IOC Report
XZoxEqlRUw.exe

loading gif

Files

File Path
Type
Category
Malicious
XZoxEqlRUw.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\XZoxEqlRUw.exe
"C:\Users\user\Desktop\XZoxEqlRUw.exe"
malicious
C:\Users\user\Desktop\XZoxEqlRUw.exe
"C:\Users\user\Desktop\XZoxEqlRUw.exe"
malicious

URLs

Name
IP
Malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
malicious
http://31.220.1.194/~zadmin/ptr5/mono.php
31.220.1.194
malicious
http://alphastand.top/alien/fre.php
malicious
http://alphastand.win/alien/fre.php
malicious
http://alphastand.trade/alien/fre.php
malicious
https://ogp.me/ns#
unknown
https://www.yaworld.net/#organization
unknown
https://www.yaworld.net/#website
unknown
http://www.ibsensoftware.com/
unknown
https://rankmath.com/
unknown
https://www.yaworld.net/wp-content/uploads/2023/11/android-chrome-512x512-1.png
unknown
https://www.yaworld.net/#logo
unknown
https://www.yaworld.net
unknown
https://api.w.org/
unknown
https://www.yaworld.net/comments/feeP
unknown
https://schema.org
unknown
https://www.yaworld.net/wp-json/
unknown
https://www.yaworld.net/feed/
unknown
http://gmpg.org/xfn/11
unknown
There are 10 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
31.220.1.194
unknown
Germany
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4DD4000
direct allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
49E000
stack
page read and write
5BE000
stack
page read and write
19C000
stack
page read and write
1F0000
heap
page read and write
400000
unkown
page readonly
224E000
stack
page read and write
8AF000
stack
page read and write
2C80000
trusted library allocation
page read and write
4A0000
remote allocation
page execute and read and write
438000
unkown
page execute and write copy
20E0000
heap
page read and write
69D000
stack
page read and write
665000
direct allocation
page read and write
1F0000
heap
page read and write
2179000
heap
page read and write
8AF000
stack
page read and write
4F3000
heap
page read and write
4F9000
heap
page read and write
9C000
stack
page read and write
620000
heap
page read and write
5FE000
stack
page read and write
25E9000
heap
page read and write
4DC0000
heap
page read and write
2070000
trusted library allocation
page execute read
4D9000
heap
page read and write
440000
heap
page read and write
2A84000
heap
page read and write
4AA000
heap
page read and write
7AE000
stack
page read and write
401000
unkown
page execute read
2A90000
heap
page read and write
600000
heap
page read and write
4A0000
heap
page read and write
401000
unkown
page execute read
71D000
heap
page read and write
401000
unkown
page execute read
625000
heap
page read and write
438000
unkown
page execute and write copy
2290000
heap
page read and write
96000
stack
page read and write
2A20000
heap
page read and write
6B0000
heap
page read and write
630000
heap
page read and write
76F000
stack
page read and write
660000
direct allocation
page read and write
437000
unkown
page readonly
2A80000
heap
page read and write
19B000
stack
page read and write
20E8000
heap
page read and write
450000
heap
page read and write
2180000
trusted library allocation
page read and write
9AF000
stack
page read and write
4AE000
heap
page read and write
2950000
trusted library allocation
page read and write
20F0000
heap
page read and write
6B8000
heap
page read and write
437000
unkown
page readonly
2170000
heap
page read and write
436000
unkown
page read and write
2200000
heap
page read and write
400000
unkown
page readonly
4C4000
heap
page read and write
20E5000
heap
page read and write
2210000
trusted library allocation
page read and write
2160000
direct allocation
page read and write
437000
unkown
page readonly
660000
direct allocation
page read and write
400000
unkown
page readonly
438000
unkown
page execute and write copy
20A0000
heap
page read and write
There are 62 hidden memdumps, click here to show them.