IOC Report
DHL_67329033929228____________________________.exe

loading gif

Files

File Path
Type
Category
Malicious
DHL_67329033929228____________________________.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\autEFD.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autF4C.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\epistemology
data
dropped
C:\Users\user\AppData\Local\Temp\outvaunts
ASCII text, with very long lines (29748), with no line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DHL_67329033929228____________________________.exe
"C:\Users\user\Desktop\DHL_67329033929228____________________________.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\DHL_67329033929228____________________________.exe"
malicious

URLs

Name
IP
Malicious
https://sectigo.com/CPS0
unknown
http://mail.worlorderbillions.top
unknown
https://account.dyn.com/
unknown
http://worlorderbillions.top
unknown

Domains

Name
IP
Malicious
mail.worlorderbillions.top
unknown
malicious
worlorderbillions.top
185.244.151.84

IPs

IP
Domain
Country
Malicious
185.244.151.84
worlorderbillions.top
Netherlands

Memdumps

Base Address
Regiontype
Protect
Malicious
532000
system
page execute and read and write
malicious
259A000
trusted library allocation
page read and write
malicious
D30000
direct allocation
page read and write
malicious
2521000
trusted library allocation
page read and write
malicious
256E000
trusted library allocation
page read and write
malicious
1333000
heap
page read and write
920000
trusted library allocation
page execute and read and write
4A30000
heap
page read and write
D84000
heap
page read and write
65D000
trusted library allocation
page execute and read and write
654000
trusted library allocation
page read and write
13D0000
heap
page read and write
1313000
heap
page read and write
4F2D000
stack
page read and write
1383000
heap
page read and write
3CB0000
direct allocation
page read and write
59FD000
stack
page read and write
1396000
heap
page read and write
568F000
stack
page read and write
676000
trusted library allocation
page execute and read and write
67A000
trusted library allocation
page execute and read and write
4A19000
trusted library allocation
page read and write
697000
trusted library allocation
page execute and read and write
784000
heap
page read and write
70231000
unkown
page execute read
4DEE000
stack
page read and write
6400000
heap
page read and write
1383000
heap
page read and write
3D8D000
direct allocation
page read and write
7B8000
heap
page read and write
3BE3000
direct allocation
page read and write
59B0000
trusted library allocation
page execute and read and write
6220000
trusted library allocation
page read and write
4992000
trusted library allocation
page read and write
2588000
trusted library allocation
page read and write
134D000
heap
page read and write
128E000
stack
page read and write
1318000
heap
page read and write
B50000
trusted library allocation
page read and write
940000
trusted library allocation
page read and write
5990000
trusted library allocation
page execute and read and write
E88000
unkown
page readonly
3E4E000
direct allocation
page read and write
4CAE000
stack
page read and write
1383000
heap
page read and write
3DFE000
direct allocation
page read and write
251E000
stack
page read and write
3D8D000
direct allocation
page read and write
DC0000
unkown
page readonly
640000
trusted library allocation
page read and write
59A6000
trusted library allocation
page read and write
3DFE000
direct allocation
page read and write
5790000
heap
page read and write
4B6C000
stack
page read and write
1387000
heap
page read and write
1AEE000
stack
page read and write
7A6000
heap
page read and write
3E4E000
direct allocation
page read and write
57B6000
heap
page read and write
5C9D000
stack
page read and write
1FA000
stack
page read and write
DC0000
unkown
page readonly
611E000
stack
page read and write
1334000
heap
page read and write
7024D000
unkown
page read and write
1334000
heap
page read and write
256C000
trusted library allocation
page read and write
134C000
heap
page read and write
70230000
unkown
page readonly
134C000
heap
page read and write
3DFE000
direct allocation
page read and write
930000
trusted library allocation
page read and write
134C000
heap
page read and write
1324000
heap
page read and write
1334000
heap
page read and write
B40000
heap
page read and write
3B10000
direct allocation
page read and write
4A23000
heap
page read and write
461D000
stack
page read and write
3549000
trusted library allocation
page read and write
6F8000
heap
page read and write
134C000
heap
page read and write
5A00000
trusted library allocation
page read and write
660000
trusted library allocation
page read and write
670000
trusted library allocation
page read and write
1324000
heap
page read and write
13B1000
heap
page read and write
12AB000
stack
page read and write
5ADE000
stack
page read and write
5A9E000
stack
page read and write
1383000
heap
page read and write
B3C000
stack
page read and write
5B0000
heap
page read and write
13B2000
heap
page read and write
57F2000
heap
page read and write
DC1000
unkown
page execute read
3AC0000
direct allocation
page read and write
BAE000
stack
page read and write
49F0000
heap
page execute and read and write
4A10000
trusted library allocation
page read and write
A90000
heap
page read and write
6B0000
trusted library allocation
page read and write
4EEE000
stack
page read and write
3C33000
direct allocation
page read and write
E83000
unkown
page write copy
3C60000
direct allocation
page read and write
4C6C000
stack
page read and write
2596000
trusted library allocation
page read and write
1383000
heap
page read and write
134C000
heap
page read and write
650000
trusted library allocation
page read and write
69B000
trusted library allocation
page execute and read and write
6C8000
heap
page read and write
1333000
heap
page read and write
5AE0000
trusted library allocation
page read and write
129E000
stack
page read and write
530000
system
page execute and read and write
57AB000
heap
page read and write
695000
trusted library allocation
page execute and read and write
1344000
heap
page read and write
D20000
direct allocation
page execute and read and write
498D000
trusted library allocation
page read and write
59A0000
trusted library allocation
page read and write
3D8D000
direct allocation
page read and write
4A20000
heap
page read and write
8D0000
heap
page execute and read and write
4FDC000
trusted library allocation
page read and write
E75000
unkown
page readonly
3B10000
direct allocation
page read and write
3584000
trusted library allocation
page read and write
3DDD000
direct allocation
page read and write
C10000
heap
page read and write
3DD9000
direct allocation
page read and write
134C000
heap
page read and write
13B1000
heap
page read and write
497A000
trusted library allocation
page read and write
12F8000
heap
page read and write
7024F000
unkown
page readonly
3D89000
direct allocation
page read and write
134C000
heap
page read and write
91E000
stack
page read and write
685000
heap
page read and write
600000
heap
page read and write
D00000
heap
page read and write
3E4E000
direct allocation
page read and write
12CC000
stack
page read and write
3B10000
direct allocation
page read and write
1333000
heap
page read and write
BEE000
stack
page read and write
680000
heap
page read and write
621F000
stack
page read and write
DC1000
unkown
page execute read
E7F000
unkown
page write copy
70246000
unkown
page readonly
6C0000
heap
page read and write
134C000
heap
page read and write
1383000
heap
page read and write
3D89000
direct allocation
page read and write
B60000
trusted library allocation
page read and write
497E000
trusted library allocation
page read and write
1383000
heap
page read and write
3DDD000
direct allocation
page read and write
653000
trusted library allocation
page execute and read and write
3AC0000
direct allocation
page read and write
1343000
heap
page read and write
BF0000
heap
page read and write
3BE3000
direct allocation
page read and write
1EEE000
stack
page read and write
3AC0000
direct allocation
page read and write
56E000
system
page execute and read and write
1396000
heap
page read and write
4F8000
stack
page read and write
4986000
trusted library allocation
page read and write
134C000
heap
page read and write
7EFF0000
trusted library allocation
page execute and read and write
3BE3000
direct allocation
page read and write
3DDD000
direct allocation
page read and write
25AB000
trusted library allocation
page read and write
A39000
stack
page read and write
496B000
trusted library allocation
page read and write
6250000
heap
page read and write
3DD9000
direct allocation
page read and write
1318000
heap
page read and write
4960000
trusted library allocation
page read and write
1324000
heap
page read and write
4981000
trusted library allocation
page read and write
D80000
heap
page read and write
13D0000
heap
page read and write
1383000
heap
page read and write
134C000
heap
page read and write
1383000
heap
page read and write
3BE3000
direct allocation
page read and write
4DAE000
stack
page read and write
1383000
heap
page read and write
1335000
heap
page read and write
4966000
trusted library allocation
page read and write
3C33000
direct allocation
page read and write
1322000
heap
page read and write
950000
heap
page read and write
3D89000
direct allocation
page read and write
5AF0000
trusted library allocation
page read and write
759000
heap
page read and write
E4F000
unkown
page readonly
692000
trusted library allocation
page read and write
580D000
heap
page read and write
3DFE000
direct allocation
page read and write
672000
trusted library allocation
page read and write
73D000
heap
page read and write
1383000
heap
page read and write
3CB0000
direct allocation
page read and write
25A2000
trusted library allocation
page read and write
3C33000
direct allocation
page read and write
1387000
heap
page read and write
3C60000
direct allocation
page read and write
5AE7000
trusted library allocation
page read and write
E75000
unkown
page readonly
1383000
heap
page read and write
3AC0000
direct allocation
page read and write
1334000
heap
page read and write
A68000
trusted library allocation
page read and write
6F5000
heap
page read and write
496E000
trusted library allocation
page read and write
3D8D000
direct allocation
page read and write
3DD9000
direct allocation
page read and write
134C000
heap
page read and write
1334000
heap
page read and write
3D89000
direct allocation
page read and write
3CB0000
direct allocation
page read and write
E4F000
unkown
page readonly
66D000
trusted library allocation
page execute and read and write
13D1000
heap
page read and write
4FD0000
trusted library allocation
page read and write
49A0000
heap
page read and write
E88000
unkown
page readonly
3C60000
direct allocation
page read and write
E7F000
unkown
page read and write
6260000
trusted library allocation
page execute and read and write
3521000
trusted library allocation
page read and write
12F0000
heap
page read and write
4972000
trusted library allocation
page read and write
C50000
heap
page read and write
134C000
heap
page read and write
B70000
heap
page read and write
3C60000
direct allocation
page read and write
1344000
heap
page read and write
There are 235 hidden memdumps, click here to show them.