IOC Report
MHQMJCOxjl.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MHQMJCOxjl.exe
"C:\Users\user\Desktop\MHQMJCOxjl.exe"
malicious

URLs

Name
IP
Malicious
https://ipinfo.io/country
unknown
http://crl.microsoft
unknown
http://microsoft.co
unknown
https://xilloolli.com/api.phpGhttps://xilloolli.com/api-debug.php
unknown
https://oklibed.com
unknown
https://xilloolli.com
unknown
https://xilloolli.com/api.php
unknown
https://xilloolli.com/api-debug.php
unknown
https://xilloolli.com/api.php?status=1&wallets=0&av=1
188.114.97.3
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://xilloolli.com
unknown
https://xilloolli.com/api.php?status=1&walle
unknown
https://github.com/reproteq/DiffPatchWpf3Copyright
unknown
https://ipinfo.io/ip
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
xilloolli.com
188.114.97.3

IPs

IP
Domain
Country
Malicious
188.114.97.3
xilloolli.com
European Union

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MHQMJCOxjl_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MHQMJCOxjl_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MHQMJCOxjl_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MHQMJCOxjl_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MHQMJCOxjl_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MHQMJCOxjl_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MHQMJCOxjl_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MHQMJCOxjl_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MHQMJCOxjl_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MHQMJCOxjl_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MHQMJCOxjl_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MHQMJCOxjl_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MHQMJCOxjl_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MHQMJCOxjl_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2DC5D772000
unkown
page readonly
malicious
2DC5F451000
trusted library allocation
page read and write
malicious
2DC7A14F000
heap
page read and write
2DC7C0B0000
trusted library allocation
page read and write
7FF4995F0000
trusted library allocation
page readonly
2DC5F675000
trusted library allocation
page read and write
E3BF7FE000
stack
page read and write
7FFAAB5CD000
trusted library allocation
page execute and read and write
E3C1FFE000
stack
page read and write
2DC5D770000
unkown
page readonly
7FFAAB5BA000
trusted library allocation
page read and write
2DC77D80000
trusted library allocation
page read and write
2DC77480000
trusted library allocation
page read and write
2DC5DC50000
heap
page read and write
7FFB16825000
unkown
page readonly
E3C27FF000
stack
page read and write
2DC7C2B7000
heap
page read and write
7FFAAB660000
trusted library allocation
page execute and read and write
2DC7C7B0000
trusted library allocation
page read and write
2DC7A0F1000
heap
page read and write
2DC7C7A0000
trusted library allocation
page read and write
2DC5F8D6000
trusted library allocation
page read and write
2DC77EA4000
heap
page read and write
2DC5D853000
heap
page read and write
2DC7C3B5000
heap
page read and write
2DC7C34B000
heap
page read and write
7FFAAB5A4000
trusted library allocation
page read and write
7FFAAB686000
trusted library allocation
page execute and read and write
2DC7C25B000
heap
page read and write
2DC7A110000
heap
page read and write
2DC77EF9000
heap
page read and write
2DC77E57000
heap
page read and write
2DC5F3D0000
trusted library allocation
page read and write
2DC7A265000
heap
page read and write
2DC5D873000
heap
page read and write
2DC77DE0000
heap
page read and write
7FFAAB5C4000
trusted library allocation
page read and write
2DC7C33C000
heap
page read and write
2DC77E3C000
heap
page read and write
2DC5DA60000
heap
page read and write
7FFAAB6C0000
trusted library allocation
page execute and read and write
2DC7C341000
heap
page read and write
2DC7C380000
heap
page read and write
2DC7C27B000
heap
page read and write
7FF499607000
trusted library allocation
page execute read
2DC7C780000
trusted library allocation
page read and write
2DC7A2CF000
heap
page read and write
7FFB16816000
unkown
page readonly
2DC5D930000
heap
page read and write
7FF49960A000
trusted library allocation
page readonly
E3BE7F4000
stack
page read and write
2DC7C770000
trusted library allocation
page read and write
7FF49960F000
trusted library allocation
page execute read
2DC7C120000
trusted library allocation
page read and write
7FFAAB65C000
trusted library allocation
page execute and read and write
2DC5F8D3000
trusted library allocation
page read and write
7FFAAB778000
trusted library allocation
page read and write
7FFAAB5A2000
trusted library allocation
page read and write
2DC5D794000
unkown
page readonly
2DC5D871000
heap
page read and write
E3C07FF000
stack
page read and write
7FFAAB7A0000
trusted library allocation
page execute and read and write
2DC7C100000
trusted library allocation
page read and write
2DC5F8E4000
trusted library allocation
page read and write
2DC5F8C6000
trusted library allocation
page read and write
2DC77EBE000
heap
page read and write
2DC5F293000
trusted library allocation
page read and write
2DC7C290000
heap
page read and write
2DC7C29B000
heap
page read and write
2DC7A12E000
heap
page read and write
2DC5DA30000
heap
page read and write
2DC7A203000
heap
page read and write
2DC7A1C9000
heap
page read and write
2DC77EDE000
heap
page read and write
2DC5F679000
trusted library allocation
page read and write
2DC7BC72000
trusted library allocation
page read and write
2DC7A127000
heap
page read and write
2DC5DA40000
heap
page read and write
7FF4995F5000
trusted library allocation
page execute read
7FF499602000
trusted library allocation
page readonly
7FFAAB760000
trusted library allocation
page execute and read and write
2DC77DD3000
heap
page read and write
2DC5F90D000
trusted library allocation
page read and write
2DC7A198000
heap
page read and write
E3C0BFE000
stack
page read and write
2DC7C297000
heap
page read and write
2DC5F8CD000
trusted library allocation
page read and write
2DC7C344000
heap
page read and write
7FFAAB656000
trusted library allocation
page read and write
2DC77EB8000
heap
page read and write
2DC5F8FB000
trusted library allocation
page read and write
7FFAAB5AD000
trusted library allocation
page execute and read and write
2DC77E4F000
heap
page read and write
2DC77EF0000
heap
page read and write
7FFB16801000
unkown
page execute read
7FF4995F4000
trusted library allocation
page readonly
2DC7A120000
heap
page read and write
7FFAAB748000
trusted library allocation
page read and write
7FF499603000
trusted library allocation
page execute read
2DC5F3B0000
heap
page execute and read and write
7FFAAB5FC000
trusted library allocation
page execute and read and write
2DC7C2AC000
heap
page read and write
7FF49960E000
trusted library allocation
page readonly
2DC5F931000
trusted library allocation
page read and write
7FF4995F2000
trusted library allocation
page readonly
7FFAAB770000
trusted library allocation
page read and write
7FF499601000
trusted library allocation
page execute read
E3C1BFB000
stack
page read and write
2DC5F760000
trusted library allocation
page read and write
2DC77D90000
trusted library allocation
page read and write
2DC7C288000
heap
page read and write
2DC77F2B000
heap
page read and write
2DC5DA35000
heap
page read and write
2DC77DFF000
heap
page read and write
7FFAAB5BD000
trusted library allocation
page execute and read and write
2DC77E2C000
heap
page read and write
7FFB16822000
unkown
page readonly
2DC7C110000
trusted library allocation
page read and write
2DC777DA000
heap
page read and write
7FFAAB5A0000
trusted library allocation
page read and write
7FF499604000
trusted library allocation
page readonly
2DC7C2B3000
heap
page read and write
2DC5F8C9000
trusted library allocation
page read and write
2DC6F471000
trusted library allocation
page read and write
2DC77EC5000
heap
page read and write
7FFAAB5B0000
trusted library allocation
page read and write
2DC7C293000
heap
page read and write
2DC5F909000
trusted library allocation
page read and write
7FF499610000
trusted library allocation
page execute and read and write
7FF49960B000
trusted library allocation
page execute read
2DC77D23000
heap
page execute and read and write
7FFAAB752000
trusted library allocation
page read and write
2DC7C2FF000
heap
page read and write
2DC7A26A000
heap
page read and write
E3BFFFB000
stack
page read and write
2DC7A10D000
heap
page read and write
7FF4995F1000
trusted library allocation
page execute read
2DC5F290000
trusted library allocation
page read and write
2DC77EAC000
heap
page read and write
2DC5F68A000
trusted library allocation
page read and write
7FF499606000
trusted library allocation
page readonly
E3C13F4000
stack
page read and write
2DC7A208000
heap
page read and write
E3C03FE000
stack
page read and write
2DC7A2D1000
heap
page read and write
2DC5F8E9000
trusted library allocation
page read and write
7FFAAB5A3000
trusted library allocation
page execute and read and write
2DC7C28A000
heap
page read and write
2DC5DA10000
heap
page read and write
2DC5D8A8000
heap
page read and write
2DC7A25C000
heap
page read and write
2DC5DC40000
trusted library allocation
page read and write
2DC77E1F000
heap
page read and write
2DC5F8A8000
trusted library allocation
page read and write
2DC7A0E0000
heap
page read and write
E3C17FB000
stack
page read and write
2DC5F668000
trusted library allocation
page read and write
2DC7A1FF000
heap
page read and write
2DC77E4C000
heap
page read and write
E3C2BFD000
stack
page read and write
2DC5F390000
heap
page execute and read and write
2DC7C130000
trusted library allocation
page read and write
2DC5DC55000
heap
page read and write
2DC5F280000
trusted library allocation
page read and write
E3BFBFC000
stack
page read and write
2DC5F8BA000
trusted library allocation
page read and write
2DC7A217000
heap
page read and write
2DC5D8A3000
heap
page read and write
2DC6F451000
trusted library allocation
page read and write
7FFAAB740000
trusted library allocation
page read and write
2DC5D836000
heap
page read and write
2DC77E7C000
heap
page read and write
2DC77ED8000
heap
page read and write
7FFAAB780000
trusted library allocation
page read and write
7FFAAB776000
trusted library allocation
page read and write
2DC5D85B000
heap
page read and write
7FFB16800000
unkown
page readonly
2DC7C208000
heap
page read and write
2DC77E81000
heap
page read and write
2DC7C257000
heap
page read and write
2DC7C140000
heap
page read and write
7FF499605000
trusted library allocation
page execute read
E3C23FD000
stack
page read and write
2DC7C790000
trusted library allocation
page read and write
2DC7A255000
heap
page read and write
7FFAAB5CB000
trusted library allocation
page execute and read and write
2DC77EA6000
heap
page read and write
2DC77EAE000
heap
page read and write
7FF4995F3000
trusted library allocation
page execute read
2DC7C280000
heap
page read and write
2DC5D83C000
heap
page read and write
2DC77EC9000
heap
page read and write
2DC77ECE000
heap
page read and write
2DC5D830000
heap
page read and write
2DC77EE0000
heap
page read and write
7FFAAB750000
trusted library allocation
page read and write
2DC5F340000
heap
page read and write
7FFB16820000
unkown
page read and write
2DC5D89E000
heap
page read and write
7FFAAB5B2000
trusted library allocation
page read and write
2DC77EBA000
heap
page read and write
7FFAAB5C0000
trusted library allocation
page read and write
2DC5F65D000
trusted library allocation
page read and write
2DC5F8D1000
trusted library allocation
page read and write
2DC77EDC000
heap
page read and write
2DC7C285000
heap
page read and write
2DC77EA9000
heap
page read and write
2DC77D20000
heap
page execute and read and write
2DC7A24B000
heap
page read and write
7FFAAB650000
trusted library allocation
page read and write
7FFAAB790000
trusted library allocation
page read and write
2DC5F440000
heap
page read and write
2DC77DD0000
heap
page read and write
2DC77E5C000
heap
page read and write
There are 204 hidden memdumps, click here to show them.