IOC Report
mtgjyX9gHF.exe

loading gif

Files

File Path
Type
Category
Malicious
mtgjyX9gHF.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\mtgjyX9gHF.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Roaming\SubDir\Clienty.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Clienty.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\mtgjyX9gHF.exe
"C:\Users\user\Desktop\mtgjyX9gHF.exe"
malicious
C:\Windows\System32\schtasks.exe
"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f
malicious
C:\Users\user\AppData\Roaming\SubDir\Clienty.exe
"C:\Users\user\AppData\Roaming\SubDir\Clienty.exe"
malicious
C:\Windows\System32\schtasks.exe
"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Clienty.exe" /rl HIGHEST /f
malicious
C:\Users\user\AppData\Roaming\SubDir\Clienty.exe
C:\Users\user\AppData\Roaming\SubDir\Clienty.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
39.102.36.209
malicious
https://api.ipify.org/
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://stackoverflow.com/q/2152978/23354sCannot
unknown
https://ipwho.is/
108.181.98.179
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ipwho.is
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://ipwho.is
unknown

Domains

Name
IP
Malicious
ipwho.is
108.181.98.179

IPs

IP
Domain
Country
Malicious
39.102.36.209
unknown
China
malicious
108.181.98.179
ipwho.is
Canada

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clienty_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clienty_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clienty_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clienty_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clienty_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clienty_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clienty_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clienty_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clienty_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clienty_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clienty_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clienty_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clienty_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clienty_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
26FF6A55000
heap
page read and write
malicious
2EB9000
trusted library allocation
page read and write
malicious
2B938AC0000
heap
page read and write
malicious
492000
unkown
page readonly
malicious
CA288A9000
stack
page read and write
malicious
2B938880000
heap
page read and write
malicious
2A31000
trusted library allocation
page read and write
malicious
32B3000
trusted library allocation
page read and write
malicious
26FF6830000
heap
page read and write
malicious
2B938AC5000
heap
page read and write
malicious
2E51000
trusted library allocation
page read and write
malicious
FE32879000
stack
page read and write
malicious
2B938888000
heap
page read and write
malicious
7B0000
unkown
page readonly
malicious
26FF683F000
heap
page read and write
malicious
26FF6A50000
heap
page read and write
malicious
1078000
heap
page read and write
7FFD342B0000
trusted library allocation
page read and write
1018000
heap
page read and write
7FFD343E0000
trusted library allocation
page read and write
26FF6A10000
heap
page read and write
7FFD34540000
trusted library allocation
page read and write
CA289AF000
stack
page read and write
7FFD34092000
trusted library allocation
page read and write
7FFD34094000
trusted library allocation
page read and write
7FFD343B0000
trusted library allocation
page read and write
1B792000
heap
page read and write
7FFD34250000
trusted library allocation
page read and write
7FFD342F0000
trusted library allocation
page execute and read and write
7FFD341B0000
trusted library allocation
page execute and read and write
1310000
trusted library allocation
page read and write
1B342000
heap
page read and write
1040000
heap
page read and write
7FFD34176000
trusted library allocation
page execute and read and write
1B836000
heap
page read and write
7FFD3427B000
trusted library allocation
page read and write
1520000
heap
page read and write
7FFD344D5000
trusted library allocation
page read and write
1B7EB000
heap
page read and write
1B7E7000
heap
page read and write
7FFD340AB000
trusted library allocation
page execute and read and write
7FFD34330000
trusted library allocation
page read and write
1490000
heap
page read and write
B9F000
heap
page read and write
1B200000
heap
page read and write
7FFD34290000
trusted library allocation
page read and write
1B74C000
heap
page read and write
2E81000
trusted library allocation
page read and write
12A39000
trusted library allocation
page read and write
2EB6000
trusted library allocation
page read and write
7FFD342F0000
trusted library allocation
page read and write
1B730000
heap
page read and write
12E65000
trusted library allocation
page read and write
7FFD34130000
trusted library allocation
page read and write
BF9000
heap
page read and write
7FFD34136000
trusted library allocation
page read and write
7FFD340EC000
trusted library allocation
page execute and read and write
E70000
heap
page read and write
11CE000
stack
page read and write
1140000
trusted library allocation
page read and write
1BA88000
heap
page read and write
7FFD3414C000
trusted library allocation
page execute and read and write
7FFD340A4000
trusted library allocation
page read and write
1B7FE000
heap
page read and write
12A45000
trusted library allocation
page read and write
1B9E0000
heap
page read and write
10AE000
heap
page read and write
2920000
heap
page read and write
7FFD34525000
trusted library allocation
page read and write
7FFD342AA000
trusted library allocation
page read and write
7FFD34370000
trusted library allocation
page read and write
1B9E3000
heap
page read and write
7FFD34083000
trusted library allocation
page execute and read and write
12F0000
trusted library allocation
page read and write
1BB1E000
stack
page read and write
104E000
heap
page read and write
7FFD34220000
trusted library allocation
page read and write
1AE80000
trusted library allocation
page read and write
1B91E000
stack
page read and write
7FFD3409D000
trusted library allocation
page execute and read and write
F31000
stack
page read and write
7FFD3413C000
trusted library allocation
page execute and read and write
FE328FF000
unkown
page read and write
1B762000
heap
page read and write
AF4000
stack
page read and write
3176000
trusted library allocation
page read and write
1B460000
heap
page read and write
7FFD34500000
trusted library allocation
page read and write
7FF4F1600000
trusted library allocation
page execute and read and write
1B940000
heap
page read and write
7FFD34281000
trusted library allocation
page read and write
7FFD342C4000
trusted library allocation
page read and write
7FFD3416C000
trusted library allocation
page execute and read and write
1CD4A000
stack
page read and write
1CA4A000
stack
page read and write
12FF000
stack
page read and write
144E000
stack
page read and write
FE3297F000
stack
page read and write
7FFD3423C000
trusted library allocation
page read and write
7FFD34170000
trusted library allocation
page execute and read and write
1B750000
heap
page read and write
7FFD34520000
trusted library allocation
page read and write
BB0000
heap
page read and write
12ECD000
trusted library allocation
page read and write
1B300000
heap
page read and write
7FFD34280000
trusted library allocation
page read and write
F05000
heap
page read and write
3174000
trusted library allocation
page read and write
7FFD340DC000
trusted library allocation
page execute and read and write
12E51000
trusted library allocation
page read and write
3305000
trusted library allocation
page read and write
C27000
heap
page read and write
7FFD341A0000
trusted library allocation
page execute and read and write
26FF6930000
heap
page read and write
1BA83000
heap
page read and write
7FFD34084000
trusted library allocation
page read and write
12A33000
trusted library allocation
page read and write
1078000
heap
page read and write
C40000
heap
page read and write
12E98000
trusted library allocation
page read and write
1C207000
stack
page read and write
7FFD34290000
trusted library allocation
page read and write
12E5E000
trusted library allocation
page read and write
1B40D000
stack
page read and write
490000
unkown
page readonly
1290000
heap
page read and write
1B1D9000
heap
page read and write
1AA60000
trusted library allocation
page read and write
1BC3F000
stack
page read and write
7FFD340A3000
trusted library allocation
page read and write
12E59000
trusted library allocation
page read and write
7FFD344DC000
trusted library allocation
page read and write
1AFB9000
stack
page read and write
1BC1E000
stack
page read and write
1C40F000
stack
page read and write
EF4000
stack
page read and write
2B50000
heap
page read and write
1BA4C000
heap
page read and write
1BDDE000
stack
page read and write
1B6A8000
heap
page read and write
1B764000
heap
page read and write
7FFD342B0000
trusted library allocation
page read and write
7FFD34410000
trusted library allocation
page execute and read and write
7FFD340D4000
trusted library allocation
page read and write
102B000
heap
page read and write
7FFD34082000
trusted library allocation
page read and write
1038000
heap
page read and write
7FFD344E0000
trusted library allocation
page execute and read and write
1580000
heap
page read and write
1B308000
heap
page read and write
10F1000
heap
page read and write
7FFD34390000
trusted library allocation
page read and write
2AA0000
heap
page read and write
B99000
heap
page read and write
1170000
heap
page read and write
BE0000
heap
page read and write
CA2892E000
unkown
page read and write
7FFD34093000
trusted library allocation
page read and write
3249000
trusted library allocation
page read and write
7FFD34166000
trusted library allocation
page read and write
2A2E000
stack
page read and write
7FFD342A0000
trusted library allocation
page read and write
F00000
heap
page read and write
1B76C000
heap
page read and write
32AF000
trusted library allocation
page read and write
1340000
heap
page read and write
1155000
heap
page read and write
7FFD340AD000
trusted library allocation
page execute and read and write
490000
unkown
page readonly
7FFD34340000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
26FF6838000
heap
page read and write
7FFD34230000
trusted library allocation
page read and write
7FFD3409D000
trusted library allocation
page execute and read and write
1B410000
heap
page read and write
7FFD34235000
trusted library allocation
page read and write
1ADBE000
heap
page read and write
7FFD34268000
trusted library allocation
page read and write
7FFD340B4000
trusted library allocation
page read and write
104C000
heap
page read and write
7FFD344D0000
trusted library allocation
page read and write
34F9000
trusted library allocation
page read and write
1B610000
heap
page execute and read and write
7FFD344B2000
trusted library allocation
page read and write
7FFD342D0000
trusted library allocation
page read and write
7FFD340B2000
trusted library allocation
page read and write
7FFD34530000
trusted library allocation
page read and write
100E000
stack
page read and write
325E000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
7FFD343C0000
trusted library allocation
page read and write
1BA8E000
heap
page read and write
1010000
heap
page read and write
1C305000
stack
page read and write
1CECE000
stack
page read and write
7FFD3429B000
trusted library allocation
page read and write
7FFD342A0000
trusted library allocation
page read and write
7FFD34300000
trusted library allocation
page read and write
1BFDE000
stack
page read and write
7FFD34261000
trusted library allocation
page read and write
7FFD34270000
trusted library allocation
page read and write
1B812000
heap
page read and write
B6C000
heap
page read and write
1120000
trusted library allocation
page read and write
7FFD34310000
trusted library allocation
page read and write
1BA6A000
heap
page read and write
7FFD34150000
trusted library allocation
page execute and read and write
12E8E000
trusted library allocation
page read and write
2E4F000
stack
page read and write
1345000
heap
page read and write
7FFD34278000
trusted library allocation
page read and write
7FFD34166000
trusted library allocation
page execute and read and write
10D7000
heap
page read and write
7FFD344B7000
trusted library allocation
page read and write
B57000
heap
page read and write
2C5E000
stack
page read and write
7FFD34510000
trusted library allocation
page execute and read and write
1B80F000
heap
page read and write
7FFD34380000
trusted library allocation
page read and write
1B3D9000
stack
page read and write
1BA89000
heap
page read and write
7FFD343F0000
trusted library allocation
page read and write
2D5A000
trusted library allocation
page read and write
7FFD342C0000
trusted library allocation
page read and write
156F000
stack
page read and write
7FFD342A5000
trusted library allocation
page read and write
1BCDE000
stack
page read and write
2B938800000
heap
page read and write
7FFD342E0000
trusted library allocation
page read and write
E40000
heap
page read and write
1BA1E000
stack
page read and write
12E53000
trusted library allocation
page read and write
7FFD34140000
trusted library allocation
page execute and read and write
26FF6A30000
heap
page read and write
1585000
heap
page read and write
C13000
heap
page read and write
7FFD340C3000
trusted library allocation
page read and write
1070000
heap
page read and write
12B0000
heap
page read and write
7FFD34196000
trusted library allocation
page execute and read and write
12E81000
trusted library allocation
page read and write
7FFD342E0000
trusted library allocation
page read and write
1B82C000
heap
page read and write
7FFD343D0000
trusted library allocation
page read and write
1B818000
heap
page read and write
7FFD34360000
trusted library allocation
page read and write
1B720000
heap
page read and write
12A31000
trusted library allocation
page read and write
FD0000
heap
page read and write
34FF000
trusted library allocation
page read and write
1CB4E000
stack
page read and write
7FFD34492000
trusted library allocation
page read and write
3296000
trusted library allocation
page read and write
1B74F000
heap
page read and write
1160000
heap
page read and write
1523000
heap
page read and write
7FFD340A0000
trusted library allocation
page read and write
14C0000
heap
page read and write
2E2E000
stack
page read and write
1B79E000
heap
page read and write
7FFD34160000
trusted library allocation
page read and write
3503000
trusted library allocation
page read and write
1B620000
heap
page read and write
1BA4F000
heap
page read and write
3309000
trusted library allocation
page read and write
7FFD342A0000
trusted library allocation
page read and write
7FFD340BD000
trusted library allocation
page execute and read and write
7FFD342C0000
trusted library allocation
page execute and read and write
7FFD342BB000
trusted library allocation
page read and write
7FFD34350000
trusted library allocation
page read and write
7FFD343A0000
trusted library allocation
page read and write
2EC1000
trusted library allocation
page read and write
7FFD34275000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
7FFD340B0000
trusted library allocation
page read and write
110E000
stack
page read and write
7FFD344A0000
trusted library allocation
page read and write
7FFD34080000
trusted library allocation
page read and write
BC0000
heap
page read and write
1B463000
heap
page read and write
7FFD340D0000
trusted library allocation
page read and write
3245000
trusted library allocation
page read and write
7FFD34140000
trusted library allocation
page read and write
7FFD340DD000
trusted library allocation
page execute and read and write
1C410000
heap
page read and write
326E000
trusted library allocation
page read and write
1BA8B000
heap
page read and write
1163000
heap
page read and write
7FFD340BD000
trusted library allocation
page execute and read and write
7FFD34146000
trusted library allocation
page read and write
2B938810000
heap
page read and write
12A3E000
trusted library allocation
page read and write
B39000
heap
page read and write
1170000
heap
page read and write
7FFD342E4000
trusted library allocation
page read and write
7FFD34255000
trusted library allocation
page read and write
14F0000
heap
page execute and read and write
7FFD340B3000
trusted library allocation
page execute and read and write
7FFD3410C000
trusted library allocation
page execute and read and write
7FFD344F0000
trusted library allocation
page read and write
3241000
trusted library allocation
page read and write
7FFD3408D000
trusted library allocation
page execute and read and write
1096000
heap
page read and write
7FFD34490000
trusted library allocation
page read and write
11F5000
heap
page read and write
10AC000
heap
page read and write
102F000
heap
page read and write
E3F000
stack
page read and write
7FFD342D0000
trusted library allocation
page execute and read and write
7FFD342D0000
trusted library allocation
page read and write
7FFD34400000
trusted library allocation
page read and write
1BF37000
stack
page read and write
7FFD341D0000
trusted library allocation
page execute and read and write
3229000
trusted library allocation
page read and write
12EAD000
trusted library allocation
page read and write
2B938830000
heap
page read and write
7FFD342B4000
trusted library allocation
page read and write
7FFD34280000
trusted library allocation
page read and write
107A000
heap
page read and write
E45000
heap
page read and write
1320000
trusted library allocation
page read and write
B9B000
heap
page read and write
1323000
trusted library allocation
page read and write
B59000
heap
page read and write
3263000
trusted library allocation
page read and write
1175000
heap
page read and write
7FFD342B0000
trusted library allocation
page read and write
7FFD34298000
trusted library allocation
page read and write
2E70000
heap
page execute and read and write
1BEDE000
stack
page read and write
F80000
heap
page read and write
1036000
heap
page read and write
B50000
heap
page read and write
E50000
heap
page read and write
3501000
trusted library allocation
page read and write
B30000
heap
page read and write
7FFD340B4000
trusted library allocation
page read and write
2900000
heap
page execute and read and write
B6E000
heap
page read and write
7FFD342C0000
trusted library allocation
page read and write
2D40000
heap
page execute and read and write
7FFD340CD000
trusted library allocation
page execute and read and write
11F0000
heap
page read and write
7FFD340AD000
trusted library allocation
page execute and read and write
1B8E0000
heap
page execute and read and write
1B816000
heap
page read and write
7FFD34285000
trusted library allocation
page read and write
7FFD34093000
trusted library allocation
page execute and read and write
7FFD34320000
trusted library allocation
page read and write
C2E000
heap
page read and write
1B81B000
heap
page read and write
D20000
heap
page read and write
1AEB0000
trusted library allocation
page read and write
There are 343 hidden memdumps, click here to show them.