IOC Report
RFQ 002593810024350.bat.exe

loading gif

Files

File Path
Type
Category
Malicious
RFQ 002593810024350.bat.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\leucoryx
data
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RFQ 002593810024350.bat.exe
"C:\Users\user\Desktop\RFQ 002593810024350.bat.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\RFQ 002593810024350.bat.exe"
malicious

URLs

Name
IP
Malicious
http://ip-api.com0
unknown
http://flujoauditorias.cl
unknown
http://mail.flujoauditorias.cl
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
flujoauditorias.cl
15.235.118.15
malicious
ip-api.com
208.95.112.1
malicious
mail.flujoauditorias.cl
unknown
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
15.235.118.15
flujoauditorias.cl
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1680000
direct allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
8AF000
stack
page read and write
40BA000
heap
page read and write
61B0000
heap
page read and write
2F36000
trusted library allocation
page read and write
6198000
heap
page read and write
4001000
heap
page read and write
4000000
heap
page read and write
5520000
heap
page read and write
4353000
heap
page read and write
46E3000
direct allocation
page read and write
4001000
heap
page read and write
45C0000
direct allocation
page read and write
2EEC000
trusted library allocation
page read and write
1406000
heap
page read and write
500E000
stack
page read and write
11B0000
trusted library allocation
page read and write
401000
unkown
page execute read
4062000
heap
page read and write
4001000
heap
page read and write
2F72000
trusted library allocation
page read and write
48FE000
direct allocation
page read and write
4062000
heap
page read and write
2F5A000
trusted library allocation
page read and write
4063000
heap
page read and write
11E8000
heap
page read and write
48FE000
direct allocation
page read and write
3CEE000
heap
page read and write
4889000
direct allocation
page read and write
3F96000
heap
page read and write
1219000
heap
page read and write
40C7000
heap
page read and write
3E33000
heap
page read and write
11DB000
trusted library allocation
page execute and read and write
11C2000
trusted library allocation
page read and write
4001000
heap
page read and write
8E0000
heap
page read and write
3E39000
heap
page read and write
8EA000
heap
page read and write
48FE000
direct allocation
page read and write
2F80000
trusted library allocation
page read and write
4063000
heap
page read and write
4AB000
unkown
page readonly
4001000
heap
page read and write
74216000
unkown
page readonly
4001000
heap
page read and write
4760000
direct allocation
page read and write
4063000
heap
page read and write
4001000
heap
page read and write
46E3000
direct allocation
page read and write
4063000
heap
page read and write
160000
heap
page read and write
400000
unkown
page readonly
4001000
heap
page read and write
4889000
direct allocation
page read and write
46E3000
direct allocation
page read and write
4A7000
unkown
page read and write
1070000
trusted library allocation
page read and write
4063000
heap
page read and write
4000000
heap
page read and write
11C6000
trusted library allocation
page execute and read and write
68F0000
trusted library allocation
page execute and read and write
4001000
heap
page read and write
4001000
heap
page read and write
46E3000
direct allocation
page read and write
45C0000
direct allocation
page read and write
1095000
heap
page read and write
678E000
stack
page read and write
BE0000
heap
page read and write
3F51000
heap
page read and write
538B000
trusted library allocation
page read and write
2E40000
heap
page read and write
4001000
heap
page read and write
5AD0000
trusted library allocation
page read and write
3EF2000
heap
page read and write
40B6000
heap
page read and write
1090000
heap
page read and write
482000
unkown
page readonly
7F950000
trusted library allocation
page execute and read and write
4063000
heap
page read and write
11D2000
trusted library allocation
page read and write
2EA5000
trusted library allocation
page read and write
45C0000
direct allocation
page read and write
4001000
heap
page read and write
53A1000
trusted library allocation
page read and write
689F000
stack
page read and write
6790000
trusted library allocation
page read and write
3E2E000
heap
page read and write
3F5A000
heap
page read and write
1262000
heap
page read and write
74201000
unkown
page execute read
4001000
heap
page read and write
8EE000
heap
page read and write
12AB000
heap
page read and write
2DEE000
stack
page read and write
8B4000
stack
page read and write
4001000
heap
page read and write
4063000
heap
page read and write
4889000
direct allocation
page read and write
4063000
heap
page read and write
4062000
heap
page read and write
1400000
heap
page read and write
654D000
stack
page read and write
1083000
trusted library allocation
page execute and read and write
2F6E000
trusted library allocation
page read and write
4760000
direct allocation
page read and write
2F70000
heap
page read and write
2F74000
heap
page read and write
53B2000
trusted library allocation
page read and write
15EE000
stack
page read and write
4063000
heap
page read and write
11A0000
heap
page read and write
11AE000
stack
page read and write
11C0000
trusted library allocation
page read and write
592E000
stack
page read and write
3D50000
heap
page read and write
2E3C000
stack
page read and write
4055000
heap
page read and write
40C7000
heap
page read and write
53D0000
trusted library allocation
page read and write
B90000
heap
page read and write
3F96000
heap
page read and write
3E26000
heap
page read and write
1C0000
heap
page read and write
5523000
heap
page read and write
3F96000
heap
page read and write
5510000
heap
page read and write
48FE000
direct allocation
page read and write
6800000
trusted library allocation
page read and write
48FE000
direct allocation
page read and write
488D000
direct allocation
page read and write
2F5E000
trusted library allocation
page read and write
482000
unkown
page readonly
550D000
stack
page read and write
2DF0000
heap
page execute and read and write
668E000
stack
page read and write
4063000
heap
page read and write
4001000
heap
page read and write
488D000
direct allocation
page read and write
53A6000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
4063000
heap
page read and write
488D000
direct allocation
page read and write
6190000
heap
page read and write
2CEE000
stack
page read and write
4001000
heap
page read and write
7421D000
unkown
page read and write
5AD4000
trusted library allocation
page read and write
6B30000
heap
page read and write
1675000
heap
page read and write
4063000
heap
page read and write
2F30000
trusted library allocation
page read and write
4760000
direct allocation
page read and write
488D000
direct allocation
page read and write
4001000
heap
page read and write
16F0000
heap
page read and write
53AD000
trusted library allocation
page read and write
3C50000
heap
page read and write
4001000
heap
page read and write
11D0000
trusted library allocation
page read and write
4001000
heap
page read and write
3EF2000
heap
page read and write
4063000
heap
page read and write
4001000
heap
page read and write
1084000
trusted library allocation
page read and write
40B7000
heap
page read and write
4063000
heap
page read and write
15AF000
stack
page read and write
45C0000
direct allocation
page read and write
4063000
heap
page read and write
2F87000
trusted library allocation
page read and write
2EEA000
trusted library allocation
page read and write
12BB000
heap
page read and write
3E2A000
heap
page read and write
4760000
direct allocation
page read and write
3BB0000
heap
page read and write
6196000
heap
page read and write
3ED7000
trusted library allocation
page read and write
3C51000
heap
page read and write
11BD000
trusted library allocation
page execute and read and write
9A000
stack
page read and write
539A000
trusted library allocation
page read and write
3F51000
heap
page read and write
4063000
heap
page read and write
5350000
trusted library allocation
page execute and read and write
6797000
trusted library allocation
page read and write
61ED000
heap
page read and write
3F50000
heap
page read and write
4001000
heap
page read and write
4063000
heap
page read and write
110000
heap
page read and write
572C000
stack
page read and write
61B9000
heap
page read and write
2F48000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
45C0000
direct allocation
page read and write
5370000
trusted library allocation
page read and write
67FD000
stack
page read and write
3ACB000
heap
page read and write
4E78000
trusted library allocation
page read and write
3ABF000
stack
page read and write
74200000
unkown
page readonly
4063000
heap
page read and write
4001000
heap
page read and write
4001000
heap
page read and write
5480000
heap
page execute and read and write
4001000
heap
page read and write
1650000
heap
page read and write
89F000
stack
page read and write
4451000
heap
page read and write
46E3000
direct allocation
page read and write
4001000
heap
page read and write
5380000
trusted library allocation
page read and write
664E000
stack
page read and write
1217000
heap
page read and write
4063000
heap
page read and write
54CE000
stack
page read and write
36BE000
stack
page read and write
45C0000
direct allocation
page read and write
4063000
heap
page read and write
4063000
heap
page read and write
4001000
heap
page read and write
48FE000
direct allocation
page read and write
3CCF000
heap
page read and write
4889000
direct allocation
page read and write
B2A000
stack
page read and write
11E0000
heap
page read and write
5AB0000
trusted library allocation
page read and write
6BA0000
heap
page read and write
2E71000
trusted library allocation
page read and write
108D000
trusted library allocation
page execute and read and write
490000
unkown
page write copy
1670000
heap
page read and write
61B5000
heap
page read and write
5530000
heap
page read and write
162E000
stack
page read and write
3E99000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
40B6000
heap
page execute and read and write
919000
heap
page read and write
5A6E000
stack
page read and write
4760000
direct allocation
page read and write
5392000
trusted library allocation
page read and write
2E60000
heap
page read and write
539E000
trusted library allocation
page read and write
13F0000
trusted library allocation
page read and write
4063000
heap
page read and write
4063000
heap
page read and write
400000
unkown
page readonly
120A000
heap
page read and write
4001000
heap
page read and write
488D000
direct allocation
page read and write
67B0000
trusted library allocation
page execute and read and write
4889000
direct allocation
page read and write
4001000
heap
page read and write
1258000
heap
page read and write
488D000
direct allocation
page read and write
100000
heap
page read and write
538E000
trusted library allocation
page read and write
4AB000
unkown
page readonly
2EFA000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
4001000
heap
page read and write
4001000
heap
page read and write
4063000
heap
page read and write
1AE000
stack
page read and write
4760000
direct allocation
page read and write
1268000
heap
page read and write
7421F000
unkown
page readonly
4001000
heap
page read and write
4001000
heap
page read and write
3E14000
heap
page read and write
EF9000
stack
page read and write
2F60000
trusted library allocation
page read and write
15E000
stack
page read and write
5AC7000
trusted library allocation
page read and write
4063000
heap
page read and write
4001000
heap
page read and write
400000
system
page execute and read and write
4063000
heap
page read and write
3E23000
heap
page read and write
5386000
trusted library allocation
page read and write
582E000
stack
page read and write
4063000
heap
page read and write
1285000
heap
page read and write
1080000
trusted library allocation
page read and write
542C000
stack
page read and write
61C3000
heap
page read and write
3EF2000
heap
page read and write
4063000
heap
page read and write
46E3000
direct allocation
page read and write
11CA000
trusted library allocation
page execute and read and write
2F50000
trusted library allocation
page read and write
401000
unkown
page execute read
11D7000
trusted library allocation
page execute and read and write
490000
unkown
page read and write
4063000
heap
page read and write
3EF2000
heap
page read and write
4889000
direct allocation
page read and write
4063000
heap
page read and write
4001000
heap
page read and write
67A0000
trusted library allocation
page read and write
3F45000
heap
page read and write
596E000
stack
page read and write
There are 296 hidden memdumps, click here to show them.