IOC Report
https://gtoyorupaz.emlnk9.com/lt.php?x=3DZy~GDFIXeg6XOu0N28Vuee3aIpj_XxwhphY5TIVnag78B-0Uy.y.e-3I2jmN~w

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Local\Temp\40279737-1c0a-47e7-b4ac-3a849a46e40d.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5B7C.tmp.dmp
Mini DuMP crash report, 15 streams, Wed May 28 15:12:22 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5E1D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5E4D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2zmchf0z.iyw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\speech\Microsoft\Speech\Files\UserLexicons\SP_706BED92DC0F4561B630334985F2E6BF.dat
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_76AA6D472247403591417AD14324BDB0.dat
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MLAIMZPAHLLU4W0S5V0R.temp
data
dropped
There are 2 hidden files, click here to show them.

URLs

Name
IP
Malicious
https://gtoyorupaz.emlnk9.com/lt.php?x=3DZy~GDFIXeg6XOu0N28Vuee3aIpj_XxwhphY5TIVnag78B-0Uy.y.e-3I2jmN~w
malicious
https://google.com@vstrrrlineproperrms.world/
malicious
https://google.com@vstrrrlineproperrms.world/sign-in?op_token=TfJdHmLBtgyxynNyAVQfoJA5CI6hyqzkoKUihdfmGSMECOhmRPG7L5ISpinTV2lUg6pqPRSZOtIubLLBVAYQb47bO6BoYssoHdiMBVPi0JRThIGTbjdor5Dq5V0IaJC3XFZn2VYlhEyhQeqDnssydN
malicious
https://apioeks.icu/apic/Qkqxz/EJDGUe
172.67.218.142
https://apioeks.icu/apis/wiRsh/jJZDv
172.67.218.142
http://c.pki.goog/r/r4.crl
74.125.137.94
https://apioeks.icu/fix
172.67.218.142

Domains

Name
IP
Malicious
vstrrrlineproperrms.world
172.67.206.184
malicious
a.nel.cloudflare.com
35.190.80.1
bstatic.com
3.168.147.60
partner.booking.com
13.226.210.124
gtoyorupaz.activehosted.com
104.17.205.31
e10776.b.akamaiedge.net
23.222.165.206
apioeks.icu
172.67.218.142
gtoyorupaz.emlnk9.com
54.225.69.136
code.jquery.com
151.101.2.137
challenges.cloudflare.com
104.18.94.41
www.google.com
74.125.137.105
cdn.cookielaw.org
104.18.87.42
try-cloudfront.abtasty.com
3.167.192.86
try.abtasty.com
unknown
munchkin.marketo.net
unknown
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
172.67.206.184
vstrrrlineproperrms.world
United States
malicious
142.250.101.138
unknown
United States
172.67.218.142
apioeks.icu
United States
3.168.147.60
bstatic.com
United States
192.168.2.17
unknown
unknown
104.18.94.41
challenges.cloudflare.com
United States
192.168.2.18
unknown
unknown
192.168.2.4
unknown
unknown
142.251.2.113
unknown
United States
142.251.2.138
unknown
United States
142.250.141.84
unknown
United States
35.190.80.1
a.nel.cloudflare.com
United States
104.18.87.42
cdn.cookielaw.org
United States
13.226.210.124
partner.booking.com
United States
3.167.192.86
try-cloudfront.abtasty.com
United States
104.18.95.41
unknown
United States
142.251.2.94
unknown
United States
54.225.69.136
gtoyorupaz.emlnk9.com
United States
142.250.101.100
unknown
United States
151.101.2.137
code.jquery.com
United States
74.125.137.105
www.google.com
United States
23.66.134.242
unknown
United States
23.222.165.206
e10776.b.akamaiedge.net
United States
104.17.205.31
gtoyorupaz.activehosted.com
United States
142.250.101.95
unknown
United States
142.250.101.94
unknown
United States
142.250.141.94
unknown
United States
127.0.0.1
unknown
unknown
There are 18 hidden IPs, click here to show them.