IOC Report
Updater.exe

loading gif

Files

File Path
Type
Category
Malicious
Updater.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Updater.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Updater.exe
"C:\Users\user\Desktop\Updater.exe"
malicious

URLs

Name
IP
Malicious
http://can.thisilient.com
unknown
https://can.thisilient.com/r
45.33.84.9
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://can.thisilient.com
unknown

Domains

Name
IP
Malicious
can.thisilient.com
45.33.84.9

IPs

IP
Domain
Country
Malicious
45.33.84.9
can.thisilient.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Updater_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Updater_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Updater_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Updater_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Updater_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Updater_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Updater_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Updater_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Updater_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Updater_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Updater_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Updater_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Updater_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Updater_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2A8DF734000
heap
page read and write
D27C1FD000
stack
page read and write
7FFD349AF000
trusted library allocation
page read and write
2A8DF7BF000
heap
page read and write
2A8DF7E7000
heap
page read and write
2A8C55C0000
heap
page read and write
D27B9FD000
stack
page read and write
D27ADFE000
stack
page read and write
7FFD34963000
trusted library allocation
page read and write
D2789FE000
stack
page read and write
D279DFE000
stack
page read and write
2A8C6FDC000
trusted library allocation
page read and write
7FFD34940000
trusted library allocation
page read and write
2A8C700C000
trusted library allocation
page read and write
2A8C702E000
trusted library allocation
page read and write
2A8C6FD9000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page read and write
7FFD34988000
trusted library allocation
page read and write
7FFD349B6000
trusted library allocation
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
D27A5F9000
stack
page read and write
7FFD34A10000
trusted library allocation
page read and write
2A8C53CF000
heap
page read and write
7FFD348C0000
trusted library allocation
page execute and read and write
D2785FF000
stack
page read and write
2A8C55B5000
heap
page read and write
D2781F1000
stack
page read and write
7FF4EB5E0000
trusted library allocation
page execute and read and write
D27BDFB000
stack
page read and write
2A8DF940000
heap
page read and write
2A8C7032000
trusted library allocation
page read and write
7FFD347A2000
trusted library allocation
page read and write
2A8DF7BC000
heap
page read and write
7FFD347A4000
trusted library allocation
page read and write
2A8C7000000
trusted library allocation
page read and write
7FFD347CB000
trusted library allocation
page execute and read and write
7FFD3499B000
trusted library allocation
page read and write
2A8DF766000
heap
page read and write
D2799FE000
stack
page read and write
7FFD349C0000
trusted library allocation
page read and write
D2791FE000
stack
page read and write
7FFD34981000
trusted library allocation
page read and write
2A8C53A0000
heap
page read and write
2A8DF700000
heap
page read and write
7FFD3495F000
trusted library allocation
page read and write
2A8C5570000
heap
page read and write
7FFD349E0000
trusted library allocation
page read and write
7FFD347C4000
trusted library allocation
page read and write
7FFD347BD000
trusted library allocation
page execute and read and write
7FFD349A5000
trusted library allocation
page read and write
D277B8F000
stack
page read and write
2A8C567A000
heap
page read and write
7FFD34986000
trusted library allocation
page read and write
2A8C53A6000
heap
page read and write
7FFD34856000
trusted library allocation
page read and write
D27CDFE000
stack
page read and write
7FFD34860000
trusted library allocation
page execute and read and write
D277B4E000
stack
page read and write
2A8C53CB000
heap
page read and write
D27A9FE000
stack
page read and write
2A8C7003000
trusted library allocation
page read and write
2A8C55B0000
heap
page read and write
7FFD34950000
trusted library allocation
page read and write
2A8C540D000
heap
page read and write
2A8C701E000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
2A8C6E60000
trusted library allocation
page read and write
2A8DF7FD000
heap
page read and write
D27A1FE000
stack
page read and write
2A8C53E2000
heap
page read and write
2A8C5670000
heap
page read and write
2A8C55BA000
heap
page read and write
7FFD349D0000
trusted library allocation
page read and write
2A8C6F20000
heap
page read and write
7FFD34955000
trusted library allocation
page read and write
2A8C6FF8000
trusted library allocation
page read and write
2A8DF7CE000
heap
page read and write
7FFD3495A000
trusted library allocation
page read and write
7FFD349C8000
trusted library allocation
page read and write
7FFD349B8000
trusted library allocation
page read and write
D27B5FE000
stack
page read and write
7FFD347CD000
trusted library allocation
page execute and read and write
2A8C5610000
trusted library allocation
page read and write
2A8C5390000
heap
page read and write
2A8C6EF0000
heap
page execute and read and write
7FFD34984000
trusted library allocation
page read and write
7FFD347C0000
trusted library allocation
page read and write
2A8C5675000
heap
page read and write
7FFD34886000
trusted library allocation
page execute and read and write
7FFD347A0000
trusted library allocation
page read and write
D278DFE000
stack
page read and write
2A8C53AC000
heap
page read and write
7FFD347B2000
trusted library allocation
page read and write
7FFD34A30000
trusted library allocation
page execute and read and write
2A8DF708000
heap
page read and write
2A8C6E80000
heap
page execute and read and write
7FFD34990000
trusted library allocation
page read and write
D2795FD000
stack
page read and write
D27B1FD000
stack
page read and write
2A8C5590000
heap
page read and write
2A8DF94A000
heap
page read and write
D27C9FA000
stack
page read and write
2A8C5302000
unkown
page readonly
7FFD347A3000
trusted library allocation
page execute and read and write
7FFD3496A000
trusted library allocation
page read and write
2A8D6F31000
trusted library allocation
page read and write
2A8DF7E5000
heap
page read and write
7FFD347FC000
trusted library allocation
page execute and read and write
7FFD349F0000
trusted library allocation
page read and write
2A8C53E0000
heap
page read and write
2A8C7034000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD3485C000
trusted library allocation
page execute and read and write
D27C5FE000
stack
page read and write
2A8C6F31000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
2A8C703C000
trusted library allocation
page read and write
2A8C5630000
trusted library allocation
page read and write
2A8C5300000
unkown
page readonly
2A8C5419000
heap
page read and write
7FFD34A00000
trusted library allocation
page read and write
2A8DF7AD000
heap
page read and write
There are 112 hidden memdumps, click here to show them.