IOC Report
amqD5LrBlB.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\amqD5LrBlB.exe
"C:\Users\user\Desktop\amqD5LrBlB.exe"
malicious

URLs

Name
IP
Malicious
https://cdn.discordapp.com/attachments/1217028370865455188/1217036676220846100/Xqdnowe.wav?ex=660290
unknown
https://cdn.discordapp.com/attachments/1217028370865455188/1217036676220846100/Xqdnowe.wav?ex=660290bb&is=65f01bbb&hm=630e7c461e6e58c2cd829e03a98c08a296cc84079e0c2605753b8d3f15b8d6e8&
162.159.129.233
https://cdn.discordapp.comX
unknown
https://cdn.discordapp.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://cdn.discordapp.comX
unknown
http://cdn.discordapp.com
unknown
http://cdn.discordapp.comd
unknown

Domains

Name
IP
Malicious
cdn.discordapp.com
162.159.129.233

IPs

IP
Domain
Country
Malicious
162.159.129.233
cdn.discordapp.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\amqD5LrBlB_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\amqD5LrBlB_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\amqD5LrBlB_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\amqD5LrBlB_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\amqD5LrBlB_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\amqD5LrBlB_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\amqD5LrBlB_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\amqD5LrBlB_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\amqD5LrBlB_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\amqD5LrBlB_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\amqD5LrBlB_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\amqD5LrBlB_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\amqD5LrBlB_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\amqD5LrBlB_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3001000
trusted library allocation
page read and write
malicious
3389000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
3042000
trusted library allocation
page read and write
3036000
trusted library allocation
page read and write
3351000
trusted library allocation
page read and write
33F2000
trusted library allocation
page read and write
3085000
trusted library allocation
page read and write
2F1E000
stack
page read and write
3034000
trusted library allocation
page read and write
30B5000
trusted library allocation
page read and write
3381000
trusted library allocation
page read and write
314D000
trusted library allocation
page read and write
C04000
unkown
page readonly
33CE000
trusted library allocation
page read and write
30AD000
trusted library allocation
page read and write
2E00000
trusted library allocation
page execute and read and write
318E000
trusted library allocation
page read and write
3141000
trusted library allocation
page read and write
12EA000
trusted library allocation
page execute and read and write
2F50000
trusted library allocation
page read and write
C9C000
stack
page read and write
3175000
trusted library allocation
page read and write
340E000
trusted library allocation
page read and write
31EA000
trusted library allocation
page read and write
2FD0000
heap
page execute and read and write
33A5000
trusted library allocation
page read and write
30D9000
trusted library allocation
page read and write
3379000
trusted library allocation
page read and write
635C000
heap
page read and write
30CD000
trusted library allocation
page read and write
31FE000
trusted library allocation
page read and write
31BA000
trusted library allocation
page read and write
134E000
trusted library allocation
page read and write
33CA000
trusted library allocation
page read and write
31D6000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
33E2000
trusted library allocation
page read and write
31DE000
trusted library allocation
page read and write
1060000
heap
page read and write
B52000
unkown
page readonly
30A9000
trusted library allocation
page read and write
30B1000
trusted library allocation
page read and write
344E000
trusted library allocation
page read and write
30B9000
trusted library allocation
page read and write
340A000
trusted library allocation
page read and write
30FD000
trusted library allocation
page read and write
3395000
trusted library allocation
page read and write
3151000
trusted library allocation
page read and write
6A3F000
trusted library allocation
page read and write
3149000
trusted library allocation
page read and write
3111000
trusted library allocation
page read and write
33FE000
trusted library allocation
page read and write
3171000
trusted library allocation
page read and write
3422000
trusted library allocation
page read and write
D99000
stack
page read and write
3222000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
33F6000
trusted library allocation
page read and write
31F6000
trusted library allocation
page read and write
30BD000
trusted library allocation
page read and write
3426000
trusted library allocation
page read and write
31A6000
trusted library allocation
page read and write
306D000
trusted library allocation
page read and write
3089000
trusted library allocation
page read and write
3179000
trusted library allocation
page read and write
6A07000
trusted library allocation
page read and write
31CA000
trusted library allocation
page read and write
312D000
trusted library allocation
page read and write
3065000
trusted library allocation
page read and write
31E2000
trusted library allocation
page read and write
632B000
heap
page read and write
3131000
trusted library allocation
page read and write
343E000
trusted library allocation
page read and write
3442000
trusted library allocation
page read and write
5F7D000
stack
page read and write
33A1000
trusted library allocation
page read and write
30F9000
trusted library allocation
page read and write
33B9000
trusted library allocation
page read and write
3212000
trusted library allocation
page read and write
614E000
stack
page read and write
3361000
trusted library allocation
page read and write
321E000
trusted library allocation
page read and write
2F46000
trusted library allocation
page read and write
30C5000
trusted library allocation
page read and write
3432000
trusted library allocation
page read and write
5A3E000
stack
page read and write
1302000
trusted library allocation
page read and write
3365000
trusted library allocation
page read and write
3369000
trusted library allocation
page read and write
30D1000
trusted library allocation
page read and write
30C9000
trusted library allocation
page read and write
74CE000
stack
page read and write
3436000
trusted library allocation
page read and write
12C4000
trusted library allocation
page read and write
633B000
heap
page read and write
33C6000
trusted library allocation
page read and write
31D2000
trusted library allocation
page read and write
50FD000
stack
page read and write
610E000
stack
page read and write
336D000
trusted library allocation
page read and write
62D0000
heap
page read and write
310D000
trusted library allocation
page read and write
31C2000
trusted library allocation
page read and write
2D1E000
stack
page read and write
3406000
trusted library allocation
page read and write
DF0000
heap
page read and write
320A000
trusted library allocation
page read and write
3446000
trusted library allocation
page read and write
31B2000
trusted library allocation
page read and write
3169000
trusted library allocation
page read and write
31CE000
trusted library allocation
page read and write
33EE000
trusted library allocation
page read and write
342A000
trusted library allocation
page read and write
3359000
trusted library allocation
page read and write
3091000
trusted library allocation
page read and write
600E000
stack
page read and write
3196000
trusted library allocation
page read and write
668F000
trusted library allocation
page read and write
1020000
heap
page read and write
5DFE000
stack
page read and write
10A2000
heap
page read and write
3159000
trusted library allocation
page read and write
6A1F000
trusted library allocation
page read and write
1010000
heap
page read and write
338D000
trusted library allocation
page read and write
1320000
heap
page read and write
3371000
trusted library allocation
page read and write
303E000
trusted library allocation
page read and write
4001000
trusted library allocation
page read and write
315D000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
30E1000
trusted library allocation
page read and write
3216000
trusted library allocation
page read and write
3391000
trusted library allocation
page read and write
6B01000
trusted library allocation
page read and write
322A000
trusted library allocation
page read and write
33C2000
trusted library allocation
page read and write
62CF000
stack
page read and write
12F0000
heap
page read and write
6337000
heap
page read and write
1148000
heap
page read and write
678C000
trusted library allocation
page read and write
316D000
trusted library allocation
page read and write
342E000
trusted library allocation
page read and write
308D000
trusted library allocation
page read and write
5CFE000
stack
page read and write
3145000
trusted library allocation
page read and write
305D000
trusted library allocation
page read and write
3101000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
3416000
trusted library allocation
page read and write
2FCE000
stack
page read and write
30DD000
trusted library allocation
page read and write
569A000
heap
page read and write
3109000
trusted library allocation
page read and write
3375000
trusted library allocation
page read and write
DF5000
heap
page read and write
6355000
heap
page read and write
341A000
trusted library allocation
page read and write
2E10000
heap
page read and write
3119000
trusted library allocation
page read and write
3061000
trusted library allocation
page read and write
30A1000
trusted library allocation
page read and write
33D2000
trusted library allocation
page read and write
307D000
trusted library allocation
page read and write
56A0000
heap
page read and write
2CD0000
trusted library allocation
page read and write
320E000
trusted library allocation
page read and write
3115000
trusted library allocation
page read and write
334D000
trusted library allocation
page read and write
3402000
trusted library allocation
page read and write
3181000
trusted library allocation
page read and write
30A5000
trusted library allocation
page read and write
6A0F000
trusted library allocation
page read and write
33DA000
trusted library allocation
page read and write
344A000
trusted library allocation
page read and write
3206000
trusted library allocation
page read and write
321A000
trusted library allocation
page read and write
31E6000
trusted library allocation
page read and write
309D000
trusted library allocation
page read and write
5B3E000
stack
page read and write
313D000
trusted library allocation
page read and write
3135000
trusted library allocation
page read and write
1088000
heap
page read and write
31EE000
trusted library allocation
page read and write
12E7000
trusted library allocation
page execute and read and write
33DE000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
3412000
trusted library allocation
page read and write
3161000
trusted library allocation
page read and write
31FA000
trusted library allocation
page read and write
31DA000
trusted library allocation
page read and write
33A9000
trusted library allocation
page read and write
31F2000
trusted library allocation
page read and write
31BE000
trusted library allocation
page read and write
12CD000
trusted library allocation
page execute and read and write
1068000
heap
page read and write
31AE000
trusted library allocation
page read and write
593E000
stack
page read and write
3139000
trusted library allocation
page read and write
31C6000
trusted library allocation
page read and write
5FBF000
stack
page read and write
30F5000
trusted library allocation
page read and write
3226000
trusted library allocation
page read and write
3185000
trusted library allocation
page read and write
12C3000
trusted library allocation
page execute and read and write
12AE000
stack
page read and write
3202000
trusted library allocation
page read and write
33D6000
trusted library allocation
page read and write
3046000
trusted library allocation
page read and write
106E000
heap
page read and write
3069000
trusted library allocation
page read and write
126E000
stack
page read and write
3165000
trusted library allocation
page read and write
33EA000
trusted library allocation
page read and write
30F1000
trusted library allocation
page read and write
3059000
trusted library allocation
page read and write
303A000
trusted library allocation
page read and write
337D000
trusted library allocation
page read and write
3192000
trusted library allocation
page read and write
341E000
trusted library allocation
page read and write
317D000
trusted library allocation
page read and write
3355000
trusted library allocation
page read and write
6B5E000
trusted library allocation
page read and write
618E000
stack
page read and write
31AA000
trusted library allocation
page read and write
30E9000
trusted library allocation
page read and write
3079000
trusted library allocation
page read and write
319A000
trusted library allocation
page read and write
33FA000
trusted library allocation
page read and write
2F20000
heap
page read and write
633D000
heap
page read and write
33AD000
trusted library allocation
page read and write
33B1000
trusted library allocation
page read and write
2FF0000
heap
page execute and read and write
3105000
trusted library allocation
page read and write
3055000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
31A2000
trusted library allocation
page read and write
343A000
trusted library allocation
page read and write
339D000
trusted library allocation
page read and write
3081000
trusted library allocation
page read and write
30ED000
trusted library allocation
page read and write
33BE000
trusted library allocation
page read and write
3189000
trusted library allocation
page read and write
130B000
trusted library allocation
page execute and read and write
31B6000
trusted library allocation
page read and write
5680000
heap
page read and write
63A7000
heap
page read and write
61CE000
stack
page read and write
33E6000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
567E000
stack
page read and write
319E000
trusted library allocation
page read and write
3075000
trusted library allocation
page read and write
1307000
trusted library allocation
page execute and read and write
30E5000
trusted library allocation
page read and write
B50000
unkown
page readonly
12D3000
trusted library allocation
page read and write
33B5000
trusted library allocation
page read and write
335D000
trusted library allocation
page read and write
3399000
trusted library allocation
page read and write
3071000
trusted library allocation
page read and write
3155000
trusted library allocation
page read and write
30C1000
trusted library allocation
page read and write
30D5000
trusted library allocation
page read and write
2DFC000
stack
page read and write
There are 258 hidden memdumps, click here to show them.