IOC Report
Mzo6BdEtGv.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Mzo6BdEtGv.exe
"C:\Users\user\Desktop\Mzo6BdEtGv.exe"
malicious

URLs

Name
IP
Malicious
89.40.31.232
malicious
https://api.telegram.org/bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AFE6865D607A29FAFDCBE%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20GCCE9LGK%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024
149.154.167.220
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
89.40.31.232
unknown
Romania
malicious
149.154.167.220
api.telegram.org
United Kingdom

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Mzo6BdEtGv_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Mzo6BdEtGv_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Mzo6BdEtGv_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Mzo6BdEtGv_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Mzo6BdEtGv_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Mzo6BdEtGv_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Mzo6BdEtGv_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Mzo6BdEtGv_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Mzo6BdEtGv_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Mzo6BdEtGv_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Mzo6BdEtGv_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Mzo6BdEtGv_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Mzo6BdEtGv_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Mzo6BdEtGv_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2491000
trusted library allocation
page read and write
malicious
E2000
unkown
page readonly
malicious
723000
trusted library allocation
page read and write
1B6DB000
stack
page read and write
1B35E000
heap
page read and write
7FF7C1476000
trusted library allocation
page execute and read and write
7FF7C1390000
trusted library allocation
page read and write
1B0000
heap
page read and write
7FF7C1394000
trusted library allocation
page read and write
7FF7C13BD000
trusted library allocation
page execute and read and write
710000
trusted library allocation
page read and write
2504000
trusted library allocation
page read and write
248E000
stack
page read and write
7FF7C13BB000
trusted library allocation
page execute and read and write
190000
heap
page read and write
7FF7C13EC000
trusted library allocation
page execute and read and write
780000
heap
page read and write
ADE000
stack
page read and write
7FF7C139D000
trusted library allocation
page execute and read and write
7FF7C13B0000
trusted library allocation
page read and write
1B2CA000
heap
page read and write
24F5000
trusted library allocation
page read and write
536000
heap
page read and write
7FF7C1440000
trusted library allocation
page read and write
53C000
heap
page read and write
7FF7C1560000
trusted library allocation
page execute and read and write
1D0000
heap
page read and write
1B46E000
stack
page read and write
2380000
heap
page read and write
1C220000
heap
page read and write
2A15000
trusted library allocation
page read and write
7FF7C1450000
trusted library allocation
page execute and read and write
2A19000
trusted library allocation
page read and write
88D000
stack
page read and write
1B26F000
stack
page read and write
7FF7C14B0000
trusted library allocation
page execute and read and write
1B16E000
stack
page read and write
1AE56000
stack
page read and write
760000
heap
page read and write
9D5000
heap
page read and write
1B060000
heap
page execute and read and write
530000
heap
page read and write
1C235000
heap
page read and write
1AA1C000
stack
page read and write
7FF7C1532000
trusted library allocation
page read and write
E0000
unkown
page readonly
4F1000
stack
page read and write
1AFDE000
stack
page read and write
1B29A000
heap
page read and write
59D000
heap
page read and write
1BC1E000
stack
page read and write
573000
heap
page read and write
1C91C000
stack
page read and write
7FF7C13A0000
trusted library allocation
page read and write
E0000
unkown
page readonly
7FF7C144C000
trusted library allocation
page execute and read and write
7FF4942D0000
trusted library allocation
page execute and read and write
520000
trusted library allocation
page read and write
7FF7C13B4000
trusted library allocation
page read and write
1A4C0000
trusted library allocation
page read and write
7FF7C1530000
trusted library allocation
page read and write
98C000
stack
page read and write
1C71B000
stack
page read and write
1AE90000
heap
page read and write
785000
heap
page read and write
1B368000
heap
page read and write
234E000
stack
page read and write
2A17000
trusted library allocation
page read and write
180000
heap
page read and write
7FF7C13AD000
trusted library allocation
page execute and read and write
7FF7C1540000
trusted library allocation
page read and write
1C11A000
stack
page read and write
F6000
unkown
page readonly
7FF7C1550000
trusted library allocation
page execute and read and write
9D0000
heap
page read and write
1C81A000
stack
page read and write
2AFF000
trusted library allocation
page read and write
1B5D0000
heap
page read and write
1C01F000
stack
page read and write
571000
heap
page read and write
1AF93000
stack
page read and write
1C218000
stack
page read and write
1B2B6000
heap
page read and write
2350000
heap
page execute and read and write
720000
trusted library allocation
page read and write
5A3000
heap
page read and write
1B31C000
heap
page read and write
1B310000
heap
page read and write
7FF7C1446000
trusted library allocation
page read and write
1AE93000
heap
page read and write
1A816000
heap
page read and write
12491000
trusted library allocation
page read and write
55C000
heap
page read and write
7FF7C13A3000
trusted library allocation
page read and write
7FF7C1393000
trusted library allocation
page execute and read and write
1B270000
heap
page read and write
1B336000
heap
page read and write
1B2CE000
heap
page read and write
There are 88 hidden memdumps, click here to show them.