Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
RFQ 002593810024350.bat.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\leucoryx
|
data
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\RFQ 002593810024350.bat.exe
|
"C:\Users\user\Desktop\RFQ 002593810024350.bat.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\RFQ 002593810024350.bat.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://ip-api.com0
|
unknown
|
||
http://flujoauditorias.cl
|
unknown
|
||
http://mail.flujoauditorias.cl
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://ip-api.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
flujoauditorias.cl
|
15.235.118.15
|
||
ip-api.com
|
208.95.112.1
|
||
mail.flujoauditorias.cl
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
15.235.118.15
|
flujoauditorias.cl
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1680000
|
direct allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
8AF000
|
stack
|
page read and write
|
||
40BA000
|
heap
|
page read and write
|
||
61B0000
|
heap
|
page read and write
|
||
2F36000
|
trusted library allocation
|
page read and write
|
||
6198000
|
heap
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
5520000
|
heap
|
page read and write
|
||
4353000
|
heap
|
page read and write
|
||
46E3000
|
direct allocation
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
2EEC000
|
trusted library allocation
|
page read and write
|
||
1406000
|
heap
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
11B0000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4062000
|
heap
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
2F72000
|
trusted library allocation
|
page read and write
|
||
48FE000
|
direct allocation
|
page read and write
|
||
4062000
|
heap
|
page read and write
|
||
2F5A000
|
trusted library allocation
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
11E8000
|
heap
|
page read and write
|
||
48FE000
|
direct allocation
|
page read and write
|
||
3CEE000
|
heap
|
page read and write
|
||
4889000
|
direct allocation
|
page read and write
|
||
3F96000
|
heap
|
page read and write
|
||
1219000
|
heap
|
page read and write
|
||
40C7000
|
heap
|
page read and write
|
||
3E33000
|
heap
|
page read and write
|
||
11DB000
|
trusted library allocation
|
page execute and read and write
|
||
11C2000
|
trusted library allocation
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
3E39000
|
heap
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
48FE000
|
direct allocation
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
4001000
|
heap
|
page read and write
|
||
74216000
|
unkown
|
page readonly
|
||
4001000
|
heap
|
page read and write
|
||
4760000
|
direct allocation
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
46E3000
|
direct allocation
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4001000
|
heap
|
page read and write
|
||
4889000
|
direct allocation
|
page read and write
|
||
46E3000
|
direct allocation
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
11C6000
|
trusted library allocation
|
page execute and read and write
|
||
68F0000
|
trusted library allocation
|
page execute and read and write
|
||
4001000
|
heap
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
46E3000
|
direct allocation
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
1095000
|
heap
|
page read and write
|
||
678E000
|
stack
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
3F51000
|
heap
|
page read and write
|
||
538B000
|
trusted library allocation
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
3EF2000
|
heap
|
page read and write
|
||
40B6000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
7F950000
|
trusted library allocation
|
page execute and read and write
|
||
4063000
|
heap
|
page read and write
|
||
11D2000
|
trusted library allocation
|
page read and write
|
||
2EA5000
|
trusted library allocation
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
53A1000
|
trusted library allocation
|
page read and write
|
||
689F000
|
stack
|
page read and write
|
||
6790000
|
trusted library allocation
|
page read and write
|
||
3E2E000
|
heap
|
page read and write
|
||
3F5A000
|
heap
|
page read and write
|
||
1262000
|
heap
|
page read and write
|
||
74201000
|
unkown
|
page execute read
|
||
4001000
|
heap
|
page read and write
|
||
8EE000
|
heap
|
page read and write
|
||
12AB000
|
heap
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
4889000
|
direct allocation
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
4062000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
654D000
|
stack
|
page read and write
|
||
1083000
|
trusted library allocation
|
page execute and read and write
|
||
2F6E000
|
trusted library allocation
|
page read and write
|
||
4760000
|
direct allocation
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
53B2000
|
trusted library allocation
|
page read and write
|
||
15EE000
|
stack
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
11AE000
|
stack
|
page read and write
|
||
11C0000
|
trusted library allocation
|
page read and write
|
||
592E000
|
stack
|
page read and write
|
||
3D50000
|
heap
|
page read and write
|
||
2E3C000
|
stack
|
page read and write
|
||
4055000
|
heap
|
page read and write
|
||
40C7000
|
heap
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
3F96000
|
heap
|
page read and write
|
||
3E26000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
5523000
|
heap
|
page read and write
|
||
3F96000
|
heap
|
page read and write
|
||
5510000
|
heap
|
page read and write
|
||
48FE000
|
direct allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
48FE000
|
direct allocation
|
page read and write
|
||
488D000
|
direct allocation
|
page read and write
|
||
2F5E000
|
trusted library allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
550D000
|
stack
|
page read and write
|
||
2DF0000
|
heap
|
page execute and read and write
|
||
668E000
|
stack
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
488D000
|
direct allocation
|
page read and write
|
||
53A6000
|
trusted library allocation
|
page read and write
|
||
3E71000
|
trusted library allocation
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
488D000
|
direct allocation
|
page read and write
|
||
6190000
|
heap
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
7421D000
|
unkown
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
heap
|
page read and write
|
||
1675000
|
heap
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
4760000
|
direct allocation
|
page read and write
|
||
488D000
|
direct allocation
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
53AD000
|
trusted library allocation
|
page read and write
|
||
3C50000
|
heap
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
3EF2000
|
heap
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
1084000
|
trusted library allocation
|
page read and write
|
||
40B7000
|
heap
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
15AF000
|
stack
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
2F87000
|
trusted library allocation
|
page read and write
|
||
2EEA000
|
trusted library allocation
|
page read and write
|
||
12BB000
|
heap
|
page read and write
|
||
3E2A000
|
heap
|
page read and write
|
||
4760000
|
direct allocation
|
page read and write
|
||
3BB0000
|
heap
|
page read and write
|
||
6196000
|
heap
|
page read and write
|
||
3ED7000
|
trusted library allocation
|
page read and write
|
||
3C51000
|
heap
|
page read and write
|
||
11BD000
|
trusted library allocation
|
page execute and read and write
|
||
9A000
|
stack
|
page read and write
|
||
539A000
|
trusted library allocation
|
page read and write
|
||
3F51000
|
heap
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
5350000
|
trusted library allocation
|
page execute and read and write
|
||
6797000
|
trusted library allocation
|
page read and write
|
||
61ED000
|
heap
|
page read and write
|
||
3F50000
|
heap
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
572C000
|
stack
|
page read and write
|
||
61B9000
|
heap
|
page read and write
|
||
2F48000
|
trusted library allocation
|
page read and write
|
||
5360000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
trusted library allocation
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
5370000
|
trusted library allocation
|
page read and write
|
||
67FD000
|
stack
|
page read and write
|
||
3ACB000
|
heap
|
page read and write
|
||
4E78000
|
trusted library allocation
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
74200000
|
unkown
|
page readonly
|
||
4063000
|
heap
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
5480000
|
heap
|
page execute and read and write
|
||
4001000
|
heap
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
4451000
|
heap
|
page read and write
|
||
46E3000
|
direct allocation
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
5380000
|
trusted library allocation
|
page read and write
|
||
664E000
|
stack
|
page read and write
|
||
1217000
|
heap
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
48FE000
|
direct allocation
|
page read and write
|
||
3CCF000
|
heap
|
page read and write
|
||
4889000
|
direct allocation
|
page read and write
|
||
B2A000
|
stack
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
6BA0000
|
heap
|
page read and write
|
||
2E71000
|
trusted library allocation
|
page read and write
|
||
108D000
|
trusted library allocation
|
page execute and read and write
|
||
490000
|
unkown
|
page write copy
|
||
1670000
|
heap
|
page read and write
|
||
61B5000
|
heap
|
page read and write
|
||
5530000
|
heap
|
page read and write
|
||
162E000
|
stack
|
page read and write
|
||
3E99000
|
trusted library allocation
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
40B6000
|
heap
|
page execute and read and write
|
||
919000
|
heap
|
page read and write
|
||
5A6E000
|
stack
|
page read and write
|
||
4760000
|
direct allocation
|
page read and write
|
||
5392000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
trusted library allocation
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
120A000
|
heap
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
488D000
|
direct allocation
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page execute and read and write
|
||
4889000
|
direct allocation
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
1258000
|
heap
|
page read and write
|
||
488D000
|
direct allocation
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
538E000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
2EFA000
|
trusted library allocation
|
page read and write
|
||
6B60000
|
trusted library allocation
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
1AE000
|
stack
|
page read and write
|
||
4760000
|
direct allocation
|
page read and write
|
||
1268000
|
heap
|
page read and write
|
||
7421F000
|
unkown
|
page readonly
|
||
4001000
|
heap
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
3E14000
|
heap
|
page read and write
|
||
EF9000
|
stack
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
15E000
|
stack
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
4063000
|
heap
|
page read and write
|
||
3E23000
|
heap
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
1285000
|
heap
|
page read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
542C000
|
stack
|
page read and write
|
||
61C3000
|
heap
|
page read and write
|
||
3EF2000
|
heap
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
46E3000
|
direct allocation
|
page read and write
|
||
11CA000
|
trusted library allocation
|
page execute and read and write
|
||
2F50000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
11D7000
|
trusted library allocation
|
page execute and read and write
|
||
490000
|
unkown
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
3EF2000
|
heap
|
page read and write
|
||
4889000
|
direct allocation
|
page read and write
|
||
4063000
|
heap
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
67A0000
|
trusted library allocation
|
page read and write
|
||
3F45000
|
heap
|
page read and write
|
||
596E000
|
stack
|
page read and write
|
There are 296 hidden memdumps, click here to show them.