IOC Report
114117914 - Rebound Electronics.exe

loading gif

Files

File Path
Type
Category
Malicious
114117914 - Rebound Electronics.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Gehman
data
dropped
C:\Users\user\AppData\Local\Temp\autA7C0.tmp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\114117914 - Rebound Electronics.exe
"C:\Users\user\Desktop\114117914 - Rebound Electronics.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\114117914 - Rebound Electronics.exe"
malicious

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:899552%0D%0ADate%20and%20Time:%2020/11/2024%20/%2021:02:20%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20899552%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
https://www.office.com/lB
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:899552%0D%0ADate%20a
unknown
http://checkip.dyndns.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://reallyfreegeoip.org/xml/8.46.123.75
188.114.97.3
http://varders.kozow.com:8081
unknown
http://aborters.duckdns.org:8081
unknown
http://checkip.dyndns.org/
132.226.247.73
http://51.38.247.67:8081/_send_.php?L
unknown
http://anotherarmy.dns.army:8081
unknown
http://panta.home.pl
unknown
https://reallyfreegeoip.org/xml/8.46.123.75$
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 17 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
panta.home.pl
188.128.134.93
malicious
reallyfreegeoip.org
188.114.97.3
api.telegram.org
149.154.167.220
checkip.dyndns.com
132.226.247.73
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
188.128.134.93
panta.home.pl
Poland
malicious
149.154.167.220
api.telegram.org
United Kingdom
188.114.97.3
reallyfreegeoip.org
European Union
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
30B4000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
3DE0000
direct allocation
page read and write
malicious
2F31000
trusted library allocation
page read and write
malicious
44ED000
direct allocation
page read and write
15D0000
heap
page execute and read and write
3113000
trusted library allocation
page read and write
2FDD000
trusted library allocation
page read and write
1200000
trusted library allocation
page read and write
63FE000
stack
page read and write
413C000
trusted library allocation
page read and write
11A0000
heap
page read and write
33FE000
trusted library allocation
page read and write
CCE000
unkown
page readonly
55C0000
heap
page execute and read and write
6AF0000
trusted library allocation
page execute and read and write
428D000
trusted library allocation
page read and write
4393000
direct allocation
page read and write
3346000
trusted library allocation
page read and write
165D000
stack
page read and write
41B6000
trusted library allocation
page read and write
6AC0000
trusted library allocation
page read and write
125A000
stack
page read and write
4068000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
3E40000
heap
page read and write
6C07000
trusted library allocation
page read and write
1912000
heap
page read and write
3DC0000
heap
page read and write
44ED000
direct allocation
page read and write
41BA000
trusted library allocation
page read and write
40E8000
trusted library allocation
page read and write
1A55000
heap
page read and write
45AE000
direct allocation
page read and write
1969000
heap
page read and write
6BF0000
trusted library allocation
page read and write
2FF2000
trusted library allocation
page read and write
2F82000
trusted library allocation
page read and write
1A55000
heap
page read and write
33A2000
trusted library allocation
page read and write
3117000
trusted library allocation
page read and write
123E000
heap
page read and write
6AE0000
trusted library allocation
page execute and read and write
4024000
trusted library allocation
page read and write
4078000
trusted library allocation
page read and write
67FE000
stack
page read and write
3145000
trusted library allocation
page read and write
18CE000
heap
page read and write
43C0000
direct allocation
page read and write
4410000
direct allocation
page read and write
4206000
trusted library allocation
page read and write
68FE000
stack
page read and write
DEA000
stack
page read and write
197A000
heap
page read and write
CAD000
unkown
page readonly
2F10000
trusted library allocation
page read and write
CE4000
unkown
page readonly
188A000
heap
page read and write
44E9000
direct allocation
page read and write
18CA000
heap
page read and write
6BE0000
trusted library allocation
page read and write
1510000
trusted library allocation
page read and write
697E000
stack
page read and write
3F31000
trusted library allocation
page read and write
4016000
trusted library allocation
page read and write
407F000
trusted library allocation
page read and write
4227000
trusted library allocation
page read and write
4124000
trusted library allocation
page read and write
30EA000
trusted library allocation
page read and write
4050000
trusted library allocation
page read and write
3FF3000
trusted library allocation
page read and write
553E000
trusted library allocation
page read and write
552B000
trusted library allocation
page read and write
3250000
trusted library allocation
page read and write
421E000
trusted library allocation
page read and write
15E0000
heap
page read and write
4204000
trusted library allocation
page read and write
4295000
trusted library allocation
page read and write
3E44000
heap
page read and write
4229000
trusted library allocation
page read and write
150A000
trusted library allocation
page execute and read and write
5552000
trusted library allocation
page read and write
C20000
unkown
page readonly
18CA000
heap
page read and write
11B0000
heap
page read and write
3F59000
trusted library allocation
page read and write
4278000
trusted library allocation
page read and write
2FAC000
trusted library allocation
page read and write
552E000
trusted library allocation
page read and write
1204000
trusted library allocation
page read and write
591D000
stack
page read and write
41C2000
trusted library allocation
page read and write
44E9000
direct allocation
page read and write
311B000
trusted library allocation
page read and write
1512000
trusted library allocation
page read and write
400A000
trusted library allocation
page read and write
16C0000
heap
page read and write
5520000
trusted library allocation
page read and write
4018000
trusted library allocation
page read and write
18C0000
heap
page read and write
45AE000
direct allocation
page read and write
317E000
trusted library allocation
page read and write
10F7000
stack
page read and write
12A4000
heap
page read and write
3018000
trusted library allocation
page read and write
4410000
direct allocation
page read and write
6C20000
trusted library allocation
page read and write
CDA000
unkown
page write copy
40DF000
trusted library allocation
page read and write
4287000
trusted library allocation
page read and write
18CA000
heap
page read and write
1517000
trusted library allocation
page execute and read and write
1228000
heap
page read and write
4270000
direct allocation
page read and write
1203000
trusted library allocation
page execute and read and write
66B1000
heap
page read and write
4066000
trusted library allocation
page read and write
5513000
heap
page read and write
4012000
trusted library allocation
page read and write
157E000
stack
page read and write
45AE000
direct allocation
page read and write
1530000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
41AE000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
162F000
stack
page read and write
3126000
trusted library allocation
page read and write
30C4000
trusted library allocation
page read and write
18CE000
heap
page read and write
18CE000
heap
page read and write
163B000
stack
page read and write
18BE000
heap
page read and write
4393000
direct allocation
page read and write
2FE5000
trusted library allocation
page read and write
64FE000
stack
page read and write
1500000
trusted library allocation
page read and write
4118000
trusted library allocation
page read and write
C21000
unkown
page execute read
6BE5000
trusted library allocation
page read and write
30E6000
trusted library allocation
page read and write
1750000
heap
page read and write
428A000
trusted library allocation
page read and write
666E000
heap
page read and write
6B00000
trusted library allocation
page execute and read and write
3FF1000
trusted library allocation
page read and write
55E6000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
42CB000
trusted library allocation
page read and write
2EEE000
stack
page read and write
453D000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
44E9000
direct allocation
page read and write
427D000
trusted library allocation
page read and write
453D000
direct allocation
page read and write
554D000
trusted library allocation
page read and write
119E000
stack
page read and write
314E000
trusted library allocation
page read and write
41A7000
trusted library allocation
page read and write
3121000
trusted library allocation
page read and write
3318000
trusted library allocation
page read and write
4539000
direct allocation
page read and write
328F000
trusted library allocation
page read and write
1600000
heap
page read and write
5532000
trusted library allocation
page read and write
2F9A000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
4196000
heap
page read and write
207E000
stack
page read and write
11F0000
trusted library allocation
page read and write
6ABF000
stack
page read and write
69BE000
stack
page read and write
56A0000
heap
page read and write
41E6000
trusted library allocation
page read and write
4343000
direct allocation
page read and write
42D2000
trusted library allocation
page read and write
6C60000
heap
page read and write
5A1E000
stack
page read and write
455E000
direct allocation
page read and write
67BF000
stack
page read and write
55F0000
trusted library allocation
page read and write
C20000
unkown
page readonly
6C40000
trusted library allocation
page execute and read and write
44ED000
direct allocation
page read and write
4539000
direct allocation
page read and write
4220000
direct allocation
page read and write
1256000
heap
page read and write
1220000
heap
page read and write
1506000
trusted library allocation
page execute and read and write
CE4000
unkown
page readonly
1969000
heap
page read and write
4271000
trusted library allocation
page read and write
2FD1000
trusted library allocation
page read and write
4003000
trusted library allocation
page read and write
C21000
unkown
page execute read
42A0000
trusted library allocation
page read and write
124A000
heap
page read and write
3F9D000
trusted library allocation
page read and write
4197000
trusted library allocation
page read and write
7160000
heap
page read and write
4191000
trusted library allocation
page read and write
3F3B000
trusted library allocation
page read and write
4195000
trusted library allocation
page read and write
196A000
heap
page read and write
1951000
heap
page read and write
1931000
heap
page read and write
42B5000
trusted library allocation
page read and write
3F53000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
41BE000
trusted library allocation
page read and write
1A53000
heap
page read and write
14F0000
trusted library allocation
page read and write
151B000
trusted library allocation
page execute and read and write
6BE2000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
4270000
direct allocation
page read and write
3220000
trusted library allocation
page read and write
4F38000
trusted library allocation
page read and write
4257000
trusted library allocation
page read and write
4393000
direct allocation
page read and write
4042000
trusted library allocation
page read and write
40EA000
trusted library allocation
page read and write
30E2000
trusted library allocation
page read and write
130A000
heap
page read and write
4343000
direct allocation
page read and write
6B70000
trusted library allocation
page read and write
3119000
trusted library allocation
page read and write
1515000
trusted library allocation
page execute and read and write
41C8000
trusted library allocation
page read and write
401E000
trusted library allocation
page read and write
41F4000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
171E000
stack
page read and write
2F20000
heap
page read and write
30F0000
trusted library allocation
page read and write
30E8000
trusted library allocation
page read and write
303D000
trusted library allocation
page read and write
4539000
direct allocation
page read and write
16D0000
heap
page read and write
6C10000
trusted library allocation
page read and write
6B94000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page execute and read and write
4062000
trusted library allocation
page read and write
5510000
heap
page read and write
40C7000
trusted library allocation
page read and write
2EAE000
stack
page read and write
41CA000
trusted library allocation
page read and write
4220000
direct allocation
page read and write
400000
system
page execute and read and write
31AE000
trusted library allocation
page read and write
2FE9000
trusted library allocation
page read and write
2FD9000
trusted library allocation
page read and write
14EE000
stack
page read and write
66A5000
heap
page read and write
6640000
heap
page read and write
55FD000
trusted library allocation
page read and write
43C0000
direct allocation
page read and write
2FD5000
trusted library allocation
page read and write
186E000
stack
page read and write
4026000
trusted library allocation
page read and write
4270000
direct allocation
page read and write
2F00000
trusted library allocation
page read and write
43C0000
direct allocation
page read and write
2F8F000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
6B60000
trusted library allocation
page execute and read and write
5AA0000
trusted library allocation
page execute and read and write
1A56000
heap
page read and write
5AC0000
trusted library allocation
page execute and read and write
553A000
trusted library allocation
page read and write
1150000
heap
page read and write
342D000
trusted library allocation
page read and write
30F5000
trusted library allocation
page read and write
247E000
stack
page read and write
2510000
heap
page read and write
4087000
trusted library allocation
page read and write
4060000
trusted library allocation
page read and write
18CA000
heap
page read and write
2FE1000
trusted library allocation
page read and write
6BB6000
trusted library allocation
page read and write
42BB000
trusted library allocation
page read and write
15C0000
trusted library allocation
page execute and read and write
1880000
heap
page read and write
CDF000
unkown
page write copy
6AD0000
trusted library allocation
page execute and read and write
2FEE000
trusted library allocation
page read and write
18C7000
heap
page read and write
50CE000
stack
page read and write
55EA000
trusted library allocation
page read and write
18C9000
heap
page execute and read and write
426C000
trusted library allocation
page read and write
2FA4000
trusted library allocation
page read and write
42AE000
trusted library allocation
page read and write
66DD000
heap
page read and write
3374000
trusted library allocation
page read and write
1502000
trusted library allocation
page read and write
161C000
stack
page read and write
5541000
trusted library allocation
page read and write
32BD000
trusted library allocation
page read and write
CDA000
unkown
page read and write
11B5000
heap
page read and write
14FD000
trusted library allocation
page execute and read and write
3FED000
trusted library allocation
page read and write
42DA000
trusted library allocation
page read and write
1999000
heap
page read and write
41BC000
trusted library allocation
page read and write
453D000
direct allocation
page read and write
550E000
stack
page read and write
5546000
trusted library allocation
page read and write
CCE000
unkown
page readonly
4410000
direct allocation
page read and write
CAD000
unkown
page readonly
693E000
stack
page read and write
120D000
trusted library allocation
page execute and read and write
42B9000
trusted library allocation
page read and write
1295000
heap
page read and write
32EA000
trusted library allocation
page read and write
4220000
direct allocation
page read and write
5526000
trusted library allocation
page read and write
663E000
stack
page read and write
455E000
direct allocation
page read and write
1907000
heap
page read and write
653E000
stack
page read and write
15BC000
stack
page read and write
41C6000
trusted library allocation
page read and write
4343000
direct allocation
page read and write
455E000
direct allocation
page read and write
188E000
heap
page read and write
18F3000
heap
page read and write
18CA000
heap
page read and write
4022000
trusted library allocation
page read and write
677D000
stack
page read and write
1210000
heap
page read and write
66A8000
heap
page read and write
There are 323 hidden memdumps, click here to show them.