IOC Report
DBUfLVzZhf.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DBUfLVzZhf.exe
"C:\Users\user\Desktop\DBUfLVzZhf.exe"
malicious

URLs

Name
IP
Malicious
http://xilloolli.com/api.php?status=1&wa
unknown
https://ipinfo.io/country
unknown
http://xilloolli.com/api.phpEhttp://xilloolli.com/api-debug.php
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://xilloolli.com/api-debug.php
unknown
http://xilloolli.com
unknown
http://xilloolli.com/api.php
unknown
http://xilloolli.com/api.php?status=1&wallets=0&av=1
188.114.96.3
http://xilloolli.com/api.php?status=1&wallets=0&av=10v
unknown
https://oklibed.com
unknown
https://github.com/reproteq/DiffPatchWpf3Copyright
unknown
https://ipinfo.io/ip
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
xilloolli.com
188.114.96.3

IPs

IP
Domain
Country
Malicious
188.114.96.3
xilloolli.com
European Union

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DBUfLVzZhf_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DBUfLVzZhf_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DBUfLVzZhf_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DBUfLVzZhf_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DBUfLVzZhf_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DBUfLVzZhf_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DBUfLVzZhf_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DBUfLVzZhf_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DBUfLVzZhf_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DBUfLVzZhf_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DBUfLVzZhf_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DBUfLVzZhf_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DBUfLVzZhf_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DBUfLVzZhf_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
176D2342000
unkown
page readonly
malicious
176D4171000
trusted library allocation
page read and write
malicious
176F0D2D000
heap
page read and write
7FFD343A0000
trusted library allocation
page read and write
176D2520000
heap
page read and write
176F0D32000
heap
page read and write
176F0C56000
heap
page read and write
7FFD34270000
trusted library allocation
page execute and read and write
176D26A3000
trusted library allocation
page read and write
176EC8BD000
heap
page read and write
176EC8CA000
heap
page read and write
176D45D9000
trusted library allocation
page read and write
176F1390000
trusted library allocation
page read and write
176EC9F0000
heap
page read and write
176D26A0000
trusted library allocation
page read and write
176D4632000
trusted library allocation
page read and write
7FF4AC8CB000
trusted library allocation
page execute read
176EEC8D000
heap
page read and write
176D4110000
heap
page execute and read and write
598C5FC000
stack
page read and write
176EC847000
heap
page read and write
7FFD341C2000
trusted library allocation
page read and write
7FF4AC8B5000
trusted library allocation
page execute read
176D25A6000
heap
page read and write
176EC9C3000
heap
page read and write
176F0CC6000
heap
page read and write
176D44AA000
trusted library allocation
page read and write
7FFD341CA000
trusted library allocation
page read and write
176D4609000
trusted library allocation
page read and write
7FF4AC8CF000
trusted library allocation
page execute read
176D25A0000
heap
page read and write
176EC8DC000
heap
page read and write
176EC8E8000
heap
page read and write
176F06E0000
trusted library allocation
page read and write
7FFD341C0000
trusted library allocation
page read and write
7FF4AC8C3000
trusted library allocation
page execute read
176F0CB2000
heap
page read and write
7FFD341B4000
trusted library allocation
page read and write
176F0CEE000
heap
page read and write
7FFD3426C000
trusted library allocation
page execute and read and write
176ECA1A000
heap
page read and write
176F0D56000
heap
page read and write
7FFD341DB000
trusted library allocation
page execute and read and write
176EC8FD000
heap
page read and write
176EC899000
heap
page read and write
7FF4AC8B2000
trusted library allocation
page readonly
7FFD34390000
trusted library allocation
page read and write
7FFD34266000
trusted library allocation
page read and write
7FFD34358000
trusted library allocation
page read and write
176D26D0000
heap
page execute and read and write
176EEDF4000
heap
page read and write
176EC8C0000
heap
page read and write
176D2400000
heap
page read and write
7FF4AC8C4000
trusted library allocation
page readonly
7FF4AC8C8000
trusted library allocation
page readonly
176F1210000
trusted library allocation
page read and write
176EC8E5000
heap
page read and write
7FF4AC8B0000
trusted library allocation
page readonly
176EC876000
heap
page read and write
176D27F5000
heap
page read and write
7FF4AC8CE000
trusted library allocation
page readonly
176EED25000
heap
page read and write
7FFD341B0000
trusted library allocation
page read and write
176F0D45000
heap
page read and write
176EEE5A000
heap
page read and write
176F0D4C000
heap
page read and write
176EECF4000
heap
page read and write
176EC92B000
heap
page read and write
176F0CE0000
heap
page read and write
176D45F3000
trusted library allocation
page read and write
176D45ED000
trusted library allocation
page read and write
176EED5A000
heap
page read and write
7FF4AC8B1000
trusted library allocation
page execute read
598B1F4000
stack
page read and write
176F13A0000
trusted library allocation
page read and write
7FF4AC8C1000
trusted library allocation
page execute read
176D25E4000
heap
page read and write
176F0CE2000
heap
page read and write
7FFD341B2000
trusted library allocation
page read and write
7FF4AC8C5000
trusted library allocation
page execute read
176F0C44000
heap
page read and write
7FFD341B3000
trusted library allocation
page execute and read and write
176D4120000
heap
page execute and read and write
176EEE54000
heap
page read and write
176F0CF8000
heap
page read and write
176D2340000
unkown
page readonly
176EC915000
heap
page read and write
176EC863000
heap
page read and write
176EC837000
heap
page read and write
7FFD341D4000
trusted library allocation
page read and write
176D4604000
trusted library allocation
page read and write
176D2364000
unkown
page readonly
7FFD341CD000
trusted library allocation
page execute and read and write
598E1FB000
stack
page read and write
7FF4AC8D0000
trusted library allocation
page execute and read and write
176F0D5D000
heap
page read and write
7FF4AC8C9000
trusted library allocation
page execute read
176F1330000
trusted library allocation
page read and write
176EC1A0000
trusted library allocation
page read and write
176F1200000
trusted library allocation
page read and write
176E4191000
trusted library allocation
page read and write
176D2570000
trusted library allocation
page read and write
176D45C6000
trusted library allocation
page read and write
176EEE4D000
heap
page read and write
176EC9D0000
heap
page read and write
176D25CB000
heap
page read and write
176D4113000
heap
page execute and read and write
598D5FE000
stack
page read and write
598C9FB000
stack
page read and write
598EDFD000
stack
page read and write
176EEE37000
heap
page read and write
176EC8EB000
heap
page read and write
176F1320000
trusted library allocation
page read and write
176EC9C0000
heap
page read and write
598E5FB000
stack
page read and write
176D2590000
trusted library allocation
page read and write
7FFD34370000
trusted library allocation
page execute and read and write
176D27F0000
heap
page read and write
176F1340000
trusted library allocation
page read and write
598CDFE000
stack
page read and write
176F0C10000
heap
page read and write
598DDF4000
stack
page read and write
176EEDF1000
heap
page read and write
176D25E1000
heap
page read and write
176D2850000
heap
page read and write
176D45E9000
trusted library allocation
page read and write
7FFD341DD000
trusted library allocation
page execute and read and write
176EEC60000
heap
page read and write
176EC8F0000
heap
page read and write
176F1070000
trusted library allocation
page read and write
7FFD3420C000
trusted library allocation
page execute and read and write
7FF4AC8C2000
trusted library allocation
page readonly
176D2618000
heap
page read and write
598E5FD000
stack
page read and write
176EEC71000
heap
page read and write
176EC8A6000
heap
page read and write
176EEDFB000
heap
page read and write
7FFD34360000
trusted library allocation
page read and write
176D260E000
heap
page read and write
176EEC9D000
heap
page read and write
176F0802000
trusted library allocation
page read and write
176EC8C4000
heap
page read and write
176D4160000
heap
page read and write
176EEDAF000
heap
page read and write
176EC891000
heap
page read and write
598D1FE000
stack
page read and write
176EC9E9000
heap
page read and write
176D45DC000
trusted library allocation
page read and write
176D2810000
heap
page read and write
176EC9E0000
heap
page read and write
176EECA2000
heap
page read and write
7FFD341BD000
trusted library allocation
page execute and read and write
176F0CDE000
heap
page read and write
7FFD343B0000
trusted library allocation
page execute and read and write
598C1FE000
stack
page read and write
7FFD34260000
trusted library allocation
page read and write
7FF4AC8CA000
trusted library allocation
page readonly
176F0C4B000
heap
page read and write
176D24E0000
heap
page read and write
7FFD34350000
trusted library allocation
page read and write
176F0D40000
heap
page read and write
176E4171000
trusted library allocation
page read and write
176D437D000
trusted library allocation
page read and write
176F0D3C000
heap
page read and write
176D2855000
heap
page read and write
176F1350000
trusted library allocation
page read and write
176F0C00000
trusted library allocation
page read and write
176F0C4D000
heap
page read and write
176EC830000
heap
page read and write
176EC90B000
heap
page read and write
598E9FE000
stack
page read and write
176EC88E000
heap
page read and write
176EC90F000
heap
page read and write
7FF4AC8B4000
trusted library allocation
page readonly
176D4140000
trusted library allocation
page read and write
176F1220000
trusted library allocation
page read and write
7FFD34380000
trusted library allocation
page read and write
7FFD34296000
trusted library allocation
page execute and read and write
7FF4AC8B3000
trusted library allocation
page execute read
176D2500000
heap
page read and write
176F0D4E000
heap
page read and write
7FFD34362000
trusted library allocation
page read and write
7FFD342D0000
trusted library allocation
page execute and read and write
176EECBB000
heap
page read and write
176EEDED000
heap
page read and write
176EC921000
heap
page read and write
176D26E7000
heap
page read and write
176EEE30000
heap
page read and write
7FFD34388000
trusted library allocation
page read and write
7FFD341D0000
trusted library allocation
page read and write
7FFD34386000
trusted library allocation
page read and write
There are 181 hidden memdumps, click here to show them.