IOC Report
Client(1).exe

loading gifFilesProcessesDomainsIPsRegistryMemdumps642010010Label

Files

File Path
Type
Category
Malicious
Download
Client(1).exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Tools.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Tools.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Client(1).exe.log
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a2e267bf27d12294c047bd9d303fd8bf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\WindowsServices.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\WindowsServices.exe.log
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Client(1).exe
"C:\Users\user\Desktop\Client(1).exe"
malicious
C:\Users\user\AppData\Roaming\WindowsServices.exe
"C:\Users\user\AppData\Roaming\WindowsServices.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\WindowsServices.exe" "WindowsServices.exe" ENABLE
malicious
C:\Users\user\AppData\Roaming\WindowsServices.exe
"C:\Users\user\AppData\Roaming\WindowsServices.exe" ..
malicious
C:\Users\user\AppData\Roaming\WindowsServices.exe
"C:\Users\user\AppData\Roaming\WindowsServices.exe" ..
malicious
C:\Users\user\AppData\Roaming\WindowsServices.exe
"C:\Users\user\AppData\Roaming\WindowsServices.exe" ..
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Domains

Name
IP
Malicious
anyone-center.gl.at.ply.gg
147.185.221.27
malicious

IPs

IP
Domain
Country
Malicious
147.185.221.27
anyone-center.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
a2e267bf27d12294c047bd9d303fd8bf
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
a2e267bf27d12294c047bd9d303fd8bf
HKEY_CURRENT_USER\SOFTWARE\a2e267bf27d12294c047bd9d303fd8bf
[kl]
HKEY_CURRENT_USER\SOFTWARE\a2e267bf27d12294c047bd9d303fd8bf
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
25E1000
trusted library allocation
page read and write
malicious
2754000
trusted library allocation
page read and write
malicious
26B8000
trusted library allocation
page read and write
malicious
2758000
trusted library allocation
page read and write
malicious
26B4000
trusted library allocation
page read and write
malicious
2701000
trusted library allocation
page read and write
malicious
26E1000
trusted library allocation
page read and write
malicious
42C000
unkown
page readonly
47BF000
stack
page read and write
930000
trusted library allocation
page read and write
636000
heap
page read and write
4BBE000
stack
page read and write
98B000
trusted library allocation
page execute and read and write
6B1000
heap
page read and write
4C5000
heap
page read and write
47F0000
trusted library allocation
page read and write
726000
heap
page read and write
2147000
trusted library allocation
page execute and read and write
47FC000
trusted library allocation
page read and write
637000
heap
page read and write
36AB000
trusted library allocation
page read and write
600000
heap
page read and write
19B000
stack
page read and write
830000
trusted library allocation
page read and write
BDF000
stack
page read and write
6B5000
heap
page read and write
42A000
unkown
page write copy
47C0000
trusted library allocation
page read and write
6D0000
heap
page read and write
360B000
trusted library allocation
page read and write
6B5000
heap
page read and write
A74000
trusted library allocation
page read and write
36E4000
trusted library allocation
page read and write
787000
trusted library allocation
page execute and read and write
47F6000
trusted library allocation
page read and write
63A000
heap
page read and write
689000
heap
page read and write
7E0000
heap
page execute and read and write
6A0000
heap
page read and write
46BE000
stack
page read and write
47F0000
trusted library allocation
page read and write
740000
trusted library allocation
page read and write
1060000
heap
page read and write
3701000
trusted library allocation
page read and write
862000
trusted library allocation
page execute and read and write
6E0000
heap
page read and write
4DFF000
stack
page read and write
4830000
trusted library allocation
page execute and read and write
910000
trusted library allocation
page read and write
47DF000
stack
page read and write
560000
heap
page read and write
84A000
trusted library allocation
page execute and read and write
627000
heap
page read and write
942000
trusted library allocation
page execute and read and write
6DE000
heap
page read and write
830000
trusted library allocation
page read and write
2681000
trusted library allocation
page read and write
1170000
heap
page read and write
4D18000
heap
page read and write
98F000
stack
page read and write
430000
heap
page read and write
372E000
trusted library allocation
page read and write
877000
trusted library allocation
page execute and read and write
47F0000
trusted library allocation
page read and write
68F000
heap
page read and write
63A000
heap
page read and write
629000
heap
page read and write
50AF000
stack
page read and write
67D000
heap
page read and write
62E000
heap
page read and write
4BDF000
stack
page read and write
498E000
stack
page read and write
E2F000
stack
page read and write
62B000
heap
page read and write
87A000
trusted library allocation
page execute and read and write
4800000
trusted library allocation
page execute and read and write
67E000
heap
page read and write
9DF000
stack
page read and write
5C5000
heap
page read and write
534F000
stack
page read and write
3704000
trusted library allocation
page read and write
196000
stack
page read and write
EA0000
heap
page read and write
94A000
trusted library allocation
page execute and read and write
4930000
heap
page read and write
4A9F000
stack
page read and write
598000
heap
page read and write
69F000
stack
page read and write
595000
heap
page read and write
66F000
heap
page read and write
62D000
heap
page read and write
590000
heap
page read and write
47F3000
trusted library allocation
page read and write
199000
stack
page read and write
68B000
heap
page read and write
54E000
stack
page read and write
6D9000
heap
page read and write
678000
heap
page read and write
196000
stack
page read and write
4D18000
heap
page read and write
47FF000
stack
page read and write
2132000
trusted library allocation
page execute and read and write
228F000
stack
page read and write
6BD000
heap
page read and write
A84000
trusted library allocation
page read and write
6B5000
heap
page read and write
550000
heap
page read and write
68A000
heap
page read and write
6DA000
heap
page read and write
481F000
stack
page read and write
402000
unkown
page execute read
74C000
trusted library allocation
page execute and read and write
639000
heap
page read and write
616000
heap
page read and write
199000
stack
page read and write
4D18000
heap
page read and write
4CFF000
stack
page read and write
A60000
heap
page read and write
580000
heap
page read and write
AA0000
heap
page read and write
4B9F000
stack
page read and write
8D0000
heap
page read and write
550000
heap
page read and write
603000
heap
page read and write
74A000
trusted library allocation
page execute and read and write
6CE000
heap
page read and write
4FE000
stack
page read and write
810000
heap
page read and write
AC0000
heap
page read and write
64C000
heap
page read and write
4F6F000
stack
page read and write
62A000
heap
page read and write
4D1B000
heap
page read and write
6A8000
heap
page read and write
524E000
stack
page read and write
510000
heap
page read and write
35E1000
trusted library allocation
page read and write
A90000
heap
page read and write
87A000
trusted library allocation
page execute and read and write
4A7E000
stack
page read and write
A70000
trusted library allocation
page read and write
214B000
trusted library allocation
page execute and read and write
4D1A000
heap
page read and write
26A8000
trusted library allocation
page read and write
73A000
trusted library allocation
page execute and read and write
4800000
trusted library allocation
page execute and read and write
6BF000
stack
page read and write
440000
heap
page read and write
218E000
stack
page read and write
635000
heap
page read and write
6B1000
heap
page read and write
7CF000
heap
page read and write
627000
heap
page read and write
6F0000
heap
page read and write
417000
unkown
page execute read
4E2F000
stack
page read and write
49CC000
stack
page read and write
4FB000
stack
page read and write
6D5000
heap
page read and write
4D1A000
heap
page read and write
5F3000
heap
page read and write
49CE000
stack
page read and write
686000
heap
page read and write
64C000
heap
page read and write
880000
heap
page read and write
600000
heap
page read and write
850000
trusted library allocation
page read and write
5E0000
heap
page read and write
49D0000
heap
page read and write
3681000
trusted library allocation
page read and write
6B1000
heap
page read and write
970000
heap
page read and write
9A000
stack
page read and write
4BEE000
stack
page read and write
6D3000
heap
page read and write
70F000
heap
page read and write
C30000
heap
page execute and read and write
762000
heap
page read and write
5F1000
heap
page read and write
747000
trusted library allocation
page execute and read and write
A80000
trusted library allocation
page read and write
627000
heap
page read and write
689000
heap
page read and write
952000
trusted library allocation
page execute and read and write
4D2E000
stack
page read and write
23BF000
stack
page read and write
6D5000
heap
page read and write
36E1000
trusted library allocation
page read and write
67D000
heap
page read and write
AC0000
trusted library allocation
page execute and read and write
47C0000
trusted library allocation
page read and write
3724000
trusted library allocation
page read and write
4C0000
heap
page read and write
A90000
heap
page read and write
850000
heap
page read and write
4800000
trusted library allocation
page execute and read and write
494D000
stack
page read and write
676000
heap
page read and write
500000
heap
page read and write
4CDF000
stack
page read and write
66F000
heap
page read and write
6B1000
heap
page read and write
4E5000
heap
page read and write
B00000
trusted library allocation
page read and write
673000
heap
page read and write
6B1000
heap
page read and write
852000
trusted library allocation
page execute and read and write
86A000
trusted library allocation
page execute and read and write
684000
heap
page read and write
6CE000
heap
page read and write
860000
trusted library allocation
page read and write
75E000
heap
page read and write
95A000
trusted library allocation
page execute and read and write
987000
trusted library allocation
page execute and read and write
937000
trusted library allocation
page execute and read and write
972000
trusted library allocation
page execute and read and write
8F0000
heap
page read and write
8CE000
stack
page read and write
952000
trusted library allocation
page execute and read and write
4A30000
heap
page read and write
670000
heap
page read and write
AD0000
trusted library allocation
page read and write
63B000
heap
page read and write
239F000
stack
page read and write
70D000
heap
page read and write
ABE000
stack
page read and write
54E000
unkown
page read and write
85A000
trusted library allocation
page execute and read and write
600000
heap
page read and write
95A000
trusted library allocation
page execute and read and write
4E6E000
stack
page read and write
684000
heap
page read and write
632000
heap
page read and write
670000
heap
page read and write
742000
trusted library allocation
page execute and read and write
632000
heap
page read and write
48D0000
trusted library allocation
page execute and read and write
85C000
trusted library allocation
page execute and read and write
26A3000
trusted library allocation
page read and write
619000
heap
page read and write
9CE000
stack
page read and write
64D000
heap
page read and write
4EE000
stack
page read and write
4CBF000
stack
page read and write
4CF0000
heap
page read and write
6DE000
heap
page read and write
4BE000
stack
page read and write
6DE000
stack
page read and write
493E000
stack
page read and write
674000
heap
page read and write
430000
heap
page read and write
6AE000
heap
page read and write
4A10000
unclassified section
page read and write
199000
stack
page read and write
A66000
heap
page read and write
82F000
heap
page read and write
7CE000
stack
page read and write
4890000
heap
page read and write
6D0000
heap
page read and write
6CE000
heap
page read and write
67F000
heap
page read and write
47C7000
trusted library allocation
page read and write
B10000
heap
page read and write
887000
trusted library allocation
page execute and read and write
6B5000
heap
page read and write
842000
trusted library allocation
page execute and read and write
857000
trusted library allocation
page execute and read and write
770000
heap
page read and write
682000
heap
page read and write
199000
stack
page read and write
4B0000
heap
page execute and read and write
2751000
trusted library allocation
page read and write
3721000
trusted library allocation
page read and write
63B000
heap
page read and write
5D0000
heap
page read and write
430000
heap
page read and write
6DB000
heap
page read and write
627000
heap
page read and write
1E0000
heap
page read and write
78B000
trusted library allocation
page execute and read and write
4D18000
heap
page read and write
720000
trusted library allocation
page read and write
AF0000
heap
page read and write
62D000
heap
page read and write
922000
trusted library allocation
page execute and read and write
62E000
heap
page read and write
9B000
stack
page read and write
841000
heap
page read and write
79E000
heap
page read and write
4F3000
stack
page read and write
4D17000
heap
page read and write
790000
heap
page read and write
47C9000
trusted library allocation
page read and write
AD0000
heap
page read and write
680000
heap
page read and write
494E000
stack
page read and write
AB0000
trusted library allocation
page read and write
196000
stack
page read and write
440000
heap
page read and write
6CE000
heap
page read and write
84A000
trusted library allocation
page execute and read and write
5EB000
heap
page read and write
55E000
stack
page read and write
79A000
heap
page read and write
400000
unkown
page readonly
2748000
trusted library allocation
page read and write
6CE000
heap
page read and write
196000
stack
page read and write
92A000
trusted library allocation
page execute and read and write
920000
trusted library allocation
page read and write
677000
heap
page read and write
7B6000
heap
page read and write
6B5000
heap
page read and write
12EE000
stack
page read and write
4C0000
heap
page read and write
4DDF000
stack
page read and write
47C5000
trusted library allocation
page read and write
4CEF000
stack
page read and write
3684000
trusted library allocation
page read and write
6CF000
heap
page read and write
66F000
heap
page read and write
6D5000
heap
page read and write
4CEF000
stack
page read and write
2140000
trusted library allocation
page read and write
C1E000
stack
page read and write
47E000
stack
page read and write
680000
heap
page read and write
55E000
stack
page read and write
62E000
heap
page read and write
6DA000
heap
page read and write
809000
heap
page read and write
957000
trusted library allocation
page execute and read and write
76A000
trusted library allocation
page execute and read and write
670000
heap
page read and write
4B7F000
stack
page read and write
673000
heap
page read and write
51EC000
stack
page read and write
89F000
stack
page read and write
4A0D000
stack
page read and write
ADE000
stack
page read and write
4C9F000
stack
page read and write
671000
heap
page read and write
8A0000
heap
page read and write
7F0000
heap
page read and write
9B000
stack
page read and write
67E000
heap
page read and write
590000
heap
page read and write
64F000
heap
page read and write
430000
heap
page read and write
4E0000
heap
page read and write
4BAE000
stack
page read and write
9BE000
stack
page read and write
233F000
stack
page read and write
687000
heap
page read and write
97A000
trusted library allocation
page execute and read and write
732000
trusted library allocation
page execute and read and write
67D000
heap
page read and write
685000
heap
page read and write
4D18000
heap
page read and write
9B000
stack
page read and write
273B000
trusted library allocation
page read and write
374B000
trusted library allocation
page read and write
9B000
stack
page read and write
580000
heap
page read and write
762000
trusted library allocation
page execute and read and write
570000
heap
page execute and read and write
47BF000
stack
page read and write
490E000
stack
page read and write
4800000
trusted library allocation
page execute and read and write
2142000
trusted library allocation
page read and write
9CE000
stack
page read and write
6B1000
heap
page read and write
8EF000
stack
page read and write
6F8000
heap
page read and write
47C4000
trusted library allocation
page read and write
4D11000
heap
page read and write
6D0000
heap
page execute and read and write
686000
heap
page read and write
69F000
stack
page read and write
4D11000
heap
page read and write
64C000
heap
page read and write
967000
trusted library allocation
page execute and read and write
196000
stack
page read and write
747000
heap
page read and write
670000
heap
page read and write
930000
heap
page read and write
4D12000
heap
page read and write
6B1000
heap
page read and write
93C000
trusted library allocation
page execute and read and write
4FAE000
stack
page read and write
4850000
heap
page read and write
83F000
heap
page read and write
46BE000
stack
page read and write
2721000
trusted library allocation
page read and write
842000
trusted library allocation
page execute and read and write
8AF000
unkown
page read and write
70F000
heap
page read and write
570000
heap
page read and write
67D000
heap
page read and write
950000
trusted library allocation
page read and write
4ADF000
stack
page read and write
4AAE000
stack
page read and write
4A3F000
stack
page read and write
362F000
trusted library allocation
page read and write
4820000
trusted library allocation
page execute and read and write
5AD000
heap
page read and write
681000
heap
page read and write
93A000
trusted library allocation
page execute and read and write
4D13000
heap
page read and write
D2E000
stack
page read and write
4840000
trusted library allocation
page read and write
498C000
stack
page read and write
490E000
stack
page read and write
5F4000
heap
page read and write
68A000
heap
page read and write
6CE000
heap
page read and write
199000
stack
page read and write
45E8000
trusted library allocation
page read and write
67F000
heap
page read and write
4BEF000
stack
page read and write
66F000
heap
page read and write
62D000
heap
page read and write
68C000
heap
page read and write
678000
heap
page read and write
5B5000
heap
page read and write
26B1000
trusted library allocation
page read and write
95C000
trusted library allocation
page execute and read and write
59E000
stack
page read and write
88B000
trusted library allocation
page execute and read and write
213A000
trusted library allocation
page execute and read and write
63B000
heap
page read and write
6DA000
heap
page read and write
8D0000
heap
page read and write
1E5000
heap
page read and write
575000
heap
page read and write
12AE000
stack
page read and write
689000
heap
page read and write
4990000
heap
page read and write
498E000
stack
page read and write
6B5000
heap
page read and write
402000
unkown
page execute read
96B000
trusted library allocation
page execute and read and write
494E000
stack
page read and write
932000
trusted library allocation
page execute and read and write
64C000
heap
page read and write
41A000
unkown
page execute read
2743000
trusted library allocation
page read and write
75C000
heap
page read and write
682000
heap
page read and write
50EC000
stack
page read and write
872000
trusted library allocation
page execute and read and write
5B0000
heap
page read and write
63A000
heap
page read and write
370B000
trusted library allocation
page read and write
628000
heap
page read and write
78F000
stack
page read and write
There are 446 hidden memdumps, click here to show them.