IOC Report
MX-6240N_20241120_124324.exe

loading gif

Files

File Path
Type
Category
Malicious
MX-6240N_20241120_124324.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Aaberg
data
modified
C:\Users\user\AppData\Local\Temp\aut2B0F.tmp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MX-6240N_20241120_124324.exe
"C:\Users\user\Desktop\MX-6240N_20241120_124324.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\MX-6240N_20241120_124324.exe"
malicious

URLs

Name
IP
Malicious
http://r10.o.lencr.org0#
unknown
https://account.dyn.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://bezelety.top
unknown
http://r10.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
bezelety.top
194.36.191.196
malicious

IPs

IP
Domain
Country
Malicious
194.36.191.196
bezelety.top
Netherlands
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
254E000
trusted library allocation
page read and write
malicious
3290000
direct allocation
page read and write
malicious
552000
system
page execute and read and write
malicious
2501000
trusted library allocation
page read and write
malicious
2578000
trusted library allocation
page read and write
malicious
6260000
heap
page read and write
2574000
trusted library allocation
page read and write
101A000
heap
page read and write
E09000
heap
page read and write
A50000
heap
page read and write
9BD000
trusted library allocation
page execute and read and write
3A1D000
direct allocation
page read and write
9D6000
trusted library allocation
page execute and read and write
4B33000
heap
page read and write
722000
heap
page read and write
E38000
heap
page read and write
101A000
heap
page read and write
590D000
stack
page read and write
3529000
trusted library allocation
page read and write
101A000
heap
page read and write
DCE000
heap
page read and write
49E0000
heap
page read and write
9E7000
trusted library allocation
page execute and read and write
101A000
heap
page read and write
73C70000
unkown
page readonly
9CD000
trusted library allocation
page execute and read and write
2F0000
unkown
page readonly
73A000
heap
page read and write
73C8F000
unkown
page readonly
3AA000
unkown
page read and write
59AF000
stack
page read and write
52B8000
trusted library allocation
page read and write
43A000
stack
page read and write
2580000
trusted library allocation
page read and write
DEC000
heap
page read and write
59D0000
heap
page read and write
4D0E000
stack
page read and write
5910000
trusted library allocation
page execute and read and write
3A8E000
direct allocation
page read and write
9B3000
trusted library allocation
page execute and read and write
624F000
stack
page read and write
3A19000
direct allocation
page read and write
73C8D000
unkown
page read and write
101A000
heap
page read and write
2380000
trusted library allocation
page read and write
6270000
trusted library allocation
page execute and read and write
37D000
unkown
page readonly
2F1000
unkown
page execute read
3B4000
unkown
page readonly
19BE000
stack
page read and write
3A8E000
direct allocation
page read and write
24BA000
trusted library allocation
page read and write
6B0000
heap
page read and write
BCF000
stack
page read and write
3AA000
unkown
page write copy
4CCE000
stack
page read and write
59E0000
heap
page read and write
614E000
stack
page read and write
E07000
heap
page read and write
EFA000
heap
page read and write
620000
heap
page read and write
58B6000
trusted library allocation
page read and write
233C000
stack
page read and write
57D000
stack
page read and write
59D6000
heap
page read and write
9B0000
trusted library allocation
page read and write
3A1D000
direct allocation
page read and write
635000
heap
page read and write
EB3000
heap
page read and write
3A1D000
direct allocation
page read and write
101A000
heap
page read and write
EFA000
heap
page read and write
5A34000
heap
page read and write
5D0D000
stack
page read and write
FC6000
heap
page read and write
3750000
direct allocation
page read and write
3E3000
unkown
page readonly
9EB000
trusted library allocation
page execute and read and write
73C86000
unkown
page readonly
5BE000
stack
page read and write
4B9000
stack
page read and write
2567000
trusted library allocation
page read and write
9B4000
trusted library allocation
page read and write
24A6000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
5A4A000
heap
page read and write
E28000
heap
page read and write
E09000
heap
page read and write
3A1D000
direct allocation
page read and write
101A000
heap
page read and write
DC0000
heap
page read and write
469D000
stack
page read and write
58C0000
trusted library allocation
page execute and read and write
BDB000
stack
page read and write
3A8E000
direct allocation
page read and write
2370000
trusted library allocation
page read and write
356B000
trusted library allocation
page read and write
3400000
heap
page read and write
3750000
direct allocation
page read and write
24AB000
trusted library allocation
page read and write
4F2E000
stack
page read and write
249E000
stack
page read and write
DFC000
heap
page read and write
5B50000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
37D000
unkown
page readonly
FC9000
heap
page read and write
2390000
heap
page execute and read and write
101A000
heap
page read and write
9E5000
trusted library allocation
page execute and read and write
790000
heap
page read and write
39E000
unkown
page readonly
58B0000
trusted library allocation
page read and write
630000
heap
page read and write
4508000
trusted library allocation
page read and write
6B8000
heap
page read and write
24F0000
heap
page read and write
589C000
trusted library allocation
page read and write
FC9000
heap
page read and write
530000
heap
page read and write
9DA000
trusted library allocation
page execute and read and write
3A1D000
direct allocation
page read and write
3A19000
direct allocation
page read and write
4B1C000
stack
page read and write
4C3C000
stack
page read and write
A00000
trusted library allocation
page read and write
101A000
heap
page read and write
73C71000
unkown
page execute read
FC6000
heap
page read and write
59C0000
trusted library allocation
page read and write
550000
system
page execute and read and write
52B0000
trusted library allocation
page read and write
24A0000
trusted library allocation
page read and write
5F0000
heap
page read and write
76F000
heap
page read and write
4C8E000
stack
page read and write
3873000
direct allocation
page read and write
38F0000
direct allocation
page read and write
24CD000
trusted library allocation
page read and write
2F1000
unkown
page execute read
5C0000
heap
page read and write
101A000
heap
page read and write
2340000
trusted library allocation
page execute and read and write
3A8E000
direct allocation
page read and write
24C1000
trusted library allocation
page read and write
6DA000
heap
page read and write
D80000
heap
page read and write
3A8E000
direct allocation
page read and write
3873000
direct allocation
page read and write
3A8E000
direct allocation
page read and write
3E3000
unkown
page readonly
4E2E000
stack
page read and write
38F0000
direct allocation
page read and write
3750000
direct allocation
page read and write
BFC000
stack
page read and write
3A19000
direct allocation
page read and write
9D0000
trusted library allocation
page read and write
3873000
direct allocation
page read and write
2F0000
unkown
page readonly
3A19000
direct allocation
page read and write
502F000
stack
page read and write
3750000
direct allocation
page read and write
58A0000
trusted library allocation
page read and write
24C6000
trusted library allocation
page read and write
3404000
heap
page read and write
59D2000
heap
page read and write
3A19000
direct allocation
page read and write
254C000
trusted library allocation
page read and write
9A0000
trusted library allocation
page read and write
38F0000
direct allocation
page read and write
690000
heap
page read and write
EFA000
heap
page read and write
E93000
heap
page read and write
FC6000
heap
page read and write
101A000
heap
page read and write
A4E000
stack
page read and write
E09000
heap
page read and write
24D2000
trusted library allocation
page read and write
3A19000
direct allocation
page read and write
38F0000
direct allocation
page read and write
2360000
trusted library allocation
page read and write
24B2000
trusted library allocation
page read and write
38F0000
direct allocation
page read and write
9C0000
trusted library allocation
page read and write
4D20000
heap
page execute and read and write
E2D000
heap
page read and write
5B0D000
stack
page read and write
39E000
unkown
page readonly
3B4000
unkown
page readonly
3873000
direct allocation
page read and write
3A8E000
direct allocation
page read and write
3501000
trusted library allocation
page read and write
9D2000
trusted library allocation
page read and write
7FB20000
trusted library allocation
page execute and read and write
59B7000
trusted library allocation
page read and write
DCA000
heap
page read and write
FC5000
heap
page execute and read and write
4B30000
heap
page read and write
3A1D000
direct allocation
page read and write
785000
heap
page read and write
3750000
direct allocation
page read and write
6E5000
heap
page read and write
5D0000
heap
page read and write
15BE000
stack
page read and write
3873000
direct allocation
page read and write
24AE000
trusted library allocation
page read and write
3A19000
direct allocation
page read and write
38F0000
direct allocation
page read and write
3AF000
unkown
page write copy
101A000
heap
page read and write
E94000
heap
page read and write
3A1D000
direct allocation
page read and write
9E2000
trusted library allocation
page read and write
3750000
direct allocation
page read and write
101A000
heap
page read and write
101A000
heap
page read and write
FCB000
heap
page read and write
24BE000
trusted library allocation
page read and write
3873000
direct allocation
page read and write
3750000
direct allocation
page read and write
6E7000
heap
page read and write
38F0000
direct allocation
page read and write
6280000
heap
page read and write
101A000
heap
page read and write
100B000
heap
page read and write
BBC000
stack
page read and write
1AE0000
heap
page read and write
101A000
heap
page read and write
E93000
heap
page read and write
538000
stack
page read and write
3873000
direct allocation
page read and write
520000
heap
page read and write
2350000
trusted library allocation
page read and write
There are 223 hidden memdumps, click here to show them.