IOC Report
Order Enquiry MX-M754N_20240207_114441.exe

loading gif

Files

File Path
Type
Category
Malicious
Order Enquiry MX-M754N_20240207_114441.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\autF562.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autF5B1.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\differences
data
dropped
C:\Users\user\AppData\Local\Temp\myriopodous
ASCII text, with very long lines (29744), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Order Enquiry MX-M754N_20240207_114441.exe
"C:\Users\user\Desktop\Order Enquiry MX-M754N_20240207_114441.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\Order Enquiry MX-M754N_20240207_114441.exe"
malicious

URLs

Name
IP
Malicious
http://r3.o.lencr.org0
unknown
https://account.dyn.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://bezelety.top
unknown
http://r3.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
bezelety.top
194.36.191.196

IPs

IP
Domain
Country
Malicious
194.36.191.196
bezelety.top
Netherlands

Memdumps

Base Address
Regiontype
Protect
Malicious
32A8000
trusted library allocation
page read and write
malicious
40C0000
direct allocation
page read and write
malicious
3231000
trusted library allocation
page read and write
malicious
327E000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
1550000
trusted library allocation
page read and write
1CA000
unkown
page readonly
31D2000
trusted library allocation
page read and write
447E000
direct allocation
page read and write
64E0000
heap
page read and write
5A9E000
stack
page read and write
1672000
trusted library allocation
page read and write
1685000
trusted library allocation
page execute and read and write
1260000
heap
page read and write
15A8000
heap
page read and write
4231000
trusted library allocation
page read and write
43C9000
direct allocation
page read and write
178E000
stack
page read and write
101000
unkown
page execute read
18DA000
heap
page read and write
42A0000
direct allocation
page read and write
327C000
trusted library allocation
page read and write
443E000
direct allocation
page read and write
678D000
stack
page read and write
5CDE000
stack
page read and write
5E00000
trusted library allocation
page execute and read and write
1B5000
unkown
page readonly
31E6000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
1380000
heap
page read and write
5840000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
4259000
trusted library allocation
page read and write
7FB00000
trusted library allocation
page execute and read and write
6D8E000
stack
page read and write
101000
unkown
page execute read
70F0000
heap
page read and write
19B1000
heap
page read and write
1830000
direct allocation
page execute and read and write
447E000
direct allocation
page read and write
3060000
trusted library allocation
page read and write
4140000
direct allocation
page read and write
3210000
trusted library allocation
page read and write
1810000
heap
page read and write
5B9E000
stack
page read and write
1C3000
unkown
page write copy
1543000
trusted library allocation
page execute and read and write
19C5000
heap
page read and write
5BDE000
stack
page read and write
174D000
stack
page read and write
6F10000
trusted library allocation
page execute and read and write
4223000
direct allocation
page read and write
64F8000
heap
page read and write
440D000
direct allocation
page read and write
1882000
heap
page read and write
4140000
direct allocation
page read and write
4409000
direct allocation
page read and write
5DA0000
trusted library allocation
page read and write
FF9000
stack
page read and write
56BC000
stack
page read and write
42E0000
direct allocation
page read and write
15F4000
heap
page read and write
694D000
stack
page read and write
443E000
direct allocation
page read and write
1882000
heap
page read and write
1890000
heap
page read and write
582E000
stack
page read and write
31CB000
trusted library allocation
page read and write
43CD000
direct allocation
page read and write
400000
system
page execute and read and write
31DA000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
1676000
trusted library allocation
page execute and read and write
19B5000
heap
page read and write
16F0000
trusted library allocation
page execute and read and write
161C000
heap
page read and write
4223000
direct allocation
page read and write
3220000
heap
page execute and read and write
32B0000
trusted library allocation
page read and write
14F0000
heap
page read and write
204E000
stack
page read and write
1790000
heap
page read and write
31BC000
stack
page read and write
5DFE000
stack
page read and write
100000
unkown
page readonly
5D90000
trusted library allocation
page read and write
100000
unkown
page readonly
674F000
stack
page read and write
4140000
direct allocation
page read and write
1687000
trusted library allocation
page execute and read and write
5DB0000
trusted library allocation
page execute and read and write
19B5000
heap
page read and write
5DA6000
trusted library allocation
page read and write
1850000
heap
page read and write
6F00000
heap
page read and write
56F0000
heap
page read and write
3296000
trusted library allocation
page read and write
4263000
direct allocation
page read and write
1882000
heap
page read and write
25C0000
heap
page read and write
1BF000
unkown
page read and write
18DA000
heap
page read and write
56E0000
heap
page execute and read and write
64C0000
heap
page read and write
159A000
heap
page read and write
1544000
trusted library allocation
page read and write
32A4000
trusted library allocation
page read and write
19D4000
heap
page read and write
13D5000
heap
page read and write
1C8000
unkown
page readonly
16EE000
stack
page read and write
42E0000
direct allocation
page read and write
1630000
heap
page read and write
4409000
direct allocation
page read and write
1883000
heap
page read and write
1995000
heap
page read and write
15DB000
stack
page read and write
18DB000
heap
page read and write
19F4000
heap
page read and write
3050000
trusted library allocation
page read and write
19D4000
heap
page read and write
1BF000
unkown
page write copy
42A0000
direct allocation
page read and write
196D000
heap
page read and write
FC9000
stack
page read and write
1540000
trusted library allocation
page read and write
1570000
heap
page read and write
1642000
heap
page read and write
31E1000
trusted library allocation
page read and write
18DA000
heap
page read and write
6C8E000
stack
page read and write
4100000
direct allocation
page read and write
43CD000
direct allocation
page read and write
1682000
trusted library allocation
page read and write
42E0000
direct allocation
page read and write
15ED000
heap
page read and write
1858000
heap
page read and write
67A0000
trusted library allocation
page read and write
18B3000
heap
page read and write
440D000
direct allocation
page read and write
1D8000
unkown
page readonly
64CC000
heap
page read and write
43C9000
direct allocation
page read and write
19E3000
heap
page read and write
155D000
trusted library allocation
page execute and read and write
595C000
stack
page read and write
18BF000
heap
page read and write
1873000
heap
page read and write
168B000
trusted library allocation
page execute and read and write
3070000
heap
page read and write
15BE000
stack
page read and write
18F000
unkown
page readonly
429A000
trusted library allocation
page read and write
1B5000
unkown
page readonly
64CA000
heap
page read and write
244E000
stack
page read and write
447E000
direct allocation
page read and write
6ED0000
trusted library allocation
page read and write
4263000
direct allocation
page read and write
6797000
trusted library allocation
page read and write
5850000
heap
page read and write
4223000
direct allocation
page read and write
443E000
direct allocation
page read and write
5848000
trusted library allocation
page read and write
2FB8000
trusted library allocation
page read and write
1D8000
unkown
page readonly
18DA000
heap
page read and write
1530000
trusted library allocation
page read and write
1890000
heap
page read and write
18DA000
heap
page read and write
5853000
heap
page read and write
15A5000
heap
page read and write
1988000
heap
page read and write
154D000
trusted library allocation
page execute and read and write
532D000
stack
page read and write
18DA000
heap
page read and write
4100000
direct allocation
page read and write
13D0000
heap
page read and write
18BF000
heap
page read and write
167A000
trusted library allocation
page execute and read and write
25C4000
heap
page read and write
1C8000
unkown
page readonly
31CE000
trusted library allocation
page read and write
31ED000
trusted library allocation
page read and write
4409000
direct allocation
page read and write
5A5E000
stack
page read and write
6790000
trusted library allocation
page read and write
31DE000
trusted library allocation
page read and write
42A0000
direct allocation
page read and write
1700000
heap
page read and write
1560000
heap
page read and write
19C5000
heap
page read and write
31C0000
trusted library allocation
page read and write
188A000
heap
page read and write
4263000
direct allocation
page read and write
3200000
trusted library allocation
page read and write
18DA000
heap
page read and write
25D0000
heap
page read and write
188A000
heap
page read and write
15FC000
stack
page read and write
3298000
trusted library allocation
page read and write
440D000
direct allocation
page read and write
16A0000
trusted library allocation
page read and write
EF9000
stack
page read and write
5D8C000
trusted library allocation
page read and write
15CE000
stack
page read and write
1CA000
unkown
page readonly
43C9000
direct allocation
page read and write
18AF000
heap
page read and write
1890000
heap
page read and write
18AF000
heap
page read and write
18F000
unkown
page readonly
18FA000
heap
page read and write
1941000
heap
page read and write
4100000
direct allocation
page read and write
43CD000
direct allocation
page read and write
17F0000
heap
page read and write
317E000
stack
page read and write
18DA000
heap
page read and write
1578000
heap
page read and write
There are 210 hidden memdumps, click here to show them.