IOC Report
z64BLPL.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\z64BLPL.exe
"C:\Users\user\Desktop\z64BLPL.exe"
malicious

URLs

Name
IP
Malicious
http://aborters.duckdns.org:8081
unknown
malicious
http://anotherarmy.dns.army:8081
unknown
malicious
https://www.office.com/
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20and%20Time:%2029/09/2024%20/%2005:52:51%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20494126%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
https://www.office.com/lB
unknown
http://checkip.dyndns.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://varders.kozow.com:8081
unknown
http://checkip.dyndns.org/
193.122.6.168
http://51.38.247.67:8081/_send_.php?L
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20a
unknown
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://mail.electradubai.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 17 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.electradubai.com
192.250.231.25
malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
193.122.6.168

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
192.250.231.25
mail.electradubai.com
United States
malicious
193.122.6.168
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z64BLPL_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z64BLPL_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z64BLPL_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z64BLPL_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z64BLPL_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z64BLPL_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z64BLPL_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z64BLPL_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z64BLPL_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z64BLPL_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z64BLPL_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z64BLPL_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z64BLPL_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z64BLPL_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2A11000
trusted library allocation
page read and write
malicious
2B1D000
trusted library allocation
page read and write
malicious
692000
unkown
page readonly
malicious
67B6000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
D50000
trusted library allocation
page read and write
E60000
trusted library allocation
page read and write
3BA4000
trusted library allocation
page read and write
EA0000
heap
page read and write
CC0000
trusted library allocation
page read and write
3C01000
trusted library allocation
page read and write
67E5000
trusted library allocation
page read and write
2AC5000
trusted library allocation
page read and write
3D4E000
trusted library allocation
page read and write
3C9F000
trusted library allocation
page read and write
2AC9000
trusted library allocation
page read and write
3BF5000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
D07000
trusted library allocation
page execute and read and write
6113000
heap
page read and write
D6A000
heap
page read and write
4B4D000
stack
page read and write
BE0000
trusted library allocation
page read and write
D6E000
heap
page read and write
3D06000
trusted library allocation
page read and write
2BC6000
trusted library allocation
page read and write
3AEF000
trusted library allocation
page read and write
2D59000
trusted library allocation
page read and write
AF7000
stack
page read and write
60BE000
stack
page read and write
3D72000
trusted library allocation
page read and write
2BC2000
trusted library allocation
page read and write
667E000
stack
page read and write
3BBC000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
3A33000
trusted library allocation
page read and write
3B3D000
trusted library allocation
page read and write
2BAD000
trusted library allocation
page read and write
4EAE000
trusted library allocation
page read and write
3AF3000
trusted library allocation
page read and write
2AD1000
trusted library allocation
page read and write
2E3D000
trusted library allocation
page read and write
2A73000
trusted library allocation
page read and write
3AD0000
trusted library allocation
page read and write
3D49000
trusted library allocation
page read and write
3B64000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
E2B000
heap
page read and write
633E000
stack
page read and write
5584000
trusted library allocation
page read and write
2BC8000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
2D86000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
3CA3000
trusted library allocation
page read and write
7E0000
heap
page read and write
3B43000
trusted library allocation
page read and write
3D34000
trusted library allocation
page read and write
653E000
stack
page read and write
3CD1000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
637E000
stack
page read and write
5FBE000
stack
page read and write
C85000
heap
page read and write
2A87000
trusted library allocation
page read and write
668D000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
6760000
trusted library allocation
page execute and read and write
61FE000
stack
page read and write
66E0000
trusted library allocation
page execute and read and write
3C72000
trusted library allocation
page read and write
2E0F000
trusted library allocation
page read and write
3CC3000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
3AE7000
trusted library allocation
page read and write
3B03000
trusted library allocation
page read and write
E1B000
heap
page read and write
67E0000
trusted library allocation
page read and write
2BCA000
trusted library allocation
page read and write
2EF6000
trusted library allocation
page read and write
3D7D000
trusted library allocation
page read and write
2C2D000
trusted library allocation
page read and write
2E99000
trusted library allocation
page read and write
CF6000
trusted library allocation
page execute and read and write
2AB9000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
3ACE000
trusted library allocation
page read and write
2BD5000
trusted library allocation
page read and write
3BC5000
trusted library allocation
page read and write
2A83000
trusted library allocation
page read and write
3AFF000
trusted library allocation
page read and write
3C19000
trusted library allocation
page read and write
3A1B000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
3B2D000
trusted library allocation
page read and write
536F000
stack
page read and write
3A39000
trusted library allocation
page read and write
66D0000
trusted library allocation
page execute and read and write
2ACD000
trusted library allocation
page read and write
3AF5000
trusted library allocation
page read and write
DEB000
heap
page read and write
3C84000
trusted library allocation
page read and write
4EC5000
trusted library allocation
page read and write
CC3000
trusted library allocation
page execute and read and write
CC4000
trusted library allocation
page read and write
C00000
trusted library allocation
page read and write
2BA3000
trusted library allocation
page read and write
4E96000
trusted library allocation
page read and write
2D2C000
trusted library allocation
page read and write
3D6A000
trusted library allocation
page read and write
D60000
heap
page read and write
D40000
trusted library allocation
page read and write
7D0000
heap
page read and write
2AC1000
trusted library allocation
page read and write
CF0000
trusted library allocation
page read and write
2BF7000
trusted library allocation
page read and write
4EA2000
trusted library allocation
page read and write
2CFC000
trusted library allocation
page read and write
67E2000
trusted library allocation
page read and write
DA2000
heap
page read and write
3DA8000
trusted library allocation
page read and write
3B5C000
trusted library allocation
page read and write
283E000
stack
page read and write
3C99000
trusted library allocation
page read and write
D05000
trusted library allocation
page execute and read and write
3AFB000
trusted library allocation
page read and write
3BC7000
trusted library allocation
page read and write
3CE1000
trusted library allocation
page read and write
4ED0000
heap
page read and write
F40000
heap
page read and write
2BF9000
trusted library allocation
page read and write
657E000
stack
page read and write
67F0000
trusted library allocation
page read and write
3D92000
trusted library allocation
page read and write
3D64000
trusted library allocation
page read and write
4FD3000
heap
page read and write
2DB4000
trusted library allocation
page read and write
60C0000
heap
page read and write
5260000
heap
page execute and read and write
105E000
stack
page read and write
3CE3000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
62FF000
stack
page read and write
2C5E000
trusted library allocation
page read and write
523D000
stack
page read and write
2A8B000
trusted library allocation
page read and write
3AE0000
trusted library allocation
page read and write
2BFB000
trusted library allocation
page read and write
3ACA000
trusted library allocation
page read and write
3B3F000
trusted library allocation
page read and write
546F000
unkown
page read and write
2900000
heap
page execute and read and write
D30000
trusted library allocation
page execute and read and write
3D8B000
trusted library allocation
page read and write
2AFA000
trusted library allocation
page read and write
F00000
heap
page read and write
3D55000
trusted library allocation
page read and write
4EB6000
trusted library allocation
page read and write
6700000
trusted library allocation
page execute and read and write
66B0000
trusted library allocation
page execute and read and write
3D98000
trusted library allocation
page read and write
4EBD000
trusted library allocation
page read and write
64BE000
stack
page read and write
2DE1000
trusted library allocation
page read and write
3C8B000
trusted library allocation
page read and write
C7E000
stack
page read and write
2BD0000
trusted library allocation
page read and write
3C97000
trusted library allocation
page read and write
3B01000
trusted library allocation
page read and write
6B3E000
stack
page read and write
64FE000
stack
page read and write
2E6B000
trusted library allocation
page read and write
3CA5000
trusted library allocation
page read and write
BE7000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
2BF3000
trusted library allocation
page read and write
3C74000
trusted library allocation
page read and write
6794000
trusted library allocation
page read and write
2EC7000
trusted library allocation
page read and write
D95000
heap
page read and write
2C06000
trusted library allocation
page read and write
2858000
trusted library allocation
page read and write
C30000
heap
page read and write
3C93000
trusted library allocation
page read and write
2A0E000
stack
page read and write
3A11000
trusted library allocation
page read and write
3D67000
trusted library allocation
page read and write
4A4C000
stack
page read and write
3CA7000
trusted library allocation
page read and write
CF2000
trusted library allocation
page read and write
3D04000
trusted library allocation
page read and write
4FD0000
heap
page read and write
558A000
trusted library allocation
page read and write
6690000
trusted library allocation
page execute and read and write
3B55000
trusted library allocation
page read and write
D0B000
trusted library allocation
page execute and read and write
E51000
heap
page read and write
C10000
heap
page read and write
67A0000
trusted library allocation
page execute and read and write
3B1F000
trusted library allocation
page read and write
CCD000
trusted library allocation
page execute and read and write
2ABD000
trusted library allocation
page read and write
CD0000
trusted library allocation
page read and write
CE0000
heap
page read and write
3DB6000
trusted library allocation
page read and write
6D6000
unkown
page readonly
2A6D000
trusted library allocation
page read and write
2AB5000
trusted library allocation
page read and write
2BAF000
trusted library allocation
page read and write
C80000
heap
page read and write
690000
unkown
page readonly
2A79000
trusted library allocation
page read and write
6184000
heap
page read and write
6159000
heap
page read and write
683E000
stack
page read and write
4E9B000
trusted library allocation
page read and write
3CFB000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
E90000
heap
page read and write
2AF8000
trusted library allocation
page read and write
3DAF000
trusted library allocation
page read and write
4EB1000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
769000
stack
page read and write
D02000
trusted library allocation
page read and write
CFA000
trusted library allocation
page execute and read and write
BF0000
trusted library allocation
page execute and read and write
CDD000
trusted library allocation
page execute and read and write
2840000
heap
page read and write
4E9E000
trusted library allocation
page read and write
3C6E000
trusted library allocation
page read and write
63BE000
stack
page read and write
66F0000
trusted library allocation
page execute and read and write
3A7A000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
4EC2000
trusted library allocation
page read and write
EFE000
stack
page read and write
2C8E000
trusted library allocation
page read and write
There are 228 hidden memdumps, click here to show them.