IOC Report
yF21ypxRB7.exe

loading gif

Files

File Path
Type
Category
Malicious
yF21ypxRB7.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Nov 17 17:24:09 2024, mtime=Sun Nov 17 17:24:09 2024, atime=Sun Nov 17 17:24:09 2024, length=39936, window=hide
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\yF21ypxRB7.exe
"C:\Users\user\Desktop\yF21ypxRB7.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k UnistackSvcGroup
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k LocalService -s W32Time
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
perfect-invest.gl.at.ply.gg
malicious
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&
unknown
https://api.telegram.org/bot
unknown
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://api.telegram.org/bot7602273147:AAGPHHPgO8DxUDOWK0ZCgtSD_Rua_8wVzrE/sendMessage?chat_id=6589427579&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A95B5CEC98776D486C10E%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20CO53M%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.6
149.154.167.220
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://dynamic.t
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
unknown
http://www.bingmapsportal.comsv
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
perfect-invest.gl.at.ply.gg
147.185.221.23
malicious
api.telegram.org
149.154.167.220
time.windows.com
unknown

IPs

IP
Domain
Country
Malicious
147.185.221.23
perfect-invest.gl.at.ply.gg
United States
malicious
149.154.167.220
api.telegram.org
United Kingdom

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
STATE
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
svchost
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\yF21ypxRB7_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\yF21ypxRB7_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\yF21ypxRB7_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\yF21ypxRB7_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\yF21ypxRB7_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\yF21ypxRB7_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\yF21ypxRB7_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\yF21ypxRB7_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\yF21ypxRB7_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\yF21ypxRB7_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\yF21ypxRB7_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\yF21ypxRB7_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\yF21ypxRB7_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\yF21ypxRB7_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\Config
LastKnownGoodTime
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
472000
unkown
page readonly
malicious
2830000
heap
page execute and read and write
9C0000
heap
page read and write
3F94FE000
stack
page readonly
270C9BF0000
trusted library allocation
page read and write
7FFAAC47D000
trusted library allocation
page execute and read and write
7FFAAC494000
trusted library allocation
page read and write
1B9B0000
heap
page read and write
1EDEF713000
heap
page read and write
3F947D000
stack
page read and write
1FE6DA4B000
heap
page read and write
1AC28000
heap
page read and write
AC3000
heap
page read and write
E43727E000
unkown
page readonly
7FFAAC460000
trusted library allocation
page read and write
7FFAAC462000
trusted library allocation
page read and write
11719340000
heap
page read and write
132A1000
trusted library allocation
page read and write
7FFAAC510000
trusted library allocation
page execute and read and write
7FFB068A5000
unkown
page readonly
11719502000
heap
page read and write
27E79836000
heap
page read and write
7FFAAC650000
trusted library allocation
page read and write
7FFAAC453000
trusted library allocation
page execute and read and write
9AB000
heap
page read and write
7FFAAC660000
trusted library allocation
page execute and read and write
7FFB068A2000
unkown
page readonly
2820000
heap
page read and write
1171943D000
heap
page read and write
132A8000
trusted library allocation
page read and write
E43687E000
unkown
page readonly
7FFAAC46D000
trusted library allocation
page execute and read and write
1FE6DB02000
heap
page read and write
7FFB06896000
unkown
page readonly
1C2D8000
stack
page read and write
32A1000
trusted library allocation
page read and write
E10000
heap
page read and write
920000
heap
page read and write
27FE000
stack
page read and write
7FFAAC4AD000
trusted library allocation
page execute and read and write
9B7F0FE000
stack
page read and write
8E0000
heap
page read and write
12948000
trusted library allocation
page read and write
1EDEF570000
heap
page read and write
27E79841000
heap
page read and write
A3D000
heap
page read and write
A2D000
heap
page read and write
1424000
heap
page read and write
1FE6D950000
heap
page read and write
270C9AC0000
heap
page read and write
7FFAAC4A0000
trusted library allocation
page read and write
27E79902000
heap
page read and write
1FE6D9A0000
remote allocation
page read and write
7FFAAC510000
trusted library allocation
page read and write
1BDDC000
stack
page read and write
1FE6DA40000
heap
page read and write
270C9AE0000
heap
page read and write
980000
heap
page read and write
3F9CFE000
stack
page read and write
1EDEFE00000
heap
page read and write
1FE6D870000
heap
page read and write
27E7983E000
heap
page read and write
7FFAAC474000
trusted library allocation
page read and write
27E7985A000
heap
page read and write
27E79838000
heap
page read and write
B02000
heap
page read and write
1B4E0000
heap
page execute and read and write
13D0000
trusted library allocation
page read and write
1FE6D9A0000
remote allocation
page read and write
1EDEF700000
heap
page read and write
27E797D0000
heap
page read and write
7FFAAC490000
trusted library allocation
page read and write
1C63F000
stack
page read and write
270C9C13000
heap
page read and write
27E79F30000
trusted library allocation
page read and write
EF7D77E000
stack
page read and write
7FFB06880000
unkown
page readonly
1ADF0000
heap
page execute and read and write
7FFAAC493000
trusted library allocation
page execute and read and write
7FFAAC540000
trusted library allocation
page read and write
1FE6D850000
heap
page read and write
580000
unkown
page readonly
1BA90000
heap
page execute and read and write
1FE6DA60000
heap
page read and write
1FE6DA4C000
heap
page read and write
27E7986C000
heap
page read and write
1FE6D980000
trusted library allocation
page read and write
98C000
heap
page read and write
1FE6DA24000
heap
page read and write
C00000
heap
page read and write
EF7D57F000
stack
page read and write
270CB5F0000
remote allocation
page read and write
12941000
trusted library allocation
page read and write
7FFAAC480000
trusted library allocation
page read and write
1EDEF490000
heap
page read and write
27E79813000
heap
page read and write
1FE6E202000
trusted library allocation
page read and write
27E79868000
heap
page read and write
27E79859000
heap
page read and write
27E79800000
heap
page read and write
D3C000
stack
page read and write
1EDEFE02000
heap
page read and write
270CB5B0000
trusted library allocation
page read and write
7FFAAC4BD000
trusted library allocation
page execute and read and write
270CB602000
trusted library allocation
page read and write
900000
heap
page read and write
9F3000
heap
page read and write
1BB9E000
stack
page read and write
28F8000
trusted library allocation
page read and write
27E79852000
heap
page read and write
E436C7E000
unkown
page readonly
1B71D000
stack
page read and write
1EDEF64D000
heap
page read and write
3FA1FD000
stack
page read and write
11719370000
trusted library allocation
page read and write
13F0000
heap
page execute and read and write
1B2F3000
heap
page read and write
1441000
heap
page read and write
270C9BC0000
heap
page read and write
3F8F4B000
stack
page read and write
1450000
heap
page read and write
7FFAAC470000
trusted library allocation
page read and write
BA3000
trusted library allocation
page read and write
E43707E000
unkown
page readonly
27E7984E000
heap
page read and write
3F92FE000
unkown
page readonly
C20000
heap
page read and write
7FFAAC464000
trusted library allocation
page read and write
148C000
heap
page read and write
27E79842000
heap
page read and write
270C9D13000
heap
page read and write
1ADBE000
stack
page read and write
1FE6DA60000
heap
page read and write
27E79862000
heap
page read and write
27E7985B000
heap
page read and write
7FFAAC49D000
trusted library allocation
page execute and read and write
1802000
heap
page read and write
1EDEF702000
heap
page read and write
1EDEF641000
heap
page read and write
11719448000
heap
page read and write
294C000
trusted library allocation
page read and write
1B9B2000
heap
page read and write
1EDEF68E000
heap
page read and write
32B1000
trusted library allocation
page read and write
7FFAAC4A2000
trusted library allocation
page read and write
7FFAAC640000
trusted library allocation
page execute and read and write
E436E7E000
unkown
page readonly
27E79850000
heap
page read and write
1C43E000
stack
page read and write
26B0000
heap
page read and write
E4365CE000
stack
page read and write
27E7986E000
heap
page read and write
27E79831000
heap
page read and write
AAF000
heap
page read and write
27E7988E000
heap
page read and write
270C9D00000
heap
page read and write
F90000
heap
page read and write
28A1000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
7FFAAC45D000
trusted library allocation
page execute and read and write
1002000
heap
page read and write
270C9C40000
heap
page read and write
F80000
heap
page read and write
1BEFE000
stack
page read and write
9B7F37E000
stack
page read and write
7FFAAC4EC000
trusted library allocation
page execute and read and write
1437000
heap
page read and write
27E79857000
heap
page read and write
7FFAAC4B4000
trusted library allocation
page read and write
128A1000
trusted library allocation
page read and write
470000
unkown
page readonly
3F9FFE000
unkown
page readonly
E436BFE000
stack
page read and write
270C9D28000
heap
page read and write
1C1DA000
stack
page read and write
1C8DA000
stack
page read and write
3F9EFD000
stack
page read and write
27E79893000
heap
page read and write
1444000
heap
page read and write
920000
heap
page read and write
270CB5F0000
remote allocation
page read and write
1FE6D9A0000
remote allocation
page read and write
270C9D02000
heap
page read and write
E436D7E000
stack
page read and write
270C9C02000
heap
page read and write
128B1000
trusted library allocation
page read and write
E436F7E000
stack
page read and write
A49000
heap
page read and write
1475000
heap
page read and write
1FE6DA5C000
heap
page read and write
1BCDB000
stack
page read and write
1502000
heap
page read and write
7FFAAC4AC000
trusted library allocation
page execute and read and write
1FE6DA00000
heap
page read and write
9B7ED9B000
stack
page read and write
1EDEF600000
heap
page read and write
1EDEF62B000
heap
page read and write
16FF000
stack
page read and write
F60000
heap
page read and write
27E79877000
heap
page read and write
2610000
heap
page read and write
7FFAAC4B0000
trusted library allocation
page read and write
1BEDE000
stack
page read and write
12F1000
stack
page read and write
1BAE5000
stack
page read and write
27E79897000
heap
page read and write
3F927E000
stack
page read and write
7FFAAC5F0000
trusted library allocation
page read and write
1102000
heap
page read and write
9B7F1FF000
stack
page read and write
27E7985C000
heap
page read and write
2650000
heap
page read and write
27E79854000
heap
page read and write
A50000
heap
page read and write
D0F000
stack
page read and write
143F000
heap
page read and write
27E7985F000
heap
page read and write
11719461000
heap
page read and write
7FFAAC464000
trusted library allocation
page read and write
A26000
heap
page read and write
1EDEF638000
heap
page read and write
27E79867000
heap
page read and write
1A8D0000
trusted library allocation
page read and write
1FE6DA13000
heap
page read and write
EF7D27B000
stack
page read and write
7FFAAC520000
trusted library allocation
page execute and read and write
1EDEF67B000
heap
page read and write
1BFFE000
stack
page read and write
1EDEF626000
heap
page read and write
7FFAAC570000
trusted library allocation
page execute and read and write
7FFAAC630000
trusted library allocation
page read and write
11719400000
heap
page read and write
7FFAAC600000
trusted library allocation
page read and write
3FA07E000
stack
page read and write
1B8F0000
heap
page read and write
2941000
trusted library allocation
page read and write
A00000
heap
page read and write
270C9C2B000
heap
page read and write
293E000
stack
page read and write
3F96FD000
stack
page read and write
EF7D47C000
stack
page read and write
1C73E000
stack
page read and write
A13000
heap
page read and write
1EDEF470000
heap
page read and write
27E7982B000
heap
page read and write
7FFAAC46D000
trusted library allocation
page execute and read and write
3F97FE000
unkown
page readonly
B90000
trusted library allocation
page read and write
2890000
heap
page execute and read and write
143B000
heap
page read and write
1BC02000
heap
page read and write
1421000
heap
page read and write
13E0000
heap
page read and write
7FFAAC500000
trusted library allocation
page read and write
270CB5F0000
remote allocation
page read and write
11719402000
heap
page read and write
27E79875000
heap
page read and write
E4368FE000
stack
page read and write
1C5E0000
heap
page read and write
27E79870000
heap
page read and write
7FFB068A0000
unkown
page read and write
27E79860000
heap
page read and write
1C53F000
stack
page read and write
1AE2C000
stack
page read and write
27E79838000
heap
page read and write
BA0000
trusted library allocation
page read and write
142C000
heap
page read and write
7FFAAC576000
trusted library allocation
page execute and read and write
1902000
heap
page read and write
32AF000
trusted library allocation
page read and write
7FF43F370000
trusted library allocation
page execute and read and write
32AC000
trusted library allocation
page read and write
E43717E000
stack
page read and write
27E797A0000
heap
page read and write
A3F000
heap
page read and write
AC7000
heap
page read and write
900000
heap
page read and write
7FFB06881000
unkown
page execute read
5B1000
stack
page read and write
7FFAAC463000
trusted library allocation
page execute and read and write
1EDEFE15000
heap
page read and write
11719C02000
trusted library allocation
page read and write
132A3000
trusted library allocation
page read and write
A44000
heap
page read and write
270C9C65000
heap
page read and write
1BA60000
heap
page read and write
7FFAAC472000
trusted library allocation
page read and write
329E000
stack
page read and write
7FFAAC550000
trusted library allocation
page execute and read and write
27E79858000
heap
page read and write
270C9C5F000
heap
page read and write
A0B000
heap
page read and write
28F4000
trusted library allocation
page read and write
9EC000
heap
page read and write
1AE02000
heap
page read and write
11719470000
heap
page read and write
27E7A002000
trusted library allocation
page read and write
11719452000
heap
page read and write
27E79861000
heap
page read and write
1B9DE000
heap
page read and write
8F1000
stack
page read and write
9C2000
heap
page read and write
7FFAAC4BB000
trusted library allocation
page execute and read and write
1171942D000
heap
page read and write
7FFAAC4BC000
trusted library allocation
page execute and read and write
11719310000
heap
page read and write
11719416000
heap
page read and write
E0E000
stack
page read and write
FE0000
trusted library allocation
page read and write
800000
heap
page read and write
7FFAAC546000
trusted library allocation
page execute and read and write
1FE6DA02000
heap
page read and write
1EDEF5A0000
trusted library allocation
page read and write
1400000
heap
page read and write
7FFAAC470000
trusted library allocation
page read and write
27E79835000
heap
page read and write
7FFAAC54C000
trusted library allocation
page execute and read and write
1EDEF65E000
heap
page read and write
A37000
heap
page read and write
7FFAAC546000
trusted library allocation
page read and write
A77000
heap
page read and write
270C9C00000
heap
page read and write
FE0000
trusted library allocation
page read and write
27E797C0000
heap
page read and write
1EDEF681000
heap
page read and write
7FFAAC5B0000
trusted library allocation
page execute and read and write
27E79855000
heap
page read and write
E43697E000
unkown
page readonly
1EDEF613000
heap
page read and write
1B3FE000
stack
page read and write
1B938000
heap
page read and write
27E7986D000
heap
page read and write
A98000
heap
page read and write
9EE000
heap
page read and write
11719437000
heap
page read and write
12943000
trusted library allocation
page read and write
A28000
heap
page read and write
1EDEF664000
heap
page read and write
E4364CB000
stack
page read and write
27E7986B000
heap
page read and write
7FFAAC536000
trusted library allocation
page execute and read and write
EBA4BBB000
stack
page read and write
1B5EE000
stack
page read and write
1C9DA000
stack
page read and write
1B2F0000
heap
page read and write
11719330000
heap
page read and write
1ADC0000
heap
page read and write
27E7984A000
heap
page read and write
B7D000
stack
page read and write
1EDEF64B000
heap
page read and write
128A8000
trusted library allocation
page read and write
27E7984C000
heap
page read and write
1EDEF602000
heap
page read and write
970000
trusted library allocation
page read and write
27E79848000
heap
page read and write
FA0000
heap
page read and write
BE5000
heap
page read and write
270C9C70000
heap
page read and write
7FFAAC454000
trusted library allocation
page read and write
3FA2FE000
unkown
page readonly
1B7EF000
stack
page read and write
BE0000
heap
page read and write
7FFAAC580000
trusted library allocation
page execute and read and write
3F9DFE000
unkown
page readonly
14B1000
heap
page read and write
1413000
heap
page read and write
A41000
heap
page read and write
EBA507E000
unkown
page readonly
47C000
unkown
page readonly
1B6EE000
stack
page read and write
27E7985D000
heap
page read and write
A46000
heap
page read and write
1FE6DA31000
heap
page read and write
11719413000
heap
page read and write
17FF000
stack
page read and write
EBA4F7E000
stack
page read and write
283E000
stack
page read and write
1C0DE000
stack
page read and write
3FA0FE000
unkown
page readonly
C25000
heap
page read and write
27BE000
stack
page read and write
There are 371 hidden memdumps, click here to show them.