IOC Report
18112024_Dokman_1 Kas_m 2024- Avans_T24-2112184_dekont.exe

loading gif

Files

File Path
Type
Category
Malicious
18112024_Dokman_1 Kas_m 2024- Avans_T24-2112184_dekont.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\aut745C.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\overfertilize
data
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\18112024_Dokman_1 Kas_m 2024- Avans_T24-2112184_dekont.exe
"C:\Users\user\Desktop\18112024_Dokman_1 Kas_m 2024- Avans_T24-2112184_dekont.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\18112024_Dokman_1 Kas_m 2024- Avans_T24-2112184_dekont.exe"
malicious

URLs

Name
IP
Malicious
http://zqamcx.com
unknown
https://account.dyn.com/
unknown
http://r11.o.lencr.org0#
unknown
http://r11.i.lencr.org/0#
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
zqamcx.com
78.110.166.82

IPs

IP
Domain
Country
Malicious
78.110.166.82
zqamcx.com
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
2AF8000
trusted library allocation
page read and write
malicious
2ACE000
trusted library allocation
page read and write
malicious
2A81000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
1060000
direct allocation
page read and write
malicious
2898000
trusted library allocation
page read and write
1114000
heap
page read and write
E62000
heap
page read and write
666E000
stack
page read and write
2940000
trusted library allocation
page read and write
1D5E000
heap
page read and write
110B000
heap
page read and write
E7D000
heap
page read and write
7F040000
trusted library allocation
page execute and read and write
2BF3000
trusted library allocation
page read and write
4EDA000
trusted library allocation
page read and write
11EA000
heap
page read and write
CB0000
trusted library allocation
page read and write
ECA000
unkown
page read and write
3BB0000
direct allocation
page read and write
ECF000
unkown
page write copy
3AE3000
direct allocation
page read and write
2BF7000
trusted library allocation
page read and write
2ACC000
trusted library allocation
page read and write
2BE3000
trusted library allocation
page read and write
4EE6000
trusted library allocation
page read and write
4EC6000
trusted library allocation
page read and write
1010000
heap
page read and write
1118000
heap
page read and write
3C89000
direct allocation
page read and write
54F0000
trusted library allocation
page read and write
710000
heap
page read and write
3CD9000
direct allocation
page read and write
3CFE000
direct allocation
page read and write
E11000
unkown
page execute read
1DE0000
heap
page read and write
1143000
heap
page read and write
4EED000
trusted library allocation
page read and write
3D4E000
direct allocation
page read and write
1050000
heap
page read and write
5DE7000
heap
page read and write
3A81000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
4ED2000
trusted library allocation
page read and write
3CDD000
direct allocation
page read and write
11CB000
heap
page read and write
1054000
heap
page read and write
1002000
trusted library allocation
page read and write
1118000
heap
page read and write
3A10000
direct allocation
page read and write
5EF6000
trusted library allocation
page read and write
5F4D000
stack
page read and write
3B33000
direct allocation
page read and write
61ED000
stack
page read and write
3CD9000
direct allocation
page read and write
5DF0000
heap
page read and write
CD0000
trusted library allocation
page read and write
ED4000
unkown
page readonly
1161000
heap
page read and write
1113000
heap
page execute and read and write
4F10000
trusted library allocation
page read and write
2BDB000
trusted library allocation
page read and write
110A000
heap
page read and write
4F90000
heap
page read and write
3B60000
direct allocation
page read and write
4F80000
heap
page read and write
2950000
heap
page read and write
5E51000
heap
page read and write
12A1000
heap
page read and write
5FEE000
stack
page read and write
400000
system
page execute and read and write
699000
stack
page read and write
3CDD000
direct allocation
page read and write
C3E000
stack
page read and write
E10000
unkown
page readonly
5DE4000
heap
page read and write
799000
stack
page read and write
ECA000
unkown
page write copy
4F6C000
stack
page read and write
2BE9000
trusted library allocation
page read and write
1150000
heap
page read and write
CE0000
heap
page read and write
4EE1000
trusted library allocation
page read and write
2B3E000
trusted library allocation
page read and write
662E000
stack
page read and write
700000
heap
page read and write
EBB000
heap
page read and write
3B33000
direct allocation
page read and write
4ECB000
trusted library allocation
page read and write
EBE000
unkown
page readonly
FF6000
trusted library allocation
page execute and read and write
75E000
stack
page read and write
1127000
heap
page read and write
BE0000
heap
page read and write
2BFD000
trusted library allocation
page read and write
4B7D000
stack
page read and write
E69000
heap
page read and write
1180000
heap
page read and write
6790000
trusted library allocation
page read and write
E1A000
heap
page read and write
73CCD000
unkown
page read and write
3CD9000
direct allocation
page read and write
2880000
heap
page execute and read and write
2970000
heap
page read and write
5520000
trusted library allocation
page read and write
2AE5000
trusted library allocation
page read and write
BF0000
heap
page read and write
646E000
stack
page read and write
CE5000
heap
page read and write
3A10000
direct allocation
page read and write
4EDE000
trusted library allocation
page read and write
E11000
unkown
page execute read
CDD000
trusted library allocation
page execute and read and write
2B7F000
trusted library allocation
page read and write
67C0000
heap
page read and write
3B60000
direct allocation
page read and write
DDB000
stack
page read and write
5EE0000
trusted library allocation
page execute and read and write
73CCF000
unkown
page readonly
6780000
trusted library allocation
page read and write
E10000
unkown
page readonly
281E000
stack
page read and write
3C8D000
direct allocation
page read and write
10D0000
heap
page read and write
2B4B000
trusted library allocation
page read and write
1005000
trusted library allocation
page execute and read and write
12A1000
heap
page read and write
1CCE000
stack
page read and write
3AE6000
trusted library allocation
page read and write
5EF0000
trusted library allocation
page read and write
7D0000
heap
page read and write
2B09000
trusted library allocation
page read and write
DBC000
stack
page read and write
EBE000
unkown
page readonly
602E000
stack
page read and write
DEE000
stack
page read and write
1118000
heap
page read and write
4EF2000
trusted library allocation
page read and write
3AA9000
trusted library allocation
page read and write
67E0000
heap
page read and write
3AE3000
direct allocation
page read and write
100B000
trusted library allocation
page execute and read and write
2953000
heap
page read and write
10DA000
heap
page read and write
11A0000
heap
page read and write
3AE3000
direct allocation
page read and write
11BB000
heap
page read and write
1114000
heap
page read and write
73CB0000
unkown
page readonly
2BEE000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
3B33000
direct allocation
page read and write
3A10000
direct allocation
page read and write
E9D000
unkown
page readonly
79E000
stack
page read and write
F07000
unkown
page readonly
3B60000
direct allocation
page read and write
73CB1000
unkown
page execute read
3CFE000
direct allocation
page read and write
DCF000
stack
page read and write
3C89000
direct allocation
page read and write
5E1D000
heap
page read and write
39C0000
direct allocation
page read and write
CC0000
trusted library allocation
page read and write
64EE000
stack
page read and write
CC3000
trusted library allocation
page execute and read and write
111A000
heap
page read and write
3CDD000
direct allocation
page read and write
3C89000
direct allocation
page read and write
CC4000
trusted library allocation
page read and write
3CFE000
direct allocation
page read and write
2B7D000
trusted library allocation
page read and write
1020000
heap
page read and write
4ECE000
trusted library allocation
page read and write
2AF4000
trusted library allocation
page read and write
CCD000
trusted library allocation
page execute and read and write
2960000
trusted library allocation
page read and write
2B9A000
trusted library allocation
page read and write
FF2000
trusted library allocation
page read and write
FFA000
trusted library allocation
page execute and read and write
552C000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
1007000
trusted library allocation
page execute and read and write
1114000
heap
page read and write
6040000
trusted library allocation
page read and write
676D000
stack
page read and write
64AE000
stack
page read and write
3BB0000
direct allocation
page read and write
39C0000
direct allocation
page read and write
4F70000
heap
page execute and read and write
1114000
heap
page read and write
AF9000
stack
page read and write
2860000
heap
page read and write
2A7E000
stack
page read and write
E27000
heap
page read and write
2AF0000
trusted library allocation
page read and write
3B0F000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
3D4E000
direct allocation
page read and write
B00000
heap
page read and write
67F0000
trusted library allocation
page execute and read and write
2BD7000
trusted library allocation
page read and write
5DE0000
heap
page read and write
11BA000
heap
page read and write
DF8000
heap
page read and write
652E000
stack
page read and write
636E000
stack
page read and write
5F00000
trusted library allocation
page execute and read and write
3D4E000
direct allocation
page read and write
285C000
stack
page read and write
54F8000
trusted library allocation
page read and write
3C8D000
direct allocation
page read and write
1114000
heap
page read and write
10DE000
heap
page read and write
1118000
heap
page read and write
2930000
trusted library allocation
page execute and read and write
1118000
heap
page read and write
18CE000
stack
page read and write
6030000
trusted library allocation
page execute and read and write
73CC6000
unkown
page readonly
FF0000
trusted library allocation
page read and write
ED4000
unkown
page readonly
6778000
trusted library allocation
page read and write
2BFF000
trusted library allocation
page read and write
E9D000
unkown
page readonly
110A000
heap
page read and write
11BA000
heap
page read and write
E25000
heap
page read and write
39C0000
direct allocation
page read and write
1112000
heap
page read and write
3C8D000
direct allocation
page read and write
DFC000
stack
page read and write
27D0000
trusted library allocation
page read and write
2C03000
trusted library allocation
page read and write
F07000
unkown
page readonly
517C000
stack
page read and write
3BB0000
direct allocation
page read and write
DF0000
heap
page read and write
There are 228 hidden memdumps, click here to show them.