IOC Report
l5u4ezxr.u51.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\l5u4ezxr.u51.exe
"C:\Users\user\Desktop\l5u4ezxr.u51.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
malicious

URLs

Name
IP
Malicious
tenseddrywsqio.shop
malicious
condedqpwqm.shop
malicious
https://tenseddrywsqio.shop/api
104.21.69.149
malicious
locatedblsoqp.shop
malicious
caffegclasiqwp.shop
malicious
millyscroqwp.shop
malicious
https://locatedblsoqp.shop/6
unknown
malicious
stagedchheiqwo.shop
malicious
https://locatedblsoqp.shop/api
188.114.96.3
malicious
https://traineiwnqo.shop/api
188.114.96.3
malicious
https://locatedblsoqp.shop/
unknown
malicious
stamppreewntnq.shop
malicious
evoliutwoqm.shop
malicious
https://tenseddrywsqio.shop/M
unknown
malicious
traineiwnqo.shop
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://api.loganalytics.iohttps://api.loganalytics.usencountered
unknown
https://datalake.azure.net/https://graph.microsoft.us/servicebus.chinacloudapi.cndocuments.microsoft
unknown
https://vault.azure.net/mysql.database.azure.comhttps://cosmos.azure.comNtQuerySystemInformationAllo
unknown
https://traineiwnqo.shop/api_
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://login.microsoftonline.com/METRIC_AZURERM_API_REQUEST_BUCKETSlabel
unknown
https://traineiwnqo.shop/apibul
unknown
https://gallery.usgovcloudapi.net/mariadb.database.usgovcloudapi.netdev.azuresynapse.usgovcloudapi.n
unknown
https://management.azure.comfailed
unknown
https://traineiwnqo.shop/fXx
unknown
https://traineiwnqo.shop/apiK
unknown
https://traineiwnqo.shop/.
unknown
https://traineiwnqo.shop:443/apii
unknown
https://ossrdbms-aad.database.chinacloudapi.cned25519:
unknown
https://traineiwnqo.shop/
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
locatedblsoqp.shop
188.114.96.3
malicious
tenseddrywsqio.shop
104.21.69.149
malicious
traineiwnqo.shop
188.114.96.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
locatedblsoqp.shop
European Union
malicious
104.21.69.149
tenseddrywsqio.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2496000
direct allocation
page read and write
malicious
22B3000
direct allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2786000
direct allocation
page read and write
154A000
unkown
page read and write
581000
unkown
page execute read
2484000
direct allocation
page read and write
1FE000
stack
page read and write
2404000
direct allocation
page read and write
2418000
direct allocation
page read and write
2263E000
stack
page read and write
27DC000
heap
page read and write
206C000
direct allocation
page read and write
153A000
unkown
page read and write
227E000
direct allocation
page read and write
14F6000
unkown
page write copy
520000
heap
page read and write
2436000
direct allocation
page read and write
2392000
direct allocation
page read and write
2431000
direct allocation
page read and write
2102000
direct allocation
page read and write
202A000
direct allocation
page read and write
10B4000
unkown
page readonly
2000000
direct allocation
page read and write
241C000
direct allocation
page read and write
154D000
unkown
page write copy
23C6000
direct allocation
page read and write
20C8000
direct allocation
page read and write
202E000
direct allocation
page read and write
2146000
direct allocation
page read and write
2320000
direct allocation
page read and write
1573000
unkown
page read and write
204E000
direct allocation
page read and write
1579000
unkown
page read and write
2022000
direct allocation
page read and write
2870000
heap
page read and write
2871000
heap
page read and write
20E8000
direct allocation
page read and write
210C000
direct allocation
page read and write
2424000
direct allocation
page read and write
2126000
direct allocation
page read and write
278C000
stack
page read and write
2488000
direct allocation
page read and write
157E000
unkown
page readonly
157D000
unkown
page write copy
2068000
direct allocation
page read and write
2004000
direct allocation
page read and write
2334000
direct allocation
page read and write
434E000
stack
page read and write
424D000
stack
page read and write
23DE000
direct allocation
page read and write
20C6000
direct allocation
page read and write
234A000
direct allocation
page read and write
2869000
heap
page read and write
2028000
direct allocation
page read and write
27FD000
heap
page read and write
2082000
direct allocation
page read and write
27FD000
heap
page read and write
14F2000
unkown
page read and write
2136000
direct allocation
page read and write
448000
remote allocation
page execute and read and write
2408000
direct allocation
page read and write
27CD000
heap
page read and write
15E4000
unkown
page readonly
1FE0000
direct allocation
page read and write
27FA000
heap
page read and write
234C000
direct allocation
page read and write
2152000
direct allocation
page read and write
1046000
unkown
page readonly
22589000
direct allocation
page read and write
23F0000
direct allocation
page read and write
2492000
direct allocation
page read and write
2059000
direct allocation
page read and write
2400000
direct allocation
page read and write
2226000
direct allocation
page read and write
22584000
direct allocation
page read and write
2428000
direct allocation
page read and write
207A000
direct allocation
page read and write
2422000
direct allocation
page read and write
225E4000
direct allocation
page read and write
2410000
direct allocation
page read and write
2020000
direct allocation
page read and write
2816000
heap
page read and write
2174000
direct allocation
page read and write
225F8000
direct allocation
page read and write
26CE000
stack
page read and write
17AD000
stack
page read and write
2064000
direct allocation
page read and write
236E000
direct allocation
page read and write
242A000
direct allocation
page read and write
2110000
direct allocation
page read and write
1065000
unkown
page readonly
581000
unkown
page execute read
23F8000
direct allocation
page read and write
23F6000
direct allocation
page read and write
212E000
direct allocation
page read and write
210A000
direct allocation
page read and write
2346000
direct allocation
page read and write
1084000
unkown
page readonly
2233D000
stack
page read and write
2849000
heap
page read and write
497F000
stack
page read and write
2494000
direct allocation
page read and write
2072000
direct allocation
page read and write
1BF0000
heap
page read and write
2414000
direct allocation
page read and write
157E000
unkown
page readonly
27D2000
heap
page read and write
1BEE000
stack
page read and write
216E000
direct allocation
page read and write
150000
heap
page read and write
209A000
direct allocation
page read and write
213C000
direct allocation
page read and write
2336000
direct allocation
page read and write
C9D000
unkown
page readonly
1079000
unkown
page readonly
2330000
direct allocation
page read and write
1084000
unkown
page readonly
233A000
direct allocation
page read and write
22AC000
direct allocation
page read and write
23B8000
direct allocation
page read and write
2006000
direct allocation
page read and write
234E000
direct allocation
page read and write
23D6000
direct allocation
page read and write
1046000
unkown
page readonly
AC000
stack
page read and write
2438000
direct allocation
page read and write
211C000
direct allocation
page read and write
20C0000
direct allocation
page read and write
107C000
unkown
page readonly
580000
unkown
page readonly
15E4000
unkown
page readonly
210E000
direct allocation
page read and write
540000
heap
page read and write
2370000
direct allocation
page read and write
232E000
direct allocation
page read and write
2046000
direct allocation
page read and write
2426000
direct allocation
page read and write
2026000
direct allocation
page read and write
1A10000
heap
page read and write
217B000
direct allocation
page read and write
20BC000
direct allocation
page read and write
153D000
unkown
page write copy
2852000
heap
page read and write
2124000
direct allocation
page read and write
270E000
stack
page read and write
23E2000
direct allocation
page read and write
2247D000
stack
page read and write
2122000
direct allocation
page read and write
2850000
heap
page read and write
2710000
heap
page read and write
2324000
direct allocation
page read and write
22BC000
direct allocation
page read and write
274C000
direct allocation
page read and write
225C6000
direct allocation
page read and write
211E000
direct allocation
page read and write
2740000
remote allocation
page read and write
27F1000
heap
page read and write
10B4000
unkown
page readonly
2076000
direct allocation
page read and write
1B90000
direct allocation
page read and write
23F2000
direct allocation
page read and write
20CA000
direct allocation
page read and write
1C2C000
heap
page read and write
23F4000
direct allocation
page read and write
237C000
direct allocation
page read and write
222FE000
stack
page read and write
2342000
direct allocation
page read and write
2412000
direct allocation
page read and write
1065000
unkown
page readonly
228C000
direct allocation
page read and write
14F7000
unkown
page read and write
240E000
direct allocation
page read and write
20DC000
direct allocation
page read and write
2300000
direct allocation
page read and write
2310000
direct allocation
page read and write
23A4000
direct allocation
page read and write
14F8000
unkown
page write copy
202C000
direct allocation
page read and write
414F000
stack
page read and write
2066000
direct allocation
page read and write
23C4000
direct allocation
page read and write
212C000
direct allocation
page read and write
107C000
unkown
page readonly
2086000
direct allocation
page read and write
2030000
direct allocation
page read and write
20CE000
direct allocation
page read and write
107F000
unkown
page readonly
2140000
direct allocation
page read and write
2180000
direct allocation
page read and write
153E000
unkown
page read and write
2130000
direct allocation
page read and write
58D000
stack
page read and write
155B000
unkown
page read and write
1A0000
heap
page read and write
2268000
direct allocation
page read and write
231E000
direct allocation
page read and write
2849000
heap
page read and write
493E000
stack
page read and write
1B28000
direct allocation
page read and write
14F0000
unkown
page write copy
20BA000
direct allocation
page read and write
1F9D000
stack
page read and write
23AE000
direct allocation
page read and write
2238000
direct allocation
page read and write
C9D000
unkown
page readonly
27D7000
heap
page read and write
157D000
unkown
page write copy
580000
unkown
page readonly
EC000
stack
page read and write
2084000
direct allocation
page read and write
232A000
direct allocation
page read and write
478D000
stack
page read and write
2715000
heap
page read and write
26C8000
direct allocation
page read and write
2380000
direct allocation
page read and write
10AC000
unkown
page readonly
239A000
direct allocation
page read and write
200C000
direct allocation
page read and write
2120000
direct allocation
page read and write
27B7000
heap
page read and write
2002000
direct allocation
page read and write
2070000
direct allocation
page read and write
2128000
direct allocation
page read and write
2386000
direct allocation
page read and write
22580000
direct allocation
page read and write
23A6000
direct allocation
page read and write
1B15000
heap
page read and write
27FD000
heap
page read and write
1FDD000
stack
page read and write
2080000
direct allocation
page read and write
27F4000
heap
page read and write
220FF000
stack
page read and write
1BA0000
direct allocation
page read and write
23BC000
direct allocation
page read and write
2062000
direct allocation
page read and write
2350000
direct allocation
page read and write
241A000
direct allocation
page read and write
207C000
direct allocation
page read and write
10AC000
unkown
page readonly
208E000
direct allocation
page read and write
203F000
direct allocation
page read and write
14FB000
unkown
page write copy
1087000
unkown
page readonly
2314000
direct allocation
page read and write
27B0000
heap
page read and write
2060000
direct allocation
page read and write
2416000
direct allocation
page read and write
48CF000
stack
page read and write
1B10000
heap
page read and write
20D3000
direct allocation
page read and write
23FA000
direct allocation
page read and write
2338000
direct allocation
page read and write
19E000
stack
page read and write
2273F000
stack
page read and write
23FC000
direct allocation
page read and write
2390000
direct allocation
page read and write
238C000
direct allocation
page read and write
2406000
direct allocation
page read and write
2257F000
stack
page read and write
14F0000
unkown
page write copy
205C000
direct allocation
page read and write
581000
unkown
page execute read
2740000
remote allocation
page read and write
107F000
unkown
page readonly
1082000
unkown
page readonly
1D20000
direct allocation
page read and write
2740000
remote allocation
page read and write
27CB000
heap
page read and write
221FF000
stack
page read and write
204C000
direct allocation
page read and write
1079000
unkown
page readonly
232C000
direct allocation
page read and write
22A4000
direct allocation
page read and write
1549000
unkown
page write copy
14FA000
unkown
page read and write
47CE000
stack
page read and write
233F000
direct allocation
page read and write
154F000
unkown
page read and write
2108000
direct allocation
page read and write
231A000
direct allocation
page read and write
239E000
direct allocation
page read and write
1B20000
direct allocation
page read and write
2280000
direct allocation
page read and write
206A000
direct allocation
page read and write
2243F000
stack
page read and write
1C20000
heap
page read and write
1087000
unkown
page readonly
2024000
direct allocation
page read and write
1C00000
heap
page read and write
1082000
unkown
page readonly
2448000
direct allocation
page read and write
23EE000
direct allocation
page read and write
16AC000
stack
page read and write
23D4000
direct allocation
page read and write
There are 285 hidden memdumps, click here to show them.