Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
lista de cotizaciones.xlam.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Keily
|
ASCII text, with very long lines (28756), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut30C2.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut3111.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lophophorine
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\lista de cotizaciones.xlam.exe
|
"C:\Users\user\Desktop\lista de cotizaciones.xlam.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\lista de cotizaciones.xlam.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.telegram.org/bot
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://checkip.dyndns.org/
|
132.226.8.169
|
||
http://checkip.dyndns.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
132.226.8.169
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
132.226.8.169
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
CA0000
|
direct allocation
|
page read and write
|
||
2F4A000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
2E81000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page execute and read and write
|
||
EA0000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
9BF000
|
stack
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
106B000
|
trusted library allocation
|
page execute and read and write
|
||
6320000
|
heap
|
page read and write
|
||
9DB000
|
stack
|
page read and write
|
||
601E000
|
stack
|
page read and write
|
||
9FC000
|
stack
|
page read and write
|
||
580E000
|
stack
|
page read and write
|
||
2B5000
|
unkown
|
page readonly
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
2F31000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
trusted library allocation
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
1065000
|
trusted library allocation
|
page execute and read and write
|
||
2DED000
|
stack
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
36E0000
|
direct allocation
|
page read and write
|
||
F11000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
2F9F000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
104D000
|
trusted library allocation
|
page execute and read and write
|
||
5830000
|
trusted library allocation
|
page execute and read and write
|
||
2F7D000
|
trusted library allocation
|
page read and write
|
||
2DFE000
|
trusted library allocation
|
page read and write
|
||
3663000
|
direct allocation
|
page read and write
|
||
13FF000
|
trusted library allocation
|
page read and write
|
||
115F000
|
heap
|
page read and write
|
||
3663000
|
direct allocation
|
page read and write
|
||
387E000
|
direct allocation
|
page read and write
|
||
13F0000
|
trusted library allocation
|
page read and write
|
||
2FDF000
|
trusted library allocation
|
page read and write
|
||
ED2000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
6350000
|
trusted library allocation
|
page read and write
|
||
3809000
|
direct allocation
|
page read and write
|
||
2E16000
|
trusted library allocation
|
page read and write
|
||
2C8000
|
unkown
|
page readonly
|
||
5F1F000
|
stack
|
page read and write
|
||
2C3000
|
unkown
|
page write copy
|
||
28F000
|
unkown
|
page readonly
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
6330000
|
trusted library allocation
|
page read and write
|
||
2C8000
|
unkown
|
page readonly
|
||
C90000
|
heap
|
page read and write
|
||
380D000
|
direct allocation
|
page read and write
|
||
3809000
|
direct allocation
|
page read and write
|
||
387E000
|
direct allocation
|
page read and write
|
||
3EEA000
|
trusted library allocation
|
page read and write
|
||
2FE5000
|
trusted library allocation
|
page read and write
|
||
2E11000
|
trusted library allocation
|
page read and write
|
||
2F8C000
|
trusted library allocation
|
page read and write
|
||
F01000
|
heap
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
DA4000
|
heap
|
page read and write
|
||
387E000
|
direct allocation
|
page read and write
|
||
535E000
|
trusted library allocation
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
2F3D000
|
trusted library allocation
|
page read and write
|
||
108E000
|
heap
|
page read and write
|
||
2DFB000
|
trusted library allocation
|
page read and write
|
||
DAC000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
3540000
|
direct allocation
|
page read and write
|
||
3809000
|
direct allocation
|
page read and write
|
||
3809000
|
direct allocation
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
5840000
|
trusted library allocation
|
page execute and read and write
|
||
5340000
|
trusted library allocation
|
page execute and read and write
|
||
201000
|
unkown
|
page execute read
|
||
ED2000
|
heap
|
page read and write
|
||
56C0000
|
heap
|
page execute and read and write
|
||
380D000
|
direct allocation
|
page read and write
|
||
1060000
|
trusted library allocation
|
page read and write
|
||
5357000
|
trusted library allocation
|
page read and write
|
||
105A000
|
trusted library allocation
|
page execute and read and write
|
||
D70000
|
heap
|
page read and write
|
||
3540000
|
direct allocation
|
page read and write
|
||
3F0E000
|
trusted library allocation
|
page read and write
|
||
1139000
|
heap
|
page read and write
|
||
6220000
|
heap
|
page read and write
|
||
156E000
|
stack
|
page read and write
|
||
2F3A000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
10F6000
|
heap
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
3663000
|
direct allocation
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
535B000
|
trusted library allocation
|
page read and write
|
||
2F2C000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
heap
|
page execute and read and write
|
||
EF1000
|
heap
|
page read and write
|
||
2F83000
|
trusted library allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
2BF000
|
unkown
|
page write copy
|
||
13B0000
|
trusted library allocation
|
page read and write
|
||
5810000
|
trusted library allocation
|
page read and write
|
||
EA5000
|
heap
|
page read and write
|
||
3540000
|
direct allocation
|
page read and write
|
||
2E33000
|
heap
|
page read and write
|
||
3540000
|
direct allocation
|
page read and write
|
||
9CF000
|
stack
|
page read and write
|
||
1062000
|
trusted library allocation
|
page read and write
|
||
533D000
|
stack
|
page read and write
|
||
36E0000
|
direct allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
36E0000
|
direct allocation
|
page read and write
|
||
DA5000
|
heap
|
page read and write
|
||
D78000
|
heap
|
page read and write
|
||
3663000
|
direct allocation
|
page read and write
|
||
EF1000
|
heap
|
page read and write
|
||
3540000
|
direct allocation
|
page read and write
|
||
621E000
|
stack
|
page read and write
|
||
6233000
|
heap
|
page read and write
|
||
6780000
|
heap
|
page read and write
|
||
3809000
|
direct allocation
|
page read and write
|
||
2B5000
|
unkown
|
page readonly
|
||
EF1000
|
heap
|
page read and write
|
||
3663000
|
direct allocation
|
page read and write
|
||
EBA000
|
heap
|
page read and write
|
||
10AE000
|
heap
|
page read and write
|
||
DBE000
|
heap
|
page read and write
|
||
387E000
|
direct allocation
|
page read and write
|
||
387E000
|
direct allocation
|
page read and write
|
||
36E0000
|
direct allocation
|
page read and write
|
||
1067000
|
trusted library allocation
|
page execute and read and write
|
||
3663000
|
direct allocation
|
page read and write
|
||
2BF000
|
unkown
|
page read and write
|
||
DA4000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
380D000
|
direct allocation
|
page read and write
|
||
103D000
|
trusted library allocation
|
page execute and read and write
|
||
B80000
|
heap
|
page read and write
|
||
2F34000
|
trusted library allocation
|
page read and write
|
||
F01000
|
heap
|
page read and write
|
||
2E60000
|
trusted library allocation
|
page read and write
|
||
380D000
|
direct allocation
|
page read and write
|
||
1078000
|
heap
|
page read and write
|
||
2E1D000
|
trusted library allocation
|
page read and write
|
||
E9B000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
DBE000
|
heap
|
page read and write
|
||
2F9B000
|
trusted library allocation
|
page read and write
|
||
2E0E000
|
trusted library allocation
|
page read and write
|
||
BE7000
|
stack
|
page read and write
|
||
3E81000
|
trusted library allocation
|
page read and write
|
||
2DF6000
|
trusted library allocation
|
page read and write
|
||
387E000
|
direct allocation
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
heap
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
2FEB000
|
trusted library allocation
|
page read and write
|
||
1033000
|
trusted library allocation
|
page execute and read and write
|
||
2E70000
|
heap
|
page read and write
|
||
36E0000
|
direct allocation
|
page read and write
|
||
2F46000
|
trusted library allocation
|
page read and write
|
||
28F000
|
unkown
|
page readonly
|
||
380D000
|
direct allocation
|
page read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
13FC000
|
trusted library allocation
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
196E000
|
stack
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
2FD8000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
5400000
|
heap
|
page read and write
|
||
3540000
|
direct allocation
|
page read and write
|
||
3809000
|
direct allocation
|
page read and write
|
||
BF0000
|
direct allocation
|
page execute and read and write
|
||
622D000
|
heap
|
page read and write
|
||
13FA000
|
trusted library allocation
|
page read and write
|
||
3F1A000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
2F29000
|
trusted library allocation
|
page read and write
|
||
2F78000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
109A000
|
heap
|
page read and write
|
||
1056000
|
trusted library allocation
|
page execute and read and write
|
||
B4E000
|
stack
|
page read and write
|
||
DC8000
|
heap
|
page read and write
|
||
1034000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
422000
|
system
|
page execute and read and write
|
||
2DF0000
|
trusted library allocation
|
page read and write
|
||
567E000
|
stack
|
page read and write
|
||
AEA000
|
stack
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
2F96000
|
trusted library allocation
|
page read and write
|
||
3EA9000
|
trusted library allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
38A000
|
stack
|
page read and write
|
||
3F05000
|
trusted library allocation
|
page read and write
|
||
2E0A000
|
trusted library allocation
|
page read and write
|
||
ED2000
|
heap
|
page read and write
|
||
36E0000
|
direct allocation
|
page read and write
|
||
380D000
|
direct allocation
|
page read and write
|
||
201000
|
unkown
|
page execute read
|
||
B0E000
|
stack
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
There are 206 hidden memdumps, click here to show them.