IOC Report
OC. 4515924646.exe

loading gif

Files

File Path
Type
Category
Malicious
OC. 4515924646.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
initial sample
malicious
C:\Users\user\AppData\Local\Temp\aut5891.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\unnervousness
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\OC. 4515924646.exe
"C:\Users\user\Desktop\OC. 4515924646.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\OC. 4515924646.exe"
malicious

URLs

Name
IP
Malicious
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
172000
system
page execute and read and write
malicious
1920000
direct allocation
page read and write
malicious
4210000
direct allocation
page read and write
770000
unkown
page readonly
7A8000
heap
page read and write
226E000
stack
page read and write
4210000
direct allocation
page read and write
1BE6000
heap
page read and write
5769000
heap
page read and write
1BE5000
heap
page read and write
1BE6000
heap
page read and write
45AD000
stack
page read and write
1BE5000
heap
page read and write
A17000
trusted library allocation
page execute and read and write
2486000
trusted library allocation
page read and write
1C05000
heap
page read and write
8F6000
trusted library allocation
page execute and read and write
4210000
direct allocation
page read and write
161B000
stack
page read and write
1F0000
heap
page read and write
A20000
heap
page read and write
454E000
direct allocation
page read and write
8E0000
trusted library allocation
page read and write
44D9000
direct allocation
page read and write
1A7D000
heap
page read and write
1C05000
heap
page read and write
1A7E000
heap
page read and write
5B80000
trusted library allocation
page read and write
22F0000
trusted library allocation
page read and write
5C20000
heap
page read and write
5B77000
trusted library allocation
page read and write
3EC4000
heap
page read and write
4970000
heap
page execute and read and write
906000
heap
page read and write
A12000
trusted library allocation
page read and write
1BE6000
heap
page read and write
170000
system
page execute and read and write
1BE6000
heap
page read and write
1C05000
heap
page read and write
19CC000
heap
page read and write
43B0000
direct allocation
page read and write
4F9000
stack
page read and write
8D0000
trusted library allocation
page read and write
1BE6000
heap
page read and write
24F4000
trusted library allocation
page read and write
841000
unkown
page execute and write copy
2508000
trusted library allocation
page read and write
1AAF000
heap
page read and write
22B0000
trusted library allocation
page read and write
22BB000
trusted library allocation
page read and write
454E000
direct allocation
page read and write
5B60000
trusted library allocation
page read and write
24F8000
trusted library allocation
page read and write
1A02000
heap
page read and write
22C2000
trusted library allocation
page read and write
1BF4000
heap
page read and write
2210000
trusted library allocation
page read and write
89D000
heap
page read and write
43B0000
direct allocation
page read and write
5C30000
heap
page read and write
1BE6000
heap
page read and write
182E000
stack
page read and write
4BFE000
stack
page read and write
5060000
trusted library allocation
page execute and read and write
5720000
heap
page read and write
1C2B000
heap
page read and write
1C05000
heap
page read and write
837000
heap
page read and write
4BBC000
stack
page read and write
1239000
stack
page read and write
454E000
direct allocation
page read and write
5B5E000
stack
page read and write
8F2000
trusted library allocation
page read and write
19D9000
heap
page read and write
3474000
trusted library allocation
page read and write
15FC000
stack
page read and write
1C05000
heap
page read and write
889000
heap
page read and write
163D000
stack
page read and write
44DD000
direct allocation
page read and write
1780000
heap
page read and write
771000
unkown
page execute and read and write
3EC0000
heap
page read and write
8D4000
trusted library allocation
page read and write
4418000
trusted library allocation
page read and write
24EB000
trusted library allocation
page read and write
7BE000
heap
page read and write
1C05000
heap
page read and write
1C05000
heap
page read and write
1BE6000
heap
page read and write
1C3A000
heap
page read and write
199A000
heap
page read and write
1C05000
heap
page read and write
251B000
trusted library allocation
page read and write
4AB3000
heap
page read and write
88E000
unkown
page execute and read and write
4FFE000
stack
page read and write
43B0000
direct allocation
page read and write
1A90000
heap
page read and write
19F8000
heap
page read and write
1BE8000
heap
page read and write
16A0000
heap
page read and write
573D000
heap
page read and write
1C05000
heap
page read and write
22D1000
trusted library allocation
page read and write
2300000
heap
page execute and read and write
43B0000
direct allocation
page read and write
4333000
direct allocation
page read and write
1C05000
heap
page read and write
43B0000
direct allocation
page read and write
19D7000
heap
page read and write
4E3E000
stack
page read and write
454E000
direct allocation
page read and write
4210000
direct allocation
page read and write
8FA000
trusted library allocation
page execute and read and write
454E000
direct allocation
page read and write
813000
heap
page read and write
44D9000
direct allocation
page read and write
8D3000
trusted library allocation
page execute and read and write
44D9000
direct allocation
page read and write
1BE2000
heap
page read and write
22CA000
trusted library allocation
page read and write
7D7000
heap
page read and write
1BE6000
heap
page read and write
4E7D000
stack
page read and write
1BE6000
heap
page read and write
82A000
unkown
page execute and read and write
5050000
heap
page read and write
218E000
stack
page read and write
22CE000
trusted library allocation
page read and write
1BE2000
heap
page read and write
2200000
trusted library allocation
page read and write
44DD000
direct allocation
page read and write
17CE000
stack
page read and write
24FA000
trusted library allocation
page read and write
4333000
direct allocation
page read and write
44DD000
direct allocation
page read and write
24CA000
trusted library allocation
page read and write
7A0000
heap
page read and write
454E000
direct allocation
page read and write
5A5F000
stack
page read and write
8F0000
trusted library allocation
page read and write
199E000
heap
page read and write
44D9000
direct allocation
page read and write
21E0000
trusted library allocation
page read and write
24E4000
trusted library allocation
page read and write
44D9000
direct allocation
page read and write
21F0000
trusted library allocation
page execute and read and write
43B0000
direct allocation
page read and write
4333000
direct allocation
page read and write
44DD000
direct allocation
page read and write
454E000
direct allocation
page read and write
8C0000
trusted library allocation
page read and write
1C2A000
heap
page read and write
3411000
trusted library allocation
page read and write
4980000
heap
page read and write
81E000
unkown
page execute and read and write
24D0000
trusted library allocation
page read and write
1A7D000
heap
page read and write
44DD000
direct allocation
page read and write
4D3E000
stack
page read and write
610000
heap
page read and write
240E000
stack
page read and write
1900000
heap
page read and write
4210000
direct allocation
page read and write
494C000
stack
page read and write
44DD000
direct allocation
page read and write
7F0D0000
trusted library allocation
page execute and read and write
250D000
trusted library allocation
page read and write
1BE1000
heap
page execute and read and write
1AE000
system
page execute and read and write
4210000
direct allocation
page read and write
48F0000
trusted library allocation
page read and write
869000
heap
page read and write
1BEB000
heap
page read and write
258E000
stack
page read and write
7D9000
heap
page read and write
1BE6000
heap
page read and write
19CD000
heap
page read and write
1C05000
heap
page read and write
13A000
stack
page read and write
896000
unkown
page write copy
4333000
direct allocation
page read and write
2220000
heap
page read and write
22DD000
trusted library allocation
page read and write
2445000
trusted library allocation
page read and write
4F7E000
stack
page read and write
900000
heap
page read and write
4333000
direct allocation
page read and write
5040000
trusted library allocation
page read and write
1C05000
heap
page read and write
1C05000
heap
page read and write
84B000
unkown
page execute and read and write
4CFE000
stack
page read and write
4AB0000
heap
page read and write
19D9000
heap
page read and write
44D9000
direct allocation
page read and write
503E000
stack
page read and write
22D6000
trusted library allocation
page read and write
655000
heap
page read and write
5BA0000
trusted library allocation
page execute and read and write
1980000
heap
page read and write
5B90000
trusted library allocation
page read and write
5749000
heap
page read and write
1C05000
heap
page read and write
A1B000
trusted library allocation
page execute and read and write
1BE6000
heap
page read and write
19D9000
heap
page read and write
5B70000
trusted library allocation
page read and write
17E0000
heap
page read and write
3419000
trusted library allocation
page read and write
8DD000
trusted library allocation
page execute and read and write
43B0000
direct allocation
page read and write
22BE000
trusted library allocation
page read and write
4210000
direct allocation
page read and write
160F000
stack
page read and write
2411000
trusted library allocation
page read and write
887000
heap
page read and write
3439000
trusted library allocation
page read and write
896000
unkown
page read and write
894000
unkown
page execute and write copy
8ED000
trusted library allocation
page execute and read and write
5C40000
trusted library allocation
page read and write
1990000
heap
page read and write
1BE2000
heap
page read and write
650000
heap
page read and write
770000
unkown
page readonly
630000
heap
page read and write
1C05000
heap
page read and write
44DD000
direct allocation
page read and write
44D9000
direct allocation
page read and write
1B66000
heap
page read and write
22AC000
stack
page read and write
1BE6000
heap
page read and write
5B67000
trusted library allocation
page read and write
86F000
heap
page read and write
4333000
direct allocation
page read and write
2521000
trusted library allocation
page read and write
4333000
direct allocation
page read and write
There are 229 hidden memdumps, click here to show them.