IOC Report
uFzZ48M67c.exe

loading gif

Files

File Path
Type
Category
Malicious
uFzZ48M67c.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\lards
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\uFzZ48M67c.exe
"C:\Users\user\Desktop\uFzZ48M67c.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\uFzZ48M67c.exe"
malicious

URLs

Name
IP
Malicious
http://flujoauditorias.cl
unknown
http://ip-api.com/line/?fields=hostings
unknown
http://mail.flujoauditorias.cl
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
flujoauditorias.cl
15.235.118.15
malicious
ip-api.com
208.95.112.1
malicious
mail.flujoauditorias.cl
unknown
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
15.235.118.15
flujoauditorias.cl
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
system
page execute and read and write
malicious
16A0000
direct allocation
page read and write
malicious
573E000
stack
page read and write
42C7000
trusted library allocation
page read and write
3E81000
heap
page read and write
3B80000
heap
page read and write
4593000
direct allocation
page read and write
3E81000
heap
page read and write
59BC000
stack
page read and write
3DFB000
heap
page read and write
9A000
stack
page read and write
3E81000
heap
page read and write
6A34000
trusted library allocation
page read and write
1780000
trusted library allocation
page read and write
3EFF000
heap
page read and write
473D000
direct allocation
page read and write
32DA000
trusted library allocation
page read and write
A1D000
heap
page read and write
151E000
heap
page read and write
3EFD000
heap
page read and write
4593000
direct allocation
page read and write
4470000
direct allocation
page read and write
93E000
stack
page read and write
4289000
trusted library allocation
page read and write
1477000
trusted library allocation
page execute and read and write
3E59000
heap
page read and write
3ED0000
heap
page read and write
4593000
direct allocation
page read and write
3F74000
heap
page read and write
3EFF000
heap
page read and write
100000
heap
page read and write
3F75000
heap
page read and write
57A0000
heap
page read and write
336F000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page execute and read and write
1620000
heap
page read and write
3EFE000
heap
page read and write
1466000
trusted library allocation
page execute and read and write
3EDA000
heap
page read and write
47AE000
direct allocation
page read and write
161E000
stack
page read and write
1670000
heap
page read and write
1537000
heap
page read and write
4470000
direct allocation
page read and write
319E000
stack
page read and write
DDA000
stack
page read and write
10F8000
stack
page read and write
17BD000
trusted library allocation
page read and write
691E000
stack
page read and write
1300000
heap
page read and write
400000
system
page execute and read and write
7F4C0000
trusted library allocation
page execute and read and write
4610000
direct allocation
page read and write
6B4E000
stack
page read and write
3EFF000
heap
page read and write
335D000
trusted library allocation
page read and write
4610000
direct allocation
page read and write
535D000
stack
page read and write
15A9000
heap
page read and write
1500000
heap
page read and write
1444000
trusted library allocation
page read and write
4610000
direct allocation
page read and write
1790000
trusted library allocation
page read and write
3E81000
heap
page read and write
3D58000
heap
page read and write
3EFC000
heap
page read and write
15DE000
stack
page read and write
47AE000
direct allocation
page read and write
3E81000
heap
page read and write
3340000
trusted library allocation
page read and write
146A000
trusted library allocation
page execute and read and write
492000
unkown
page read and write
47AE000
direct allocation
page read and write
3B81000
heap
page read and write
1472000
trusted library allocation
page read and write
3EE2000
heap
page read and write
4AB000
unkown
page readonly
1140000
heap
page read and write
9BE000
stack
page read and write
4470000
direct allocation
page read and write
47AE000
direct allocation
page read and write
4593000
direct allocation
page read and write
3261000
trusted library allocation
page read and write
3E81000
heap
page read and write
1706000
heap
page read and write
490000
unkown
page read and write
6420000
heap
page read and write
3E2E000
heap
page read and write
3C1E000
heap
page read and write
1770000
heap
page execute and read and write
473D000
direct allocation
page read and write
1460000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
645B000
heap
page read and write
6A40000
trusted library allocation
page read and write
3250000
heap
page read and write
3EF6000
heap
page read and write
56DC000
stack
page read and write
6DE0000
heap
page read and write
5CFF000
stack
page read and write
3E37000
heap
page read and write
47AE000
direct allocation
page read and write
4610000
direct allocation
page read and write
3320000
trusted library allocation
page read and write
473D000
direct allocation
page read and write
1450000
trusted library allocation
page read and write
4A8000
unkown
page read and write
3BFF000
heap
page read and write
58A0000
heap
page read and write
3E81000
heap
page read and write
4739000
direct allocation
page read and write
4739000
direct allocation
page read and write
4593000
direct allocation
page read and write
3E81000
heap
page read and write
3E81000
heap
page read and write
4AB000
unkown
page readonly
1700000
heap
page read and write
145D000
trusted library allocation
page execute and read and write
5ABE000
stack
page read and write
4261000
trusted library allocation
page read and write
6A1E000
stack
page read and write
4739000
direct allocation
page read and write
32E2000
trusted library allocation
page read and write
179E000
trusted library allocation
page read and write
3E81000
heap
page read and write
1796000
trusted library allocation
page read and write
7050000
heap
page read and write
3E81000
heap
page read and write
15DD000
heap
page read and write
8B4000
stack
page read and write
3EFF000
heap
page read and write
3D80000
heap
page read and write
32DC000
trusted library allocation
page read and write
5BBE000
stack
page read and write
179B000
trusted library allocation
page read and write
58B0000
heap
page execute and read and write
6A27000
trusted library allocation
page read and write
3E84000
heap
page read and write
3E81000
heap
page read and write
1305000
heap
page read and write
1470000
trusted library allocation
page read and write
9D0000
heap
page read and write
3D46000
heap
page read and write
334A000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
577E000
stack
page read and write
428D000
heap
page read and write
47AE000
direct allocation
page read and write
1690000
heap
page read and write
1440000
trusted library allocation
page read and write
17B1000
trusted library allocation
page read and write
642A000
heap
page read and write
3361000
trusted library allocation
page read and write
17F0000
heap
page read and write
3EE3000
heap
page read and write
3375000
trusted library allocation
page read and write
3EF2000
heap
page read and write
3DE7000
heap
page read and write
3E81000
heap
page read and write
6440000
heap
page read and write
11DF000
stack
page read and write
35DE000
stack
page read and write
3326000
trusted library allocation
page read and write
4470000
direct allocation
page read and write
3E81000
heap
page read and write
473D000
direct allocation
page read and write
15D7000
heap
page read and write
5E60000
trusted library allocation
page read and write
14E0000
heap
page read and write
473D000
direct allocation
page read and write
4610000
direct allocation
page read and write
17A2000
trusted library allocation
page read and write
491000
unkown
page write copy
4739000
direct allocation
page read and write
334C000
trusted library allocation
page read and write
14DE000
stack
page read and write
6AAE000
stack
page read and write
4739000
direct allocation
page read and write
3DF6000
heap
page read and write
4470000
direct allocation
page read and write
17E0000
trusted library allocation
page read and write
39EC000
heap
page read and write
105000
heap
page read and write
17D0000
trusted library allocation
page read and write
6E10000
trusted library allocation
page read and write
482000
unkown
page readonly
3DD9000
heap
page read and write
9EA000
heap
page read and write
8FE000
stack
page read and write
401000
unkown
page execute read
3350000
trusted library allocation
page read and write
67DE000
stack
page read and write
39DF000
stack
page read and write
3DF7000
heap
page read and write
68DE000
stack
page read and write
1674000
heap
page read and write
3EFE000
heap
page read and write
17B6000
trusted library allocation
page read and write
1443000
trusted library allocation
page execute and read and write
152A000
heap
page read and write
3338000
trusted library allocation
page read and write
3EFE000
heap
page read and write
3E81000
heap
page read and write
A1D000
heap
page read and write
1F0000
heap
page read and write
400000
unkown
page readonly
32EA000
trusted library allocation
page read and write
3E80000
heap
page execute and read and write
3D86000
heap
page read and write
490000
unkown
page write copy
144D000
trusted library allocation
page execute and read and write
9D5000
heap
page read and write
950000
heap
page read and write
1534000
heap
page read and write
17AE000
trusted library allocation
page read and write
3D76000
heap
page read and write
3ED1000
heap
page read and write
9EE000
heap
page read and write
482000
unkown
page readonly
400000
unkown
page readonly
3D70000
heap
page read and write
9E0000
heap
page read and write
16F0000
heap
page read and write
401000
unkown
page execute read
642C000
heap
page read and write
3E81000
heap
page read and write
3EFE000
heap
page read and write
1760000
trusted library allocation
page read and write
428B000
heap
page read and write
6A47000
trusted library allocation
page read and write
1508000
heap
page read and write
3DE7000
heap
page read and write
1462000
trusted library allocation
page read and write
5790000
heap
page read and write
5BFE000
stack
page read and write
1578000
heap
page read and write
6A60000
trusted library allocation
page execute and read and write
1750000
trusted library allocation
page execute and read and write
3295000
trusted library allocation
page read and write
3E81000
heap
page read and write
31A8000
trusted library allocation
page read and write
3EFE000
heap
page read and write
4610000
direct allocation
page read and write
17AA000
trusted library allocation
page read and write
3EFE000
heap
page read and write
4593000
direct allocation
page read and write
3EFE000
heap
page read and write
174C000
stack
page read and write
8AF000
stack
page read and write
1430000
trusted library allocation
page read and write
4358000
heap
page read and write
110000
heap
page read and write
5793000
heap
page read and write
3D6A000
heap
page read and write
6A20000
trusted library allocation
page read and write
147B000
trusted library allocation
page execute and read and write
4470000
direct allocation
page read and write
4739000
direct allocation
page read and write
473D000
direct allocation
page read and write
3C80000
heap
page read and write
1490000
trusted library allocation
page read and write
3D48000
heap
page read and write
6AB0000
trusted library allocation
page read and write
1260000
heap
page read and write
There are 254 hidden memdumps, click here to show them.