IOC Report
GVV.exe

loading gif

Files

File Path
Type
Category
Malicious
GVV.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\silvexes\deblaterate.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbs
data
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_5693d0d813f2531fe5aa358b2e8db4971ac2bbc_ce844639_4f98f805-979e-40ac-b848-95ff23acc2eb\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_af2772e4ab08333cacfef31df4e86d06a6d18a1_ce844639_5511f13d-c1c7-48e1-aaed-66db8b4a8302\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCA26.tmp.dmp
Mini DuMP crash report, 14 streams, Thu May 2 13:09:58 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCB8E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCBAF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREBD7.tmp.dmp
Mini DuMP crash report, 14 streams, Thu May 2 13:10:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERECB3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERECD3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\aut867.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut8C6.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autBD74.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autBDD3.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autEA6E.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autEACD.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\disturb
data
dropped
C:\Users\user\AppData\Local\Temp\proximobuccal
ASCII text, with very long lines (29744), with no line terminators
dropped
C:\Users\user\AppData\Roaming\logs.dat
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\GVV.exe
"C:\Users\user\Desktop\GVV.exe"
malicious
C:\Users\user\AppData\Local\silvexes\deblaterate.exe
"C:\Users\user\Desktop\GVV.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\GVV.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbs"
malicious
C:\Users\user\AppData\Local\silvexes\deblaterate.exe
"C:\Users\user\AppData\Local\silvexes\deblaterate.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\AppData\Local\silvexes\deblaterate.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 1456
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 1456

URLs

Name
IP
Malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
yuahdgbceja.sytes.net
malicious
http://geoplugin.net/json.gp/C
unknown
malicious
http://geoplugin.net/json.gpal
unknown
http://upx.sf.net
unknown
http://geoplugin.net/json.gpSystem32
unknown
http://geoplugin.net/json.gpll
unknown
http://geoplugin.net/json.gpD6
unknown
http://geoplugin.net/json.gp~
unknown

Domains

Name
IP
Malicious
yuahdgbceja.sytes.net
23.94.53.100
malicious
geoplugin.net
178.237.33.50
malicious

IPs

IP
Domain
Country
Malicious
23.94.53.100
yuahdgbceja.sytes.net
United States
malicious
178.237.33.50
geoplugin.net
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-E70NOS
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-E70NOS
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-E70NOS
time
malicious
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
ProgramId
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
FileId
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
LowerCaseLongPath
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
LongPathHash
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
Name
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
OriginalFileName
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
Publisher
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
Version
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
BinFileVersion
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
BinaryType
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
ProductName
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
ProductVersion
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
LinkDate
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
BinProductVersion
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
AppxPackageFullName
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
AppxPackageRelativeId
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
Size
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
Language
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
IsOsComponent
\REGISTRY\A\{7fc31948-b229-8674-309c-e8b3c75edb09}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4000000
direct allocation
page read and write
malicious
3E00000
direct allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
43BE000
direct allocation
page read and write
191F000
heap
page read and write
1862000
heap
page read and write
3F10000
direct allocation
page read and write
43DD000
direct allocation
page read and write
41DD000
direct allocation
page read and write
17D2000
heap
page read and write
F5C000
heap
page read and write
192E000
heap
page read and write
110000
unkown
page readonly
41D9000
direct allocation
page read and write
41DD000
direct allocation
page read and write
2A02000
heap
page read and write
1E7162A4000
heap
page read and write
3E80000
direct allocation
page read and write
125E000
stack
page read and write
1AC000
unkown
page readonly
2C31000
heap
page read and write
50C000
unkown
page readonly
17EA000
heap
page read and write
2E4C000
heap
page read and write
17A0000
heap
page read and write
EB3000
heap
page read and write
1930000
heap
page read and write
1780000
direct allocation
page execute and read and write
17BC000
heap
page read and write
F7F000
heap
page read and write
E02000
heap
page read and write
E93000
heap
page read and write
2780000
heap
page read and write
444E000
direct allocation
page read and write
DE9000
heap
page read and write
2E59000
heap
page read and write
185B000
heap
page read and write
40B0000
direct allocation
page read and write
B99CDFF000
stack
page read and write
2C8F000
heap
page read and write
2BEE000
stack
page read and write
1663000
heap
page read and write
4E3E000
stack
page read and write
4080000
direct allocation
page read and write
532000
unkown
page readonly
16BE000
stack
page read and write
184C000
heap
page read and write
5E01000
heap
page read and write
111000
unkown
page execute read
38B0000
heap
page read and write
17DD000
heap
page read and write
2A80000
heap
page read and write
444E000
direct allocation
page read and write
471000
unkown
page execute read
414D000
direct allocation
page read and write
1630000
heap
page read and write
4033000
direct allocation
page read and write
424E000
direct allocation
page read and write
1F9F000
stack
page read and write
1E716252000
heap
page read and write
B99D3FD000
stack
page read and write
2BAE000
stack
page read and write
434D000
direct allocation
page read and write
470000
unkown
page readonly
2E59000
heap
page read and write
49A0000
heap
page read and write
16DA000
heap
page read and write
B99D6FB000
stack
page read and write
4EAF000
stack
page read and write
1E716080000
heap
page read and write
3FA3000
direct allocation
page read and write
1950000
heap
page read and write
5E01000
heap
page read and write
1560000
heap
page read and write
166C000
heap
page read and write
41A3000
direct allocation
page read and write
53FD000
stack
page read and write
F7F000
heap
page read and write
1638000
heap
page read and write
532000
unkown
page readonly
43DD000
direct allocation
page read and write
2A30000
heap
page read and write
1864000
heap
page read and write
5B9B000
stack
page read and write
17DD000
heap
page read and write
31FF000
stack
page read and write
17AD000
heap
page read and write
15C0000
heap
page read and write
1713000
heap
page read and write
1770000
heap
page read and write
470000
unkown
page readonly
43BE000
direct allocation
page read and write
470000
unkown
page readonly
5E8C000
heap
page read and write
3360000
direct allocation
page read and write
3F10000
direct allocation
page read and write
38B4000
heap
page read and write
15CF000
stack
page read and write
B99C9CA000
stack
page read and write
478000
system
page execute and read and write
41DD000
direct allocation
page read and write
2C4C000
heap
page read and write
F6E000
heap
page read and write
48F0000
heap
page read and write
179E000
heap
page read and write
41A3000
direct allocation
page read and write
17DC000
heap
page read and write
E7C000
heap
page read and write
471000
unkown
page execute read
4233000
direct allocation
page read and write
CA0000
heap
page read and write
4349000
direct allocation
page read and write
17D2000
heap
page read and write
5E01000
heap
page read and write
4349000
direct allocation
page read and write
571F000
stack
page read and write
1AC0000
heap
page read and write
1A80000
direct allocation
page execute and read and write
1410000
heap
page read and write
4149000
direct allocation
page read and write
2A50000
heap
page read and write
4233000
direct allocation
page read and write
41A3000
direct allocation
page read and write
4F3F000
stack
page read and write
1AC000
unkown
page readonly
17AE000
heap
page read and write
2C02000
heap
page read and write
2E00000
heap
page read and write
2E12000
heap
page read and write
1E0000
unkown
page write copy
4110000
direct allocation
page read and write
15BF000
stack
page read and write
4CBF000
stack
page read and write
F53000
heap
page read and write
2C7D000
heap
page read and write
1662000
heap
page read and write
544000
unkown
page readonly
1883000
heap
page read and write
17DD000
heap
page read and write
5E00000
heap
page read and write
575D000
stack
page read and write
41BE000
direct allocation
page read and write
414D000
direct allocation
page read and write
17B8000
heap
page read and write
166C000
heap
page read and write
4C6C000
stack
page read and write
27D0000
heap
page read and write
B99D4FE000
stack
page read and write
4110000
direct allocation
page read and write
1570000
direct allocation
page execute and read and write
493E000
stack
page read and write
2F01000
heap
page read and write
16EA000
heap
page read and write
1E717CD0000
heap
page read and write
1E71641E000
heap
page read and write
F4F000
heap
page read and write
5A5F000
stack
page read and write
43D9000
direct allocation
page read and write
2D01000
heap
page read and write
15FF000
stack
page read and write
4233000
direct allocation
page read and write
1E716180000
heap
page read and write
2C00000
heap
page read and write
17AD000
heap
page read and write
9C6E000
direct allocation
page read and write
E8B000
heap
page read and write
314E000
stack
page read and write
55DF000
stack
page read and write
E0B000
heap
page read and write
124E000
stack
page read and write
2C65000
heap
page read and write
2E4C000
heap
page read and write
BBF000
stack
page read and write
386E000
direct allocation
page read and write
49EE000
stack
page read and write
5A9E000
stack
page read and write
585E000
stack
page read and write
42B0000
direct allocation
page read and write
3E80000
direct allocation
page read and write
E94000
heap
page read and write
E93000
heap
page read and write
17BD000
heap
page read and write
E04000
heap
page read and write
50C000
unkown
page readonly
474000
system
page execute and read and write
16F3000
heap
page read and write
1D2000
unkown
page readonly
27A0000
heap
page read and write
126C000
stack
page read and write
4080000
direct allocation
page read and write
F6C000
heap
page read and write
1E2F000
stack
page read and write
5E01000
heap
page read and write
30FE000
stack
page read and write
4220000
direct allocation
page read and write
4C6E000
direct allocation
page read and write
18F4000
heap
page read and write
1910000
heap
page read and write
444E000
direct allocation
page read and write
2C8F000
heap
page read and write
27E0000
heap
page readonly
1940000
heap
page read and write
3FA3000
direct allocation
page read and write
556E000
stack
page read and write
191F000
heap
page read and write
16F3000
heap
page read and write
5E01000
heap
page read and write
2F0E000
stack
page read and write
5E7A000
heap
page read and write
926E000
direct allocation
page read and write
E0C000
heap
page read and write
1E4000
unkown
page readonly
3454000
heap
page read and write
4080000
direct allocation
page read and write
532000
unkown
page readonly
4220000
direct allocation
page read and write
270C000
stack
page read and write
16F3000
heap
page read and write
15DC000
stack
page read and write
110000
unkown
page readonly
57ED000
stack
page read and write
16F3000
heap
page read and write
43D9000
direct allocation
page read and write
D80000
heap
page read and write
EB9000
stack
page read and write
4020000
direct allocation
page read and write
B99D1FF000
stack
page read and write
424E000
direct allocation
page read and write
12F0000
heap
page read and write
6A6E000
direct allocation
page read and write
4FEF000
stack
page read and write
15EF000
stack
page read and write
C10000
heap
page read and write
27FB000
stack
page read and write
53C000
unkown
page read and write
37A0000
direct allocation
page read and write
53C000
unkown
page write copy
17DB000
heap
page read and write
17DD000
heap
page read and write
544000
unkown
page readonly
1664000
heap
page read and write
17ED000
heap
page read and write
42B0000
direct allocation
page read and write
1D2000
unkown
page readonly
BDC000
stack
page read and write
40B0000
direct allocation
page read and write
1DC000
unkown
page read and write
540000
unkown
page write copy
17AE000
heap
page read and write
1E716410000
heap
page read and write
193D000
heap
page read and write
5E01000
heap
page read and write
E89000
stack
page read and write
4349000
direct allocation
page read and write
7E6E000
direct allocation
page read and write
17CD000
heap
page read and write
886E000
direct allocation
page read and write
2E54000
heap
page read and write
E0C000
heap
page read and write
1940000
heap
page read and write
43BE000
direct allocation
page read and write
532000
unkown
page readonly
5E01000
heap
page read and write
1DC000
unkown
page write copy
1A70000
heap
page read and write
2E54000
heap
page read and write
1E716240000
heap
page read and write
17DC000
heap
page read and write
1E716160000
heap
page read and write
4DAE000
stack
page read and write
17CD000
heap
page read and write
566F000
stack
page read and write
17AE000
heap
page read and write
53C000
unkown
page read and write
544000
unkown
page readonly
DD8000
heap
page read and write
140E000
stack
page read and write
1921000
heap
page read and write
2E7D000
heap
page read and write
1790000
heap
page read and write
3F10000
direct allocation
page read and write
4020000
direct allocation
page read and write
2E31000
heap
page read and write
1550000
heap
page read and write
17A8000
heap
page read and write
16F3000
heap
page read and write
BFF000
stack
page read and write
147E000
stack
page read and write
42B0000
direct allocation
page read and write
16F3000
heap
page read and write
4B2B000
stack
page read and write
E92000
heap
page read and write
17BD000
heap
page read and write
1911000
heap
page read and write
3E80000
direct allocation
page read and write
1640000
heap
page read and write
5A9000
stack
page read and write
1E4000
unkown
page readonly
1863000
heap
page read and write
4CFE000
stack
page read and write
1430000
heap
page read and write
470000
unkown
page readonly
414D000
direct allocation
page read and write
4BBC000
stack
page read and write
50C000
unkown
page readonly
424E000
direct allocation
page read and write
56AE000
stack
page read and write
1E716415000
heap
page read and write
F4F000
heap
page read and write
B99D0FF000
stack
page read and write
5E7A000
heap
page read and write
4A7B000
stack
page read and write
43D9000
direct allocation
page read and write
50C000
unkown
page readonly
BEF000
stack
page read and write
3861000
direct allocation
page read and write
2C59000
heap
page read and write
595E000
stack
page read and write
4A3E000
stack
page read and write
2C8B000
heap
page read and write
128F000
stack
page read and write
5E7A000
heap
page read and write
185B000
heap
page read and write
54FE000
stack
page read and write
F55000
heap
page read and write
192F000
heap
page read and write
111000
unkown
page execute read
16EB000
heap
page read and write
4EEE000
stack
page read and write
17CB000
heap
page read and write
2E67000
heap
page read and write
274B000
stack
page read and write
2CC1000
heap
page read and write
222E000
stack
page read and write
41BE000
direct allocation
page read and write
17ED000
heap
page read and write
544000
unkown
page readonly
54DE000
stack
page read and write
471000
unkown
page execute read
540000
unkown
page write copy
2140000
direct allocation
page read and write
17ED000
heap
page read and write
16EB000
heap
page read and write
41BE000
direct allocation
page read and write
43DD000
direct allocation
page read and write
184B000
heap
page read and write
B99CCFE000
stack
page read and write
1E716277000
heap
page read and write
4D6F000
stack
page read and write
F40000
heap
page read and write
5E01000
heap
page read and write
746E000
direct allocation
page read and write
3450000
heap
page read and write
4C2F000
stack
page read and write
BCF000
stack
page read and write
5E8C000
heap
page read and write
5E8C000
heap
page read and write
4020000
direct allocation
page read and write
4AEE000
stack
page read and write
40B0000
direct allocation
page read and write
F5F000
heap
page read and write
4033000
direct allocation
page read and write
1554000
heap
page read and write
3FA3000
direct allocation
page read and write
DD0000
heap
page read and write
566E000
direct allocation
page read and write
4149000
direct allocation
page read and write
41D9000
direct allocation
page read and write
304D000
stack
page read and write
185B000
heap
page read and write
426E000
direct allocation
page read and write
2CA0000
heap
page read and write
434D000
direct allocation
page read and write
2E6B000
heap
page read and write
478000
system
page execute and read and write
F4E000
heap
page read and write
2B60000
heap
page readonly
E02000
heap
page read and write
561D000
stack
page read and write
17AD000
heap
page read and write
4033000
direct allocation
page read and write
4220000
direct allocation
page read and write
B99CEFF000
stack
page read and write
16F4000
heap
page read and write
B99D5FE000
stack
page read and write
58EE000
stack
page read and write
2C12000
heap
page read and write
166B000
heap
page read and write
53C000
unkown
page write copy
A66E000
direct allocation
page read and write
1E71626B000
heap
page read and write
4B7E000
stack
page read and write
3CBF000
stack
page read and write
1863000
heap
page read and write
EFA000
heap
page read and write
127F000
stack
page read and write
59CB000
stack
page read and write
474000
system
page execute and read and write
1910000
heap
page read and write
434D000
direct allocation
page read and write
E0B000
heap
page read and write
471000
unkown
page execute read
606E000
direct allocation
page read and write
17AD000
heap
page read and write
5E01000
heap
page read and write
1920000
heap
page read and write
4DFF000
stack
page read and write
4110000
direct allocation
page read and write
163E000
stack
page read and write
2E8E000
heap
page read and write
17D4000
heap
page read and write
27BC000
stack
page read and write
2180000
heap
page read and write
E8B000
heap
page read and write
300E000
stack
page read and write
57AE000
stack
page read and write
5E7A000
heap
page read and write
18BC000
heap
page read and write
F20000
heap
page read and write
16F3000
heap
page read and write
2C71000
heap
page read and write
58CC000
stack
page read and write
2E67000
heap
page read and write
F6E000
heap
page read and write
5E01000
heap
page read and write
4149000
direct allocation
page read and write
17DC000
heap
page read and write
41D9000
direct allocation
page read and write
E0C000
heap
page read and write
There are 420 hidden memdumps, click here to show them.