwPPhh.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
http://aborters.duckdns.org:8081
unknown
malicious
http://anotherarmy.dns.army:8081
unknown
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://checkip.dyndns.org/
132.226.8.169
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://51.38.247.67:8081/_send_.php?L
unknown
https://api.telegram.org/bot
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.96.3
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://varders.kozow.com:8081
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:528110%0D%0ADate%20and%20Time:%2027/09/2024%20/%2000:14:59%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20528110%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
api.telegram.org
149.154.167.220
malicious
mail.jhxkgroup.online
217.12.218.219
malicious
checkip.dyndns.org
unknown
malicious
bg.microsoft.map.fastly.net
199.232.214.172
checkip.dyndns.com
132.226.8.169

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
217.12.218.219
mail.jhxkgroup.online
Ukraine
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
132.226.8.169
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VbcXXnmIwPPhh_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VbcXXnmIwPPhh_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VbcXXnmIwPPhh_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VbcXXnmIwPPhh_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VbcXXnmIwPPhh_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VbcXXnmIwPPhh_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VbcXXnmIwPPhh_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VbcXXnmIwPPhh_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VbcXXnmIwPPhh_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VbcXXnmIwPPhh_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VbcXXnmIwPPhh_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VbcXXnmIwPPhh_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VbcXXnmIwPPhh_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VbcXXnmIwPPhh_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
31B1000
trusted library allocation
page read and write
malicious
3269000
trusted library allocation
page read and write
malicious
4279000
trusted library allocation
page read and write
malicious
6260000
heap
page read and write
2FD7000
trusted library allocation
page execute and read and write
6F32000
trusted library allocation
page read and write
11540000
heap
page read and write
1155F000
heap
page read and write
6DDD000
stack
page read and write
7210000
heap
page read and write
5C3E000
stack
page read and write
16EE000
stack
page read and write
695E000
stack
page read and write
7D55000
heap
page read and write
56CE000
trusted library allocation
page read and write
5673000
heap
page read and write
4293000
trusted library allocation
page read and write
5670000
heap
page read and write
5B9F000
stack
page read and write
58FE000
stack
page read and write
15A0000
trusted library allocation
page read and write
7E4E000
stack
page read and write
736E000
heap
page read and write
41D1000
trusted library allocation
page read and write
7D10000
heap
page read and write
5C2A000
trusted library allocation
page read and write
1510000
trusted library allocation
page read and write
A48E000
stack
page read and write
6C5E000
stack
page read and write
6E30000
trusted library allocation
page execute and read and write
1984000
trusted library allocation
page read and write
6DF0000
trusted library allocation
page execute and read and write
16FE000
stack
page read and write
450000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
4216000
trusted library allocation
page read and write
5C24000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
685E000
stack
page read and write
7B5F000
stack
page read and write
A78E000
stack
page read and write
F0A000
unkown
page readonly
1532000
trusted library allocation
page read and write
7600000
trusted library allocation
page execute and read and write
58D0000
heap
page read and write
2FC2000
trusted library allocation
page read and write
32D2000
trusted library allocation
page read and write
6E60000
trusted library allocation
page execute and read and write
9700000
heap
page read and write
56F0000
heap
page read and write
73CF1000
unkown
page execute read
74DD000
stack
page read and write
3218000
trusted library allocation
page read and write
15F7000
heap
page read and write
162F000
heap
page read and write
3271000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
6A9D000
stack
page read and write
5C6A000
trusted library allocation
page read and write
323A000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page execute and read and write
11508000
heap
page read and write
6EC0000
trusted library allocation
page read and write
671E000
stack
page read and write
7670000
heap
page read and write
1680000
trusted library allocation
page execute and read and write
1420000
heap
page read and write
6999000
heap
page read and write
3236000
trusted library allocation
page read and write
16A4000
trusted library allocation
page read and write
13B8000
heap
page read and write
1499000
heap
page read and write
2FF0000
trusted library allocation
page read and write
13E6000
heap
page read and write
56BD000
stack
page read and write
6EF6000
trusted library allocation
page read and write
32C7000
trusted library allocation
page read and write
1400000
heap
page read and write
6DED000
trusted library allocation
page read and write
5C70000
heap
page read and write
164A000
heap
page read and write
6960000
heap
page read and write
6E10000
trusted library allocation
page execute and read and write
6ADE000
stack
page read and write
6FC0000
trusted library allocation
page read and write
1997000
heap
page read and write
42A9000
trusted library allocation
page read and write
69F8000
heap
page read and write
55F0000
trusted library allocation
page read and write
561D000
trusted library allocation
page read and write
1567000
heap
page read and write
FC7000
stack
page read and write
1490000
heap
page read and write
1536000
trusted library allocation
page execute and read and write
1983000
trusted library allocation
page execute and read and write
1540000
trusted library allocation
page read and write
6EE6000
trusted library allocation
page read and write
11500000
heap
page read and write
3242000
trusted library allocation
page read and write
73D9000
stack
page read and write
A99E000
stack
page read and write
56B4000
trusted library allocation
page read and write
166D000
stack
page read and write
154B000
trusted library allocation
page execute and read and write
13AE000
stack
page read and write
5850000
trusted library allocation
page read and write
58E0000
heap
page read and write
151D000
trusted library allocation
page execute and read and write
6A40000
heap
page read and write
2FCA000
trusted library allocation
page execute and read and write
5C75000
heap
page read and write
5C50000
trusted library allocation
page read and write
7DFB000
heap
page read and write
3246000
trusted library allocation
page read and write
198D000
trusted library allocation
page execute and read and write
13E0000
heap
page read and write
5C40000
trusted library allocation
page read and write
78FE000
stack
page read and write
15BE000
heap
page read and write
41CB000
trusted library allocation
page read and write
15F5000
heap
page read and write
322A000
trusted library allocation
page read and write
1530000
trusted library allocation
page read and write
5622000
trusted library allocation
page read and write
2FBD000
trusted library allocation
page execute and read and write
7360000
heap
page read and write
1500000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
5B7E000
stack
page read and write
14D0000
heap
page read and write
135D000
stack
page read and write
6EE0000
trusted library allocation
page read and write
1520000
trusted library allocation
page read and write
1230000
heap
page read and write
303E000
stack
page read and write
6E50000
trusted library allocation
page execute and read and write
6F24000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
1154C000
heap
page read and write
593D000
stack
page read and write
31FD000
trusted library allocation
page read and write
1513000
trusted library allocation
page execute and read and write
3080000
trusted library allocation
page execute and read and write
5611000
trusted library allocation
page read and write
2FD2000
trusted library allocation
page read and write
73CF0000
unkown
page readonly
324A000
trusted library allocation
page read and write
7CFD000
stack
page read and write
7F4E000
stack
page read and write
3686000
trusted library allocation
page read and write
17EF000
stack
page read and write
1545000
trusted library allocation
page execute and read and write
31AF000
stack
page read and write
7C9E000
stack
page read and write
536C000
stack
page read and write
1990000
heap
page read and write
6C1D000
stack
page read and write
30A0000
heap
page execute and read and write
146D000
stack
page read and write
58F0000
trusted library allocation
page execute and read and write
A89E000
stack
page read and write
9C0000
heap
page read and write
77FE000
stack
page read and write
1747000
heap
page read and write
5630000
trusted library allocation
page read and write
3220000
trusted library allocation
page read and write
56BB000
trusted library allocation
page read and write
ECA000
stack
page read and write
58C0000
trusted library section
page readonly
7F760000
trusted library allocation
page execute and read and write
7FFF000
stack
page read and write
13B0000
heap
page read and write
6F35000
trusted library allocation
page read and write
793E000
stack
page read and write
4266000
trusted library allocation
page read and write
55FE000
trusted library allocation
page read and write
7DF0000
heap
page read and write
153A000
trusted library allocation
page execute and read and write
73D0D000
unkown
page read and write
5C26000
trusted library allocation
page read and write
5A4E000
stack
page read and write
6F60000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
9710000
heap
page read and write
12F7000
stack
page read and write
16B0000
heap
page read and write
7B9E000
stack
page read and write
325B000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
173C000
stack
page read and write
41B1000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
427C000
trusted library allocation
page read and write
1425000
heap
page read and write
56DD000
trusted library allocation
page read and write
560E000
trusted library allocation
page read and write
31BF000
stack
page read and write
5710000
trusted library allocation
page read and write
5A60000
trusted library section
page read and write
1560000
heap
page read and write
6CDD000
stack
page read and write
146B000
heap
page read and write
307C000
stack
page read and write
5950000
heap
page execute and read and write
58BC000
stack
page read and write
55FB000
trusted library allocation
page read and write
6B1D000
stack
page read and write
A68E000
stack
page read and write
2FB0000
trusted library allocation
page read and write
5910000
heap
page execute and read and write
1547000
trusted library allocation
page execute and read and write
3262000
trusted library allocation
page read and write
69E5000
heap
page read and write
13E3000
heap
page read and write
1670000
trusted library allocation
page read and write
1300000
heap
page read and write
6C9E000
stack
page read and write
30A0000
trusted library allocation
page read and write
9E7000
heap
page read and write
5616000
trusted library allocation
page read and write
5BDE000
stack
page read and write
3090000
trusted library allocation
page read and write
4271000
trusted library allocation
page read and write
3232000
trusted library allocation
page read and write
57C0000
heap
page read and write
6F50000
trusted library allocation
page read and write
3260000
heap
page execute and read and write
3207000
trusted library allocation
page read and write
13DA000
heap
page read and write
766B000
stack
page read and write
5790000
trusted library allocation
page read and write
7620000
heap
page read and write
5A70000
heap
page read and write
1315000
heap
page read and write
E62000
unkown
page readonly
2FB3000
trusted library allocation
page read and write
322E000
trusted library allocation
page read and write
321C000
trusted library allocation
page read and write
2FDB000
trusted library allocation
page execute and read and write
81FD000
stack
page read and write
75D0000
trusted library allocation
page read and write
73D06000
unkown
page readonly
1360000
heap
page read and write
A0C000
heap
page read and write
6995000
heap
page read and write
184E000
stack
page read and write
AA0C000
stack
page read and write
5C60000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
681E000
stack
page read and write
323E000
trusted library allocation
page read and write
11514000
heap
page read and write
7DF8000
heap
page read and write
52AD000
stack
page read and write
31C8000
trusted library allocation
page read and write
41C4000
trusted library allocation
page read and write
159E000
stack
page read and write
E60000
unkown
page readonly
2FC0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page execute and read and write
1310000
heap
page read and write
5792000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
AB10000
trusted library allocation
page execute and read and write
5780000
heap
page read and write
2FC6000
trusted library allocation
page execute and read and write
1980000
trusted library allocation
page read and write
9F7000
heap
page read and write
57A0000
trusted library allocation
page execute and read and write
1514000
trusted library allocation
page read and write
5715000
trusted library allocation
page read and write
3696000
trusted library allocation
page read and write
1740000
heap
page read and write
5740000
trusted library allocation
page read and write
2FF8000
trusted library allocation
page read and write
75F0000
heap
page read and write
15E8000
heap
page read and write
AB0C000
stack
page read and write
15CF000
heap
page read and write
152D000
trusted library allocation
page execute and read and write
1684000
heap
page read and write
41BF000
trusted library allocation
page read and write
6270000
heap
page read and write
6E20000
trusted library allocation
page read and write
3090000
trusted library allocation
page read and write
F99000
stack
page read and write
15B0000
heap
page read and write
41D9000
trusted library allocation
page read and write
7D2F000
heap
page read and write
11557000
heap
page read and write
320D000
trusted library allocation
page read and write
80FE000
stack
page read and write
7A5F000
stack
page read and write
1690000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page read and write
7730000
trusted library section
page read and write
56E2000
trusted library allocation
page read and write
30B0000
heap
page read and write
6F30000
trusted library allocation
page read and write
71DC000
stack
page read and write
56F3000
heap
page read and write
7230000
trusted library allocation
page read and write
7200000
heap
page read and write
15E4000
heap
page read and write
73D0F000
unkown
page readonly
1542000
trusted library allocation
page read and write
6FAA000
stack
page read and write
56D6000
trusted library allocation
page read and write
6A34000
heap
page read and write
6E00000
trusted library allocation
page read and write
162D000
heap
page read and write
There are 305 hidden memdumps, click here to show them.