Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
VAIIBIHmtT.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\ScreenUpdateSync[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\81C9.tmp.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_81C9.tmp.exe_bc4642c7ae948eef13e4a6859ea587aa7a3_86f4c257_ac90cbf8-af1c-4af1-a963-43fca99a69d8\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER842A.tmp.dmp
|
Mini DuMP crash report, 14 streams, Fri Oct 25 20:37:15 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8516.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8536.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\VAIIBIHmtT.exe
|
"C:\Users\user\Desktop\VAIIBIHmtT.exe"
|
||
C:\Users\user\Desktop\VAIIBIHmtT.exe
|
"C:\Users\user\Desktop\VAIIBIHmtT.exe"
|
||
C:\Users\user\AppData\Local\Temp\81C9.tmp.exe
|
"C:\Users\user\AppData\Local\Temp\81C9.tmp.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7456 -s 1188
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://62.204.41.177/edd20096ecef326d.php
|
62.204.41.177
|
||
http://62.204.41.177/
|
62.204.41.177
|
||
http://62.204.41.177
|
unknown
|
||
https://post-to-me.com/track_prt.php?sub=&cc=DE
|
unknown
|
||
https://post-to-me.com/track_prt.php?sub=
|
unknown
|
||
http://62.204.41.177/edd20096ecef326d.phpM
|
unknown
|
||
https://post-to-me.com/track_prt.php?sub=0&cc=DE
|
104.21.56.70
|
||
http://176.113.115.37/ScreenUpdateSync.exe8
|
unknown
|
||
http://62.204.41.177/edd20096ecef326d.phpQ
|
unknown
|
||
http://176.113.115.37/ScreenUpdateSync.exe48rt8k8rt4rwe5rbSOFTWARE
|
unknown
|
||
https://post-to-me.com/
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://62.204.41.177)
|
unknown
|
||
http://62.204.41.177/=
|
unknown
|
||
http://176.113.115.37/ScreenUpdateSync.exe
|
unknown
|
||
http://62.204.41.177/ows
|
unknown
|
There are 6 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
post-to-me.com
|
104.21.56.70
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
62.204.41.177
|
unknown
|
United Kingdom
|
||
176.113.115.37
|
unknown
|
Russian Federation
|
||
104.21.56.70
|
post-to-me.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\prtscreen
|
Enabled
|
||
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
|
ProgramId
|
||
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
|
FileId
|
||
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
|
LowerCaseLongPath
|
||
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
|
LongPathHash
|
||
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
|
Name
|
||
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
|
OriginalFileName
|
||
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
|
Publisher
|
||
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
|
Version
|
||
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
|
BinFileVersion
|
||
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
|
BinaryType
|
||
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
|
ProductName
|
||
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
|
ProductVersion
|
||
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
|
LinkDate
|
||
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
|
BinProductVersion
|
||
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
|
AppxPackageFullName
|
||
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
|
Size
|
||
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
|
Language
|
||
\REGISTRY\A\{138f7216-2e29-6481-0708-391b9d9c7859}\Root\InventoryApplicationFile\81c9.tmp.exe|28ddc04a4359c87a
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 12 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
B70000
|
direct allocation
|
page read and write
|
||
B20000
|
direct allocation
|
page execute and read and write
|
||
825000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
305C000
|
stack
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
740000
|
direct allocation
|
page execute and read and write
|
||
5DE000
|
stack
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
7A3000
|
heap
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
4B1000
|
unkown
|
page execute and read and write
|
||
331B000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
73F000
|
stack
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
4E2000
|
unkown
|
page execute and read and write
|
||
1F0000
|
heap
|
page read and write
|
||
4EE000
|
stack
|
page read and write
|
||
63E000
|
stack
|
page read and write
|
||
195000
|
stack
|
page read and write
|
||
330E000
|
heap
|
page read and write
|
||
468000
|
unkown
|
page readonly
|
||
19C000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1F0000
|
heap
|
page read and write
|
||
7CE000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
7CA000
|
heap
|
page read and write
|
||
28CF000
|
stack
|
page read and write
|
||
1A78E000
|
stack
|
page read and write
|
||
3356000
|
heap
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
76D000
|
heap
|
page read and write
|
||
6BE000
|
stack
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
4AE000
|
stack
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
26CF000
|
stack
|
page read and write
|
||
27CF000
|
stack
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
43B000
|
unkown
|
page write copy
|
||
41A000
|
unkown
|
page execute read
|
||
458000
|
unkown
|
page write copy
|
||
7AB000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
2D90000
|
remote allocation
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
2287000
|
heap
|
page read and write
|
||
40E000
|
unkown
|
page execute read
|
||
75D000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1AA0E000
|
stack
|
page read and write
|
||
1A9CD000
|
stack
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
765000
|
heap
|
page read and write
|
||
457000
|
unkown
|
page write copy
|
||
B1F000
|
stack
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
9EF000
|
stack
|
page read and write
|
||
64A000
|
unkown
|
page execute and read and write
|
||
3356000
|
heap
|
page read and write
|
||
1A64F000
|
stack
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
2450000
|
heap
|
page read and write
|
||
1A74F000
|
stack
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
3319000
|
heap
|
page read and write
|
||
468000
|
unkown
|
page readonly
|
||
457000
|
unkown
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
7FB000
|
heap
|
page execute and read and write
|
||
9DE000
|
stack
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
766000
|
heap
|
page read and write
|
||
3810000
|
heap
|
page read and write
|
||
2260000
|
heap
|
page read and write
|
||
2D90000
|
remote allocation
|
page read and write
|
||
5F0000
|
direct allocation
|
page execute and read and write
|
||
CBE000
|
stack
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
3301000
|
heap
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7A8000
|
heap
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
774000
|
heap
|
page read and write
|
||
4BD000
|
unkown
|
page execute and read and write
|
||
19A000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
51B000
|
unkown
|
page readonly
|
||
1AB0E000
|
stack
|
page read and write
|
||
21DE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2D90000
|
remote allocation
|
page read and write
|
||
7EA000
|
heap
|
page read and write
|
||
86C000
|
heap
|
page read and write
|
||
CD3000
|
heap
|
page read and write
|
||
772000
|
heap
|
page read and write
|
||
333E000
|
heap
|
page read and write
|
||
41A000
|
unkown
|
page execute read
|
||
438000
|
unkown
|
page readonly
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
29CF000
|
stack
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
753000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
45D000
|
unkown
|
page read and write
|
||
3347000
|
heap
|
page read and write
|
||
736000
|
heap
|
page read and write
|
||
525000
|
heap
|
page read and write
|
||
67E000
|
stack
|
page read and write
|
||
333C000
|
heap
|
page read and write
|
||
6F8000
|
heap
|
page read and write
|
||
7EE000
|
heap
|
page read and write
|
||
1A88F000
|
stack
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
65C000
|
unkown
|
page execute and read and write
|
||
1A54F000
|
stack
|
page read and write
|
||
41A000
|
unkown
|
page execute read
|
||
401000
|
unkown
|
page execute read
|
||
2DCE000
|
stack
|
page read and write
|
||
1A8CE000
|
stack
|
page read and write
|
||
85A000
|
heap
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
468000
|
unkown
|
page readonly
|
||
457000
|
unkown
|
page write copy
|
||
2280000
|
heap
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
There are 132 hidden memdumps, click here to show them.