IOC Report
fP4kybhBWi.exe

loading gif

Files

File Path
Type
Category
Malicious
fP4kybhBWi.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\fP4kybhBWi.exe
"C:\Users\user\Desktop\fP4kybhBWi.exe"
malicious

URLs

Name
IP
Malicious
Kneegrowless-33547.portmap.host
malicious
https://api.ipify.org/
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://stackoverflow.com/q/2152978/23354sCannot
unknown
https://ipwho.is/
15.204.213.5
http://ipwho.is0v
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ipwho.is
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://ipwho.is
unknown
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
Kneegrowless-33547.portmap.host
193.161.193.99
malicious
bg.microsoft.map.fastly.net
199.232.214.172
ipwho.is
15.204.213.5

IPs

IP
Domain
Country
Malicious
193.161.193.99
Kneegrowless-33547.portmap.host
Russian Federation
malicious
15.204.213.5
ipwho.is
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fP4kybhBWi_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fP4kybhBWi_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fP4kybhBWi_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fP4kybhBWi_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fP4kybhBWi_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fP4kybhBWi_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fP4kybhBWi_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fP4kybhBWi_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fP4kybhBWi_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fP4kybhBWi_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fP4kybhBWi_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fP4kybhBWi_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fP4kybhBWi_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fP4kybhBWi_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2963000
trusted library allocation
page read and write
malicious
440000
unkown
page readonly
malicious
2791000
trusted library allocation
page read and write
malicious
122000
unkown
page readonly
malicious
890000
heap
page read and write
D20000
heap
page read and write
1B340000
heap
page read and write
278E000
stack
page read and write
1B0C6000
heap
page read and write
8FD000
heap
page read and write
7FFD9B9CD000
trusted library allocation
page execute and read and write
7FFD9BD00000
trusted library allocation
page read and write
1B0CA000
heap
page read and write
C80000
trusted library allocation
page read and write
27D1000
trusted library allocation
page read and write
CC0000
heap
page read and write
1B3B2000
heap
page read and write
7FFD9BE50000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
7FFD9BA96000
trusted library allocation
page execute and read and write
7FFD9BD20000
trusted library allocation
page read and write
7FFD9B9D4000
trusted library allocation
page read and write
8CB000
heap
page read and write
8CE000
heap
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
D25000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
C83000
trusted library allocation
page read and write
C70000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9BDC0000
trusted library allocation
page read and write
7FFD9BC80000
trusted library allocation
page read and write
7FFD9BE40000
trusted library allocation
page execute and read and write
2BAE000
trusted library allocation
page read and write
1B512000
heap
page read and write
7FFD9BDD0000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
7FFD9B9DD000
trusted library allocation
page execute and read and write
7FFD9BCD0000
trusted library allocation
page read and write
28F2000
trusted library allocation
page read and write
1C27D000
stack
page read and write
1B3FB000
heap
page read and write
7FFD9BC50000
trusted library allocation
page read and write
2BA8000
trusted library allocation
page read and write
1A7C0000
trusted library allocation
page read and write
127BD000
trusted library allocation
page read and write
1B93D000
stack
page read and write
12791000
trusted library allocation
page read and write
1BBBA000
heap
page read and write
2910000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
1B0BB000
heap
page read and write
7FFD9BBA5000
trusted library allocation
page read and write
1B0BD000
heap
page read and write
899000
heap
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
1B07C000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
28FA000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
2DB9000
trusted library allocation
page read and write
1B060000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
1B0E2000
heap
page read and write
7FFD9B9B3000
trusted library allocation
page execute and read and write
8F8000
heap
page read and write
870000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9BA6C000
trusted library allocation
page execute and read and write
1B240000
heap
page execute and read and write
120000
unkown
page readonly
1BB40000
heap
page read and write
1B63E000
stack
page read and write
2914000
trusted library allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
7FFD9BA66000
trusted library allocation
page read and write
7FFD9BDE7000
trusted library allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page execute and read and write
1B83D000
stack
page read and write
7FFD9B9C3000
trusted library allocation
page read and write
127DD000
trusted library allocation
page read and write
7FFD9BE70000
trusted library allocation
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
7FFD9BBE9000
trusted library allocation
page read and write
1BA3A000
stack
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
1B3C3000
heap
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
1BB3C000
stack
page read and write
7FFD9BA0C000
trusted library allocation
page execute and read and write
1B0A2000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
1B43A000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9B9DB000
trusted library allocation
page execute and read and write
1AD1C000
stack
page read and write
7FFD9BBE4000
trusted library allocation
page read and write
B65000
heap
page read and write
7FFD9BE00000
trusted library allocation
page read and write
7FFD9BE60000
trusted library allocation
page read and write
295F000
trusted library allocation
page read and write
2590000
heap
page execute and read and write
800000
heap
page read and write
7FFD9BDE2000
trusted library allocation
page read and write
7FFD9BE05000
trusted library allocation
page read and write
7FFD9BD40000
trusted library allocation
page execute and read and write
7FFD9BD10000
trusted library allocation
page read and write
28E6000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
5D0000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
120000
unkown
page readonly
1AB1A000
heap
page read and write
1B4DE000
heap
page read and write
1BB6C000
heap
page read and write
7FFD9BE30000
trusted library allocation
page read and write
581000
stack
page read and write
7FFD9BE20000
trusted library allocation
page read and write
1B3FE000
heap
page read and write
2680000
heap
page read and write
7FFD9BE0C000
trusted library allocation
page read and write
7FF496EE0000
trusted library allocation
page execute and read and write
1C17E000
stack
page read and write
7FFD9BE10000
trusted library allocation
page execute and read and write
24D0000
heap
page read and write
1C3BE000
stack
page read and write
29B8000
trusted library allocation
page read and write
CC3000
heap
page read and write
1B40A000
heap
page read and write
5E0000
heap
page read and write
1B735000
stack
page read and write
976000
heap
page read and write
7FFD9BDC2000
trusted library allocation
page read and write
127A8000
trusted library allocation
page read and write
B60000
heap
page read and write
820000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1279E000
trusted library allocation
page read and write
7FFD9BB98000
trusted library allocation
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
There are 138 hidden memdumps, click here to show them.