IOC Report
VoGtelkHSn.exe

loading gif

Files

File Path
Type
Category
Malicious
VoGtelkHSn.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_VoGtelkHSn.exe_f761c59d348b96dd452ab7afe8f633ac68302a8_1ce72faa_daaeda3a-c187-4474-9194-c28c6a83adde\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER43F.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 26 03:44:09 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER53A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER56A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\VoGtelkHSn.exe
"C:\Users\user\Desktop\VoGtelkHSn.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5444 -s 1612

URLs

Name
IP
Malicious
incredibleextedwj.shop
malicious
shortsvelventysjo.shop
malicious
tolerateilusidjukl.shop
malicious
liabilitynighstjsko.shop
malicious
https://strollheavengwu.shop/api
172.67.163.209
malicious
shatterbreathepsw.shop
malicious
demonstationfukewko.shop
malicious
productivelookewr.shop
malicious
strollheavengwu.shop
malicious
alcojoldwograpciw.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://strollheavengwu.shop/apiV
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://strollheavengwu.shop/apis
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://strollheavengwu.shop/apiC
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://strollheavengwu.shop/P
unknown
https://strollheavengwu.shop/
unknown
There are 29 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
strollheavengwu.shop
172.67.163.209
malicious

IPs

IP
Domain
Country
Malicious
172.67.163.209
strollheavengwu.shop
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
ProgramId
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
FileId
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
LowerCaseLongPath
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
LongPathHash
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
Name
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
OriginalFileName
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
Publisher
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
Version
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
BinFileVersion
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
BinaryType
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
ProductName
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
ProductVersion
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
LinkDate
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
BinProductVersion
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
AppxPackageFullName
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
AppxPackageRelativeId
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
Size
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
Language
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2F40000
direct allocation
page read and write
malicious
544A000
trusted library allocation
page read and write
54F3000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
5507000
trusted library allocation
page read and write
5497000
trusted library allocation
page read and write
54DB000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
550C000
trusted library allocation
page read and write
2CD0000
heap
page read and write
2C7A000
heap
page read and write
5441000
trusted library allocation
page read and write
5534000
trusted library allocation
page read and write
5534000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
546F000
trusted library allocation
page read and write
54DB000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
2CCE000
heap
page read and write
5515000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
5534000
trusted library allocation
page read and write
2CCC000
heap
page read and write
5515000
trusted library allocation
page read and write
54BE000
trusted library allocation
page read and write
5443000
trusted library allocation
page read and write
54DF000
trusted library allocation
page read and write
2CD3000
heap
page read and write
54DE000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
543E000
stack
page read and write
54D6000
trusted library allocation
page read and write
545B000
trusted library allocation
page read and write
5627000
trusted library allocation
page read and write
56B7000
trusted library allocation
page read and write
54DD000
trusted library allocation
page read and write
2CCC000
heap
page read and write
2CB4000
heap
page read and write
54DB000
trusted library allocation
page read and write
5487000
trusted library allocation
page read and write
546A000
trusted library allocation
page read and write
552A000
trusted library allocation
page read and write
5659000
trusted library allocation
page read and write
2CD2000
heap
page read and write
5508000
trusted library allocation
page read and write
4C2E000
stack
page read and write
2F00000
heap
page read and write
544A000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
54E4000
trusted library allocation
page read and write
546E000
trusted library allocation
page read and write
54E4000
trusted library allocation
page read and write
546A000
trusted library allocation
page read and write
2CBB000
heap
page read and write
2CCC000
heap
page read and write
5505000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
54DB000
trusted library allocation
page read and write
5B30000
heap
page read and write
54DD000
trusted library allocation
page read and write
54DB000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
2F80000
remote allocation
page read and write
547D000
trusted library allocation
page read and write
5462000
trusted library allocation
page read and write
54F5000
trusted library allocation
page read and write
5505000
trusted library allocation
page read and write
54E4000
trusted library allocation
page read and write
54DD000
trusted library allocation
page read and write
421000
unkown
page readonly
59DC000
trusted library allocation
page read and write
2CB3000
heap
page read and write
54DA000
trusted library allocation
page read and write
552A000
trusted library allocation
page read and write
655F000
trusted library allocation
page read and write
5512000
trusted library allocation
page read and write
2CD0000
heap
page read and write
550B000
trusted library allocation
page read and write
2CB4000
heap
page read and write
54DB000
trusted library allocation
page read and write
2CCC000
heap
page read and write
2CCC000
heap
page read and write
2B20000
heap
page read and write
5480000
trusted library allocation
page read and write
54E4000
trusted library allocation
page read and write
51AF000
stack
page read and write
5648000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
5465000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
2B97000
heap
page read and write
5448000
trusted library allocation
page read and write
5669000
trusted library allocation
page read and write
2C4E000
heap
page read and write
545F000
trusted library allocation
page read and write
401000
unkown
page execute read
2B6E000
stack
page read and write
54E4000
trusted library allocation
page read and write
2C5C000
heap
page read and write
54DB000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
5482000
trusted library allocation
page read and write
54E4000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
4BEF000
stack
page read and write
2CCC000
heap
page read and write
5540000
heap
page read and write
5507000
trusted library allocation
page read and write
54F5000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
545F000
trusted library allocation
page read and write
2CBB000
heap
page read and write
552A000
trusted library allocation
page read and write
5534000
trusted library allocation
page read and write
54F5000
trusted library allocation
page read and write
2CD0000
heap
page read and write
30CF000
stack
page read and write
5463000
trusted library allocation
page read and write
54D4000
trusted library allocation
page read and write
54E4000
trusted library allocation
page read and write
2CCE000
heap
page read and write
5534000
trusted library allocation
page read and write
566A000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
5443000
trusted library allocation
page read and write
5471000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
2CCC000
heap
page read and write
198000
stack
page read and write
1F0000
heap
page read and write
545B000
trusted library allocation
page read and write
533E000
stack
page read and write
2BEA000
heap
page read and write
54F5000
trusted library allocation
page read and write
2CD0000
heap
page read and write
2CCC000
heap
page read and write
5541000
heap
page read and write
54D8000
trusted library allocation
page read and write
2F7E000
stack
page read and write
50AE000
stack
page read and write
5534000
trusted library allocation
page read and write
552A000
trusted library allocation
page read and write
2CD0000
heap
page read and write
557F000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
2CD0000
heap
page read and write
2CCC000
heap
page read and write
5641000
trusted library allocation
page read and write
559F000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
5659000
trusted library allocation
page read and write
54DB000
trusted library allocation
page read and write
2F80000
remote allocation
page read and write
544D000
trusted library allocation
page read and write
2CCC000
heap
page read and write
2CD0000
heap
page read and write
54DB000
trusted library allocation
page read and write
54BC000
trusted library allocation
page read and write
54D4000
trusted library allocation
page read and write
2CBA000
heap
page read and write
549E000
trusted library allocation
page read and write
54E4000
trusted library allocation
page read and write
2BE0000
heap
page read and write
2B0C000
unkown
page readonly
5462000
trusted library allocation
page read and write
5467000
trusted library allocation
page read and write
5679000
trusted library allocation
page read and write
55E7000
trusted library allocation
page read and write
54D9000
trusted library allocation
page read and write
54DB000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
54DF000
trusted library allocation
page read and write
40E000
unkown
page readonly
54D4000
trusted library allocation
page read and write
2CCC000
heap
page read and write
2F30000
heap
page read and write
5490000
trusted library allocation
page read and write
2CB7000
heap
page read and write
544F000
trusted library allocation
page read and write
2BF7000
heap
page execute and read and write
5534000
trusted library allocation
page read and write
5472000
trusted library allocation
page read and write
5515000
trusted library allocation
page read and write
2CD0000
heap
page read and write
5476000
trusted library allocation
page read and write
567B000
trusted library allocation
page read and write
547E000
trusted library allocation
page read and write
5567000
trusted library allocation
page read and write
2FC0000
heap
page read and write
52EE000
stack
page read and write
2CD3000
heap
page read and write
544A000
trusted library allocation
page read and write
54D9000
trusted library allocation
page read and write
44E000
unkown
page read and write
2CD0000
heap
page read and write
5443000
trusted library allocation
page read and write
5534000
trusted library allocation
page read and write
54F5000
trusted library allocation
page read and write
4AAE000
stack
page read and write
545F000
trusted library allocation
page read and write
400000
unkown
page readonly
2CCC000
heap
page read and write
44E000
unkown
page write copy
4AEE000
stack
page read and write
54DB000
trusted library allocation
page read and write
59D5000
trusted library allocation
page read and write
2B90000
heap
page read and write
2C31000
heap
page read and write
2C3A000
heap
page read and write
5445000
trusted library allocation
page read and write
547A000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
5534000
trusted library allocation
page read and write
54DB000
trusted library allocation
page read and write
2F80000
remote allocation
page read and write
5671000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
5679000
trusted library allocation
page read and write
5505000
trusted library allocation
page read and write
5534000
trusted library allocation
page read and write
5515000
trusted library allocation
page read and write
54D4000
trusted library allocation
page read and write
547D000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
54F5000
trusted library allocation
page read and write
564B000
trusted library allocation
page read and write
5515000
trusted library allocation
page read and write
2CD0000
heap
page read and write
544A000
trusted library allocation
page read and write
2BEE000
heap
page read and write
2C56000
heap
page read and write
5515000
trusted library allocation
page read and write
54DB000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
2C42000
heap
page read and write
54DD000
trusted library allocation
page read and write
2CB9000
heap
page read and write
54E4000
trusted library allocation
page read and write
54DE000
trusted library allocation
page read and write
5534000
trusted library allocation
page read and write
2C23000
heap
page read and write
51EE000
stack
page read and write
2CC8000
heap
page read and write
54DB000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
54F3000
trusted library allocation
page read and write
5648000
trusted library allocation
page read and write
5548000
trusted library allocation
page read and write
550C000
trusted library allocation
page read and write
54F5000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
54DB000
trusted library allocation
page read and write
2CD2000
heap
page read and write
5505000
trusted library allocation
page read and write
2BDE000
stack
page read and write
566F000
trusted library allocation
page read and write
5B49000
trusted library allocation
page read and write
2EAF000
stack
page read and write
5448000
trusted library allocation
page read and write
2EB0000
direct allocation
page execute and read and write
2C37000
heap
page read and write
449000
unkown
page execute and read and write
5641000
trusted library allocation
page read and write
2CCE000
heap
page read and write
5476000
trusted library allocation
page read and write
54DB000
trusted library allocation
page read and write
54D7000
trusted library allocation
page read and write
5617000
trusted library allocation
page read and write
5513000
trusted library allocation
page read and write
2C56000
heap
page read and write
5476000
trusted library allocation
page read and write
54DB000
trusted library allocation
page read and write
5495000
trusted library allocation
page read and write
5443000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
2B95000
heap
page read and write
5447000
trusted library allocation
page read and write
599F000
stack
page read and write
544D000
trusted library allocation
page read and write
554E000
trusted library allocation
page read and write
5534000
trusted library allocation
page read and write
2C4C000
heap
page read and write
2C5C000
heap
page read and write
2CD2000
heap
page read and write
496D000
stack
page read and write
566D000
trusted library allocation
page read and write
4D2F000
stack
page read and write
552E000
trusted library allocation
page read and write
589E000
stack
page read and write
544D000
trusted library allocation
page read and write
5464000
trusted library allocation
page read and write
5515000
trusted library allocation
page read and write
5546000
trusted library allocation
page read and write
55EF000
trusted library allocation
page read and write
5477000
trusted library allocation
page read and write
2F90000
heap
page read and write
54DB000
trusted library allocation
page read and write
544B000
trusted library allocation
page read and write
54E4000
trusted library allocation
page read and write
561F000
trusted library allocation
page read and write
5473000
trusted library allocation
page read and write
2CD0000
heap
page read and write
5534000
trusted library allocation
page read and write
54D9000
trusted library allocation
page read and write
49AD000
stack
page read and write
2CD0000
heap
page read and write
5515000
trusted library allocation
page read and write
9B000
stack
page read and write
2CB7000
heap
page read and write
2CCC000
heap
page read and write
544A000
trusted library allocation
page read and write
2CC0000
heap
page read and write
544D000
trusted library allocation
page read and write
5456000
trusted library allocation
page read and write
2B0C000
unkown
page readonly
6042000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
2CC8000
heap
page read and write
2C42000
heap
page read and write
2CD2000
heap
page read and write
550D000
trusted library allocation
page read and write
There are 316 hidden memdumps, click here to show them.