IOC Report
ZtQY1K6aTi.exe

loading gif

Files

File Path
Type
Category
Malicious
ZtQY1K6aTi.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Windows\System32\GroupPolicy\GPT.INI
ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\SysWOW64\GroupPolicy\gpt.ini
ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\GroupPolicy\Machine\Registry.pol
RAGE Package Format (RPF),
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ZtQY1K6aTi.exe
"C:\Users\user\Desktop\ZtQY1K6aTi.exe"
malicious

URLs

Name
IP
Malicious
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://www.winimage.com/zLibDll
unknown
https://t.me/RiseProSUPPORT
unknown
https://ipinfo.io/
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown

IPs

IP
Domain
Country
Malicious
87.120.84.5
unknown
Bulgaria

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6BB86D62-6074-413F-AC7A-F6E5212F3B22}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions
Exclusions_Extensions
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6BB86D62-6074-413F-AC7A-F6E5212F3B22}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions
exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6BB86D62-6074-413F-AC7A-F6E5212F3B22}Machine\SOFTWARE\Policies\Microsoft\Windows Defender
DisableAntiSpyware
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6BB86D62-6074-413F-AC7A-F6E5212F3B22}Machine\SOFTWARE\Policies\Microsoft\Windows Defender
DisableRoutinelyTakingAction
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6BB86D62-6074-413F-AC7A-F6E5212F3B22}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableBehaviorMonitoring
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6BB86D62-6074-413F-AC7A-F6E5212F3B22}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableOnAccessProtection
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6BB86D62-6074-413F-AC7A-F6E5212F3B22}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableScanOnRealtimeEnable
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6BB86D62-6074-413F-AC7A-F6E5212F3B22}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6BB86D62-6074-413F-AC7A-F6E5212F3B22}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{6BB86D62-6074-413F-AC7A-F6E5212F3B22}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRawWriteNotification
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
D2A000
heap
page read and write
32D000
unkown
page readonly
6E2E000
stack
page read and write
CD0000
heap
page read and write
A00000
heap
page read and write
4B0F000
stack
page read and write
327000
unkown
page readonly
D54000
heap
page read and write
6110000
heap
page read and write
4CFE000
stack
page read and write
487C000
heap
page read and write
6F2F000
stack
page read and write
D27000
heap
page read and write
4D7E000
stack
page read and write
D14000
heap
page read and write
CB0000
heap
page read and write
26E4000
heap
page read and write
D22000
heap
page read and write
6D30000
trusted library allocation
page read and write
6530000
trusted library allocation
page read and write
D1B000
heap
page read and write
322000
unkown
page read and write
D20000
heap
page read and write
330000
unkown
page readonly
CDE000
heap
page read and write
49CE000
stack
page read and write
4A0E000
stack
page read and write
1A1000
unkown
page execute read
D11000
heap
page read and write
D0C000
heap
page read and write
CDA000
heap
page read and write
1A1000
unkown
page execute read
6D30000
trusted library allocation
page read and write
48CE000
stack
page read and write
D40000
heap
page read and write
2FA000
unkown
page readonly
32D000
unkown
page readonly
487F000
heap
page read and write
6D30000
trusted library allocation
page read and write
B95000
heap
page read and write
CB9000
heap
page read and write
D1E000
heap
page read and write
D2F000
heap
page read and write
CB5000
heap
page read and write
702F000
stack
page read and write
4D3E000
stack
page read and write
1A0000
unkown
page readonly
327000
unkown
page readonly
322000
unkown
page write copy
79B000
stack
page read and write
AE0000
heap
page read and write
324000
unkown
page write copy
46F2000
heap
page read and write
26E0000
heap
page read and write
4CA0000
heap
page read and write
6120000
heap
page read and write
699000
stack
page read and write
1A0000
unkown
page readonly
B90000
heap
page read and write
330000
unkown
page readonly
D38000
heap
page read and write
2FA000
unkown
page readonly
325000
unkown
page read and write
There are 53 hidden memdumps, click here to show them.