IOC Report
mluxGOTw1e.exe

loading gif

Files

File Path
Type
Category
Malicious
mluxGOTw1e.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\notepad.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\mluxGOTw1e.exe
"C:\Users\user\Desktop\mluxGOTw1e.exe"
malicious
C:\Windows\System32\notepad.exe
C:\Windows\System32\notepad.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://pastebin.com/raw/zcGavZvr
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF74951D000
unkown
page readonly
malicious
2DE317A1000
trusted library allocation
page read and write
malicious
2DE31470000
trusted library section
page read and write
malicious
7FF74951D000
unkown
page readonly
malicious
7FFAAC4E0000
trusted library allocation
page read and write
2DE417AE000
trusted library allocation
page read and write
7FFAAC5D5000
trusted library allocation
page read and write
7DF404600000
trusted library allocation
page execute and read and write
F72D77E000
stack
page read and write
2DE2FAC4000
heap
page read and write
2DE314A0000
trusted library allocation
page read and write
2DE314B0000
trusted library allocation
page read and write
2DE313F0000
heap
page read and write
2DE315A5000
heap
page read and write
F72D67E000
stack
page read and write
F72D8FF000
stack
page read and write
2DE2FB61000
heap
page read and write
7FFAAC5E8000
trusted library allocation
page execute and read and write
7DF404610000
trusted library allocation
page execute and read and write
7FFAAC4F0000
trusted library allocation
page execute and read and write
2DE31490000
trusted library allocation
page read and write
181238FC000
heap
page read and write
2DE2FB4C000
heap
page read and write
181239F0000
unkown
page read and write
2DE2F9E0000
heap
page read and write
2DE2FB4E000
heap
page read and write
7FF749533000
unkown
page readonly
2DE31490000
trusted library allocation
page read and write
2DE2FAFE000
heap
page read and write
2DE314A0000
trusted library allocation
page read and write
7FFAAC433000
trusted library allocation
page execute and read and write
2DE417A9000
trusted library allocation
page read and write
2DE31490000
trusted library allocation
page read and write
7FF74952F000
unkown
page readonly
F72D7FD000
stack
page read and write
2DE2FA90000
heap
page read and write
7FFAAC43D000
trusted library allocation
page execute and read and write
2DE2FA88000
heap
page read and write
2DE417A1000
trusted library allocation
page read and write
2DE314A0000
trusted library allocation
page read and write
7FFAAC516000
trusted library allocation
page execute and read and write
F72D97F000
stack
page read and write
2DE2FAD3000
heap
page read and write
2DE2FAD0000
heap
page read and write
7FF7494F0000
unkown
page readonly
7FFAAC5DD000
trusted library allocation
page execute and read and write
2DE2F9F0000
heap
page read and write
2DE31493000
trusted library allocation
page read and write
2DE2FAD8000
heap
page read and write
2DE31585000
heap
page read and write
2DE2FB4C000
heap
page read and write
181238F9000
heap
page read and write
7FFAAC610000
trusted library allocation
page execute and read and write
7DF4045F0000
trusted library allocation
page execute and read and write
2DE2FAD0000
heap
page read and write
2DE314A0000
trusted library allocation
page read and write
2DE317C4000
trusted library allocation
page read and write
2DE2FB48000
heap
page read and write
F72D6FF000
stack
page read and write
2DE31440000
heap
page readonly
181238F0000
heap
page read and write
2DE31493000
trusted library allocation
page read and write
7FFAAC550000
trusted library allocation
page execute and read and write
2DE2FB42000
heap
page read and write
2DE31480000
trusted library allocation
page read and write
2DE2FB63000
heap
page read and write
2DE31493000
trusted library allocation
page read and write
7FFAAC5E0000
trusted library allocation
page read and write
2DE31490000
trusted library allocation
page read and write
2DE31580000
heap
page read and write
2DE31490000
trusted library allocation
page read and write
2DE31790000
heap
page execute and read and write
2DE31493000
trusted library allocation
page read and write
2DE31483000
trusted library allocation
page read and write
2DE2FAD3000
heap
page read and write
7FF749532000
unkown
page write copy
F72D9FE000
stack
page read and write
7FFAAC445000
trusted library allocation
page read and write
7FF74951F000
unkown
page write copy
2DE2FB53000
heap
page read and write
18123770000
heap
page read and write
2DE2FABA000
heap
page read and write
2DE31430000
trusted library allocation
page read and write
7FF7494F0000
unkown
page readonly
F72D87E000
stack
page read and write
18123850000
heap
page read and write
2DE314A0000
trusted library allocation
page read and write
2DE2FAC2000
heap
page read and write
2DE2FB15000
heap
page read and write
2DE2FB61000
heap
page read and write
2DE49E61000
heap
page read and write
2DE31499000
trusted library allocation
page read and write
2018B7A000
stack
page read and write
2DE31450000
trusted library allocation
page read and write
7FF7494F1000
unkown
page execute read
7FFAAC5F0000
trusted library allocation
page read and write
7FFAAC434000
trusted library allocation
page read and write
F72D30F000
stack
page read and write
2DE2FAC4000
heap
page read and write
2DE2FA80000
heap
page read and write
7FFAAC602000
trusted library allocation
page read and write
7FFAAC5D0000
trusted library allocation
page read and write
7FFAAC440000
trusted library allocation
page read and write
2DE2FAC2000
heap
page read and write
7FFAAC5D2000
trusted library allocation
page read and write
F72D39E000
stack
page read and write
2DE2FA30000
heap
page read and write
2DE2FABA000
heap
page read and write
2DE2FB38000
heap
page read and write
7FFAAC432000
trusted library allocation
page read and write
2DE31410000
trusted library allocation
page read and write
2DE2FB48000
heap
page read and write
2DE2FB49000
heap
page read and write
2DE2FB4E000
heap
page read and write
7FF749533000
unkown
page readonly
2DE315A0000
heap
page read and write
2DE31460000
trusted library allocation
page read and write
2DE49FD0000
heap
page execute and read and write
7FF7494F1000
unkown
page execute read
2DE2FB49000
heap
page read and write
7FFAAC600000
trusted library allocation
page read and write
2DE2F9C0000
unkown
page execute read
2DE314B0000
trusted library allocation
page read and write
2DE49E60000
heap
page read and write
2DE31490000
trusted library allocation
page read and write
2DE314D0000
heap
page read and write
2DE2FAD8000
heap
page read and write
2DE2FB15000
heap
page read and write
7FF74952F000
unkown
page readonly
2DE2FAFE000
heap
page read and write
There are 120 hidden memdumps, click here to show them.