Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
uFzZ48M67c.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\lards
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\uFzZ48M67c.exe
|
"C:\Users\user\Desktop\uFzZ48M67c.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\uFzZ48M67c.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://flujoauditorias.cl
|
unknown
|
||
http://ip-api.com/line/?fields=hostings
|
unknown
|
||
http://mail.flujoauditorias.cl
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://ip-api.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
flujoauditorias.cl
|
15.235.118.15
|
||
ip-api.com
|
208.95.112.1
|
||
mail.flujoauditorias.cl
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
15.235.118.15
|
flujoauditorias.cl
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
system
|
page execute and read and write
|
||
16A0000
|
direct allocation
|
page read and write
|
||
573E000
|
stack
|
page read and write
|
||
42C7000
|
trusted library allocation
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
3B80000
|
heap
|
page read and write
|
||
4593000
|
direct allocation
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
59BC000
|
stack
|
page read and write
|
||
3DFB000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
6A34000
|
trusted library allocation
|
page read and write
|
||
1780000
|
trusted library allocation
|
page read and write
|
||
3EFF000
|
heap
|
page read and write
|
||
473D000
|
direct allocation
|
page read and write
|
||
32DA000
|
trusted library allocation
|
page read and write
|
||
A1D000
|
heap
|
page read and write
|
||
151E000
|
heap
|
page read and write
|
||
3EFD000
|
heap
|
page read and write
|
||
4593000
|
direct allocation
|
page read and write
|
||
4470000
|
direct allocation
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
4289000
|
trusted library allocation
|
page read and write
|
||
1477000
|
trusted library allocation
|
page execute and read and write
|
||
3E59000
|
heap
|
page read and write
|
||
3ED0000
|
heap
|
page read and write
|
||
4593000
|
direct allocation
|
page read and write
|
||
3F74000
|
heap
|
page read and write
|
||
3EFF000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
3F75000
|
heap
|
page read and write
|
||
57A0000
|
heap
|
page read and write
|
||
336F000
|
trusted library allocation
|
page read and write
|
||
6BA0000
|
trusted library allocation
|
page execute and read and write
|
||
1620000
|
heap
|
page read and write
|
||
3EFE000
|
heap
|
page read and write
|
||
1466000
|
trusted library allocation
|
page execute and read and write
|
||
3EDA000
|
heap
|
page read and write
|
||
47AE000
|
direct allocation
|
page read and write
|
||
161E000
|
stack
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
1537000
|
heap
|
page read and write
|
||
4470000
|
direct allocation
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
DDA000
|
stack
|
page read and write
|
||
10F8000
|
stack
|
page read and write
|
||
17BD000
|
trusted library allocation
|
page read and write
|
||
691E000
|
stack
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
7F4C0000
|
trusted library allocation
|
page execute and read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
6B4E000
|
stack
|
page read and write
|
||
3EFF000
|
heap
|
page read and write
|
||
335D000
|
trusted library allocation
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
535D000
|
stack
|
page read and write
|
||
15A9000
|
heap
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
1444000
|
trusted library allocation
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
1790000
|
trusted library allocation
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
3D58000
|
heap
|
page read and write
|
||
3EFC000
|
heap
|
page read and write
|
||
15DE000
|
stack
|
page read and write
|
||
47AE000
|
direct allocation
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
3340000
|
trusted library allocation
|
page read and write
|
||
146A000
|
trusted library allocation
|
page execute and read and write
|
||
492000
|
unkown
|
page read and write
|
||
47AE000
|
direct allocation
|
page read and write
|
||
3B81000
|
heap
|
page read and write
|
||
1472000
|
trusted library allocation
|
page read and write
|
||
3EE2000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
1140000
|
heap
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
4470000
|
direct allocation
|
page read and write
|
||
47AE000
|
direct allocation
|
page read and write
|
||
4593000
|
direct allocation
|
page read and write
|
||
3261000
|
trusted library allocation
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
1706000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
6420000
|
heap
|
page read and write
|
||
3E2E000
|
heap
|
page read and write
|
||
3C1E000
|
heap
|
page read and write
|
||
1770000
|
heap
|
page execute and read and write
|
||
473D000
|
direct allocation
|
page read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
6A50000
|
trusted library allocation
|
page read and write
|
||
645B000
|
heap
|
page read and write
|
||
6A40000
|
trusted library allocation
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
3EF6000
|
heap
|
page read and write
|
||
56DC000
|
stack
|
page read and write
|
||
6DE0000
|
heap
|
page read and write
|
||
5CFF000
|
stack
|
page read and write
|
||
3E37000
|
heap
|
page read and write
|
||
47AE000
|
direct allocation
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
3320000
|
trusted library allocation
|
page read and write
|
||
473D000
|
direct allocation
|
page read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
4A8000
|
unkown
|
page read and write
|
||
3BFF000
|
heap
|
page read and write
|
||
58A0000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
4739000
|
direct allocation
|
page read and write
|
||
4739000
|
direct allocation
|
page read and write
|
||
4593000
|
direct allocation
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
1700000
|
heap
|
page read and write
|
||
145D000
|
trusted library allocation
|
page execute and read and write
|
||
5ABE000
|
stack
|
page read and write
|
||
4261000
|
trusted library allocation
|
page read and write
|
||
6A1E000
|
stack
|
page read and write
|
||
4739000
|
direct allocation
|
page read and write
|
||
32E2000
|
trusted library allocation
|
page read and write
|
||
179E000
|
trusted library allocation
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
1796000
|
trusted library allocation
|
page read and write
|
||
7050000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
15DD000
|
heap
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
3EFF000
|
heap
|
page read and write
|
||
3D80000
|
heap
|
page read and write
|
||
32DC000
|
trusted library allocation
|
page read and write
|
||
5BBE000
|
stack
|
page read and write
|
||
179B000
|
trusted library allocation
|
page read and write
|
||
58B0000
|
heap
|
page execute and read and write
|
||
6A27000
|
trusted library allocation
|
page read and write
|
||
3E84000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
3D46000
|
heap
|
page read and write
|
||
334A000
|
trusted library allocation
|
page read and write
|
||
6A30000
|
trusted library allocation
|
page read and write
|
||
577E000
|
stack
|
page read and write
|
||
428D000
|
heap
|
page read and write
|
||
47AE000
|
direct allocation
|
page read and write
|
||
1690000
|
heap
|
page read and write
|
||
1440000
|
trusted library allocation
|
page read and write
|
||
17B1000
|
trusted library allocation
|
page read and write
|
||
642A000
|
heap
|
page read and write
|
||
3361000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
3EE3000
|
heap
|
page read and write
|
||
3375000
|
trusted library allocation
|
page read and write
|
||
3EF2000
|
heap
|
page read and write
|
||
3DE7000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
6440000
|
heap
|
page read and write
|
||
11DF000
|
stack
|
page read and write
|
||
35DE000
|
stack
|
page read and write
|
||
3326000
|
trusted library allocation
|
page read and write
|
||
4470000
|
direct allocation
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
473D000
|
direct allocation
|
page read and write
|
||
15D7000
|
heap
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
473D000
|
direct allocation
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
17A2000
|
trusted library allocation
|
page read and write
|
||
491000
|
unkown
|
page write copy
|
||
4739000
|
direct allocation
|
page read and write
|
||
334C000
|
trusted library allocation
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
6AAE000
|
stack
|
page read and write
|
||
4739000
|
direct allocation
|
page read and write
|
||
3DF6000
|
heap
|
page read and write
|
||
4470000
|
direct allocation
|
page read and write
|
||
17E0000
|
trusted library allocation
|
page read and write
|
||
39EC000
|
heap
|
page read and write
|
||
105000
|
heap
|
page read and write
|
||
17D0000
|
trusted library allocation
|
page read and write
|
||
6E10000
|
trusted library allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
3DD9000
|
heap
|
page read and write
|
||
9EA000
|
heap
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3350000
|
trusted library allocation
|
page read and write
|
||
67DE000
|
stack
|
page read and write
|
||
39DF000
|
stack
|
page read and write
|
||
3DF7000
|
heap
|
page read and write
|
||
68DE000
|
stack
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
3EFE000
|
heap
|
page read and write
|
||
17B6000
|
trusted library allocation
|
page read and write
|
||
1443000
|
trusted library allocation
|
page execute and read and write
|
||
152A000
|
heap
|
page read and write
|
||
3338000
|
trusted library allocation
|
page read and write
|
||
3EFE000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
A1D000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
32EA000
|
trusted library allocation
|
page read and write
|
||
3E80000
|
heap
|
page execute and read and write
|
||
3D86000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
144D000
|
trusted library allocation
|
page execute and read and write
|
||
9D5000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
1534000
|
heap
|
page read and write
|
||
17AE000
|
trusted library allocation
|
page read and write
|
||
3D76000
|
heap
|
page read and write
|
||
3ED1000
|
heap
|
page read and write
|
||
9EE000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
3D70000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
642C000
|
heap
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
3EFE000
|
heap
|
page read and write
|
||
1760000
|
trusted library allocation
|
page read and write
|
||
428B000
|
heap
|
page read and write
|
||
6A47000
|
trusted library allocation
|
page read and write
|
||
1508000
|
heap
|
page read and write
|
||
3DE7000
|
heap
|
page read and write
|
||
1462000
|
trusted library allocation
|
page read and write
|
||
5790000
|
heap
|
page read and write
|
||
5BFE000
|
stack
|
page read and write
|
||
1578000
|
heap
|
page read and write
|
||
6A60000
|
trusted library allocation
|
page execute and read and write
|
||
1750000
|
trusted library allocation
|
page execute and read and write
|
||
3295000
|
trusted library allocation
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
31A8000
|
trusted library allocation
|
page read and write
|
||
3EFE000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
17AA000
|
trusted library allocation
|
page read and write
|
||
3EFE000
|
heap
|
page read and write
|
||
4593000
|
direct allocation
|
page read and write
|
||
3EFE000
|
heap
|
page read and write
|
||
174C000
|
stack
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
4358000
|
heap
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
5793000
|
heap
|
page read and write
|
||
3D6A000
|
heap
|
page read and write
|
||
6A20000
|
trusted library allocation
|
page read and write
|
||
147B000
|
trusted library allocation
|
page execute and read and write
|
||
4470000
|
direct allocation
|
page read and write
|
||
4739000
|
direct allocation
|
page read and write
|
||
473D000
|
direct allocation
|
page read and write
|
||
3C80000
|
heap
|
page read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
3D48000
|
heap
|
page read and write
|
||
6AB0000
|
trusted library allocation
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
There are 254 hidden memdumps, click here to show them.