Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
XZoxEqlRUw.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\188E93\31437F.lck
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\XZoxEqlRUw.exe
|
"C:\Users\user\Desktop\XZoxEqlRUw.exe"
|
||
C:\Users\user\Desktop\XZoxEqlRUw.exe
|
"C:\Users\user\Desktop\XZoxEqlRUw.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://kbfvzoboss.bid/alien/fre.php
|
|||
http://31.220.1.194/~zadmin/ptr5/mono.php
|
31.220.1.194
|
||
http://alphastand.top/alien/fre.php
|
|||
http://alphastand.win/alien/fre.php
|
|||
http://alphastand.trade/alien/fre.php
|
|||
https://ogp.me/ns#
|
unknown
|
||
https://www.yaworld.net/#organization
|
unknown
|
||
https://www.yaworld.net/#website
|
unknown
|
||
http://www.ibsensoftware.com/
|
unknown
|
||
https://rankmath.com/
|
unknown
|
||
https://www.yaworld.net/wp-content/uploads/2023/11/android-chrome-512x512-1.png
|
unknown
|
||
https://www.yaworld.net/#logo
|
unknown
|
||
https://www.yaworld.net
|
unknown
|
||
https://api.w.org/
|
unknown
|
||
https://www.yaworld.net/comments/feeP
|
unknown
|
||
https://schema.org
|
unknown
|
||
https://www.yaworld.net/wp-json/
|
unknown
|
||
https://www.yaworld.net/feed/
|
unknown
|
||
http://gmpg.org/xfn/11
|
unknown
|
There are 10 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
31.220.1.194
|
unknown
|
Germany
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4DD4000
|
direct allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
49E000
|
stack
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
224E000
|
stack
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
remote allocation
|
page execute and read and write
|
||
438000
|
unkown
|
page execute and write copy
|
||
20E0000
|
heap
|
page read and write
|
||
69D000
|
stack
|
page read and write
|
||
665000
|
direct allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
2179000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
4F3000
|
heap
|
page read and write
|
||
4F9000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
25E9000
|
heap
|
page read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
2070000
|
trusted library allocation
|
page execute read
|
||
4D9000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
2A84000
|
heap
|
page read and write
|
||
4AA000
|
heap
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2A90000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
71D000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
625000
|
heap
|
page read and write
|
||
438000
|
unkown
|
page execute and write copy
|
||
2290000
|
heap
|
page read and write
|
||
96000
|
stack
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
76F000
|
stack
|
page read and write
|
||
660000
|
direct allocation
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
2A80000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
20E8000
|
heap
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
2180000
|
trusted library allocation
|
page read and write
|
||
9AF000
|
stack
|
page read and write
|
||
4AE000
|
heap
|
page read and write
|
||
2950000
|
trusted library allocation
|
page read and write
|
||
20F0000
|
heap
|
page read and write
|
||
6B8000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
2170000
|
heap
|
page read and write
|
||
436000
|
unkown
|
page read and write
|
||
2200000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4C4000
|
heap
|
page read and write
|
||
20E5000
|
heap
|
page read and write
|
||
2210000
|
trusted library allocation
|
page read and write
|
||
2160000
|
direct allocation
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
660000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
438000
|
unkown
|
page execute and write copy
|
||
20A0000
|
heap
|
page read and write
|
There are 62 hidden memdumps, click here to show them.