IOC Report
RFQ-HL51L05.exe

loading gif

Files

File Path
Type
Category
Malicious
RFQ-HL51L05.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\autED7A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autEDC9.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\cunili
ASCII text, with very long lines (29744), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\meshummad
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RFQ-HL51L05.exe
"C:\Users\user\Desktop\RFQ-HL51L05.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\RFQ-HL51L05.exe"
malicious

URLs

Name
IP
Malicious
http://r3.o.lencr.org0
unknown
https://account.dyn.com/
unknown
http://mail.cmcapama.top
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://cmcapama.top
unknown
http://r3.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
mail.cmcapama.top
unknown
malicious
cmcapama.top
194.36.191.196

IPs

IP
Domain
Country
Malicious
194.36.191.196
cmcapama.top
Netherlands

Memdumps

Base Address
Regiontype
Protect
Malicious
26FE000
trusted library allocation
page read and write
malicious
2729000
trusted library allocation
page read and write
malicious
7C2000
system
page execute and read and write
malicious
1260000
direct allocation
page read and write
malicious
26B1000
trusted library allocation
page read and write
malicious
C22000
trusted library allocation
page read and write
3D3D000
direct allocation
page read and write
968000
heap
page read and write
140B000
heap
page read and write
DFF000
stack
page read and write
F9F000
unkown
page read and write
3AB0000
direct allocation
page read and write
12DF000
heap
page read and write
E3C000
stack
page read and write
4BFB000
trusted library allocation
page read and write
997000
heap
page read and write
12DB000
heap
page read and write
A3A000
stack
page read and write
1334000
heap
page read and write
3C10000
direct allocation
page read and write
AB3000
trusted library allocation
page execute and read and write
A02000
heap
page read and write
F6F000
unkown
page readonly
3C10000
direct allocation
page read and write
6390000
heap
page read and write
4BE3000
heap
page read and write
3714000
trusted library allocation
page read and write
FAA000
unkown
page readonly
4C11000
trusted library allocation
page read and write
1354000
heap
page read and write
5C30000
trusted library allocation
page read and write
12D2000
heap
page read and write
5190000
trusted library allocation
page read and write
12A8000
heap
page read and write
3DEE000
direct allocation
page read and write
1477000
heap
page read and write
11D4000
heap
page read and write
4BC0000
trusted library allocation
page read and write
E1B000
stack
page read and write
1E9F000
stack
page read and write
4C22000
trusted library allocation
page read and write
C1D000
trusted library allocation
page execute and read and write
588E000
stack
page read and write
63A0000
trusted library allocation
page execute and read and write
EE0000
unkown
page readonly
1445000
heap
page read and write
ABD000
trusted library allocation
page execute and read and write
FA8000
unkown
page readonly
F6F000
unkown
page readonly
3D79000
direct allocation
page read and write
C35000
trusted library allocation
page execute and read and write
995000
heap
page read and write
3D3D000
direct allocation
page read and write
1335000
heap
page read and write
FB8000
unkown
page readonly
3A70000
direct allocation
page read and write
3B93000
direct allocation
page read and write
578E000
stack
page read and write
6580000
heap
page read and write
2731000
trusted library allocation
page read and write
1454000
heap
page read and write
3D39000
direct allocation
page read and write
4BD0000
trusted library allocation
page read and write
3BD3000
direct allocation
page read and write
F95000
unkown
page readonly
3BD3000
direct allocation
page read and write
4C40000
trusted library allocation
page read and write
FA8000
unkown
page readonly
3D39000
direct allocation
page read and write
12D4000
heap
page read and write
139B000
heap
page read and write
5B40000
trusted library allocation
page execute and read and write
1415000
heap
page read and write
3D3D000
direct allocation
page read and write
1170000
heap
page read and write
36D9000
trusted library allocation
page read and write
269F000
stack
page read and write
36B1000
trusted library allocation
page read and write
3DAE000
direct allocation
page read and write
5A02000
heap
page read and write
4C02000
trusted library allocation
page read and write
46B8000
trusted library allocation
page read and write
5BDE000
stack
page read and write
ECE000
stack
page read and write
12DF000
heap
page read and write
26FC000
trusted library allocation
page read and write
131F000
heap
page read and write
A60000
heap
page read and write
516E000
stack
page read and write
5A5E000
heap
page read and write
820000
heap
page read and write
EE1000
unkown
page execute read
6360000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
C26000
trusted library allocation
page execute and read and write
59F0000
heap
page read and write
840000
heap
page read and write
F9F000
unkown
page write copy
4C0A000
trusted library allocation
page read and write
5C20000
trusted library allocation
page read and write
3D79000
direct allocation
page read and write
7F870000
trusted library allocation
page execute and read and write
789000
stack
page read and write
3DEE000
direct allocation
page read and write
4B90000
heap
page read and write
4BF0000
trusted library allocation
page read and write
4D20000
heap
page execute and read and write
2725000
trusted library allocation
page read and write
131F000
heap
page read and write
2717000
trusted library allocation
page read and write
FB8000
unkown
page readonly
3DAE000
direct allocation
page read and write
C20000
trusted library allocation
page read and write
AC0000
heap
page read and write
825000
heap
page read and write
7C0000
system
page execute and read and write
3B93000
direct allocation
page read and write
4C0E000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
502F000
stack
page read and write
12C3000
heap
page read and write
130F000
heap
page read and write
130F000
heap
page read and write
C37000
trusted library allocation
page execute and read and write
68A000
stack
page read and write
26A0000
heap
page execute and read and write
4BB0000
trusted library allocation
page execute and read and write
3DEE000
direct allocation
page read and write
4C30000
trusted library allocation
page read and write
12E0000
heap
page read and write
5C1D000
stack
page read and write
3D39000
direct allocation
page read and write
5AF0000
trusted library allocation
page execute and read and write
59D0000
heap
page read and write
960000
heap
page read and write
519C000
trusted library allocation
page read and write
3B93000
direct allocation
page read and write
484D000
stack
page read and write
1444000
heap
page read and write
506E000
stack
page read and write
CE0000
heap
page read and write
1477000
heap
page read and write
1454000
heap
page read and write
611E000
stack
page read and write
12DF000
heap
page read and write
1334000
heap
page read and write
EE1000
unkown
page execute read
4C9C000
stack
page read and write
4BFE000
trusted library allocation
page read and write
1190000
heap
page read and write
3C50000
direct allocation
page read and write
4BE0000
heap
page read and write
3D7D000
direct allocation
page read and write
C50000
trusted library allocation
page read and write
AB4000
trusted library allocation
page read and write
59F8000
heap
page read and write
1463000
heap
page read and write
5A40000
heap
page read and write
131F000
heap
page read and write
FAA000
unkown
page readonly
A30000
heap
page read and write
CDC000
stack
page read and write
FA3000
unkown
page write copy
3C50000
direct allocation
page read and write
3AB0000
direct allocation
page read and write
13CA000
heap
page read and write
CF0000
heap
page read and write
5B3D000
stack
page read and write
11B0000
direct allocation
page execute and read and write
4C16000
trusted library allocation
page read and write
621E000
stack
page read and write
12A0000
heap
page read and write
3DAE000
direct allocation
page read and write
3C10000
direct allocation
page read and write
12FF000
heap
page read and write
4D10000
trusted library allocation
page read and write
C32000
trusted library allocation
page read and write
3BD3000
direct allocation
page read and write
12FF000
heap
page read and write
4C1D000
trusted library allocation
page read and write
3C50000
direct allocation
page read and write
E0F000
stack
page read and write
3D79000
direct allocation
page read and write
3A70000
direct allocation
page read and write
5AE0000
trusted library allocation
page read and write
1334000
heap
page read and write
1477000
heap
page read and write
3A70000
direct allocation
page read and write
3C10000
direct allocation
page read and write
5AE6000
trusted library allocation
page read and write
11D0000
heap
page read and write
3D7D000
direct allocation
page read and write
3D7D000
direct allocation
page read and write
4BF4000
trusted library allocation
page read and write
3A70000
direct allocation
page read and write
4F2C000
stack
page read and write
59DE000
heap
page read and write
3AB0000
direct allocation
page read and write
4D30000
heap
page read and write
C9E000
stack
page read and write
C2A000
trusted library allocation
page execute and read and write
3DAE000
direct allocation
page read and write
98A000
heap
page read and write
1110000
heap
page read and write
EE0000
unkown
page readonly
110E000
stack
page read and write
E80000
heap
page read and write
4CFE000
stack
page read and write
1334000
heap
page read and write
C3B000
trusted library allocation
page execute and read and write
12EE000
heap
page read and write
F95000
unkown
page readonly
4BF6000
trusted library allocation
page read and write
5DDD000
stack
page read and write
3D39000
direct allocation
page read and write
ED0000
heap
page read and write
1435000
heap
page read and write
1A9E000
stack
page read and write
12D2000
heap
page read and write
5AD0000
trusted library allocation
page read and write
1435000
heap
page read and write
3B93000
direct allocation
page read and write
1334000
heap
page read and write
3D3D000
direct allocation
page read and write
5C27000
trusted library allocation
page read and write
9D4000
heap
page read and write
AA0000
trusted library allocation
page read and write
There are 217 hidden memdumps, click here to show them.