Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
MX-6240N_20241120_124324.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Aaberg
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\aut2B0F.tmp
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\MX-6240N_20241120_124324.exe
|
"C:\Users\user\Desktop\MX-6240N_20241120_124324.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\MX-6240N_20241120_124324.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://r10.o.lencr.org0#
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://bezelety.top
|
unknown
|
||
http://r10.i.lencr.org/0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bezelety.top
|
194.36.191.196
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
194.36.191.196
|
bezelety.top
|
Netherlands
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
254E000
|
trusted library allocation
|
page read and write
|
||
3290000
|
direct allocation
|
page read and write
|
||
552000
|
system
|
page execute and read and write
|
||
2501000
|
trusted library allocation
|
page read and write
|
||
2578000
|
trusted library allocation
|
page read and write
|
||
6260000
|
heap
|
page read and write
|
||
2574000
|
trusted library allocation
|
page read and write
|
||
101A000
|
heap
|
page read and write
|
||
E09000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
9BD000
|
trusted library allocation
|
page execute and read and write
|
||
3A1D000
|
direct allocation
|
page read and write
|
||
9D6000
|
trusted library allocation
|
page execute and read and write
|
||
4B33000
|
heap
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
101A000
|
heap
|
page read and write
|
||
590D000
|
stack
|
page read and write
|
||
3529000
|
trusted library allocation
|
page read and write
|
||
101A000
|
heap
|
page read and write
|
||
DCE000
|
heap
|
page read and write
|
||
49E0000
|
heap
|
page read and write
|
||
9E7000
|
trusted library allocation
|
page execute and read and write
|
||
101A000
|
heap
|
page read and write
|
||
73C70000
|
unkown
|
page readonly
|
||
9CD000
|
trusted library allocation
|
page execute and read and write
|
||
2F0000
|
unkown
|
page readonly
|
||
73A000
|
heap
|
page read and write
|
||
73C8F000
|
unkown
|
page readonly
|
||
3AA000
|
unkown
|
page read and write
|
||
59AF000
|
stack
|
page read and write
|
||
52B8000
|
trusted library allocation
|
page read and write
|
||
43A000
|
stack
|
page read and write
|
||
2580000
|
trusted library allocation
|
page read and write
|
||
DEC000
|
heap
|
page read and write
|
||
59D0000
|
heap
|
page read and write
|
||
4D0E000
|
stack
|
page read and write
|
||
5910000
|
trusted library allocation
|
page execute and read and write
|
||
3A8E000
|
direct allocation
|
page read and write
|
||
9B3000
|
trusted library allocation
|
page execute and read and write
|
||
624F000
|
stack
|
page read and write
|
||
3A19000
|
direct allocation
|
page read and write
|
||
73C8D000
|
unkown
|
page read and write
|
||
101A000
|
heap
|
page read and write
|
||
2380000
|
trusted library allocation
|
page read and write
|
||
6270000
|
trusted library allocation
|
page execute and read and write
|
||
37D000
|
unkown
|
page readonly
|
||
2F1000
|
unkown
|
page execute read
|
||
3B4000
|
unkown
|
page readonly
|
||
19BE000
|
stack
|
page read and write
|
||
3A8E000
|
direct allocation
|
page read and write
|
||
24BA000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
BCF000
|
stack
|
page read and write
|
||
3AA000
|
unkown
|
page write copy
|
||
4CCE000
|
stack
|
page read and write
|
||
59E0000
|
heap
|
page read and write
|
||
614E000
|
stack
|
page read and write
|
||
E07000
|
heap
|
page read and write
|
||
EFA000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
58B6000
|
trusted library allocation
|
page read and write
|
||
233C000
|
stack
|
page read and write
|
||
57D000
|
stack
|
page read and write
|
||
59D6000
|
heap
|
page read and write
|
||
9B0000
|
trusted library allocation
|
page read and write
|
||
3A1D000
|
direct allocation
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
EB3000
|
heap
|
page read and write
|
||
3A1D000
|
direct allocation
|
page read and write
|
||
101A000
|
heap
|
page read and write
|
||
EFA000
|
heap
|
page read and write
|
||
5A34000
|
heap
|
page read and write
|
||
5D0D000
|
stack
|
page read and write
|
||
FC6000
|
heap
|
page read and write
|
||
3750000
|
direct allocation
|
page read and write
|
||
3E3000
|
unkown
|
page readonly
|
||
9EB000
|
trusted library allocation
|
page execute and read and write
|
||
73C86000
|
unkown
|
page readonly
|
||
5BE000
|
stack
|
page read and write
|
||
4B9000
|
stack
|
page read and write
|
||
2567000
|
trusted library allocation
|
page read and write
|
||
9B4000
|
trusted library allocation
|
page read and write
|
||
24A6000
|
trusted library allocation
|
page read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
5A4A000
|
heap
|
page read and write
|
||
E28000
|
heap
|
page read and write
|
||
E09000
|
heap
|
page read and write
|
||
3A1D000
|
direct allocation
|
page read and write
|
||
101A000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
469D000
|
stack
|
page read and write
|
||
58C0000
|
trusted library allocation
|
page execute and read and write
|
||
BDB000
|
stack
|
page read and write
|
||
3A8E000
|
direct allocation
|
page read and write
|
||
2370000
|
trusted library allocation
|
page read and write
|
||
356B000
|
trusted library allocation
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
3750000
|
direct allocation
|
page read and write
|
||
24AB000
|
trusted library allocation
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
249E000
|
stack
|
page read and write
|
||
DFC000
|
heap
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page read and write
|
||
37D000
|
unkown
|
page readonly
|
||
FC9000
|
heap
|
page read and write
|
||
2390000
|
heap
|
page execute and read and write
|
||
101A000
|
heap
|
page read and write
|
||
9E5000
|
trusted library allocation
|
page execute and read and write
|
||
790000
|
heap
|
page read and write
|
||
39E000
|
unkown
|
page readonly
|
||
58B0000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
4508000
|
trusted library allocation
|
page read and write
|
||
6B8000
|
heap
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
589C000
|
trusted library allocation
|
page read and write
|
||
FC9000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
9DA000
|
trusted library allocation
|
page execute and read and write
|
||
3A1D000
|
direct allocation
|
page read and write
|
||
3A19000
|
direct allocation
|
page read and write
|
||
4B1C000
|
stack
|
page read and write
|
||
4C3C000
|
stack
|
page read and write
|
||
A00000
|
trusted library allocation
|
page read and write
|
||
101A000
|
heap
|
page read and write
|
||
73C71000
|
unkown
|
page execute read
|
||
FC6000
|
heap
|
page read and write
|
||
59C0000
|
trusted library allocation
|
page read and write
|
||
550000
|
system
|
page execute and read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
24A0000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
76F000
|
heap
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
3873000
|
direct allocation
|
page read and write
|
||
38F0000
|
direct allocation
|
page read and write
|
||
24CD000
|
trusted library allocation
|
page read and write
|
||
2F1000
|
unkown
|
page execute read
|
||
5C0000
|
heap
|
page read and write
|
||
101A000
|
heap
|
page read and write
|
||
2340000
|
trusted library allocation
|
page execute and read and write
|
||
3A8E000
|
direct allocation
|
page read and write
|
||
24C1000
|
trusted library allocation
|
page read and write
|
||
6DA000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
3A8E000
|
direct allocation
|
page read and write
|
||
3873000
|
direct allocation
|
page read and write
|
||
3A8E000
|
direct allocation
|
page read and write
|
||
3E3000
|
unkown
|
page readonly
|
||
4E2E000
|
stack
|
page read and write
|
||
38F0000
|
direct allocation
|
page read and write
|
||
3750000
|
direct allocation
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
3A19000
|
direct allocation
|
page read and write
|
||
9D0000
|
trusted library allocation
|
page read and write
|
||
3873000
|
direct allocation
|
page read and write
|
||
2F0000
|
unkown
|
page readonly
|
||
3A19000
|
direct allocation
|
page read and write
|
||
502F000
|
stack
|
page read and write
|
||
3750000
|
direct allocation
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
24C6000
|
trusted library allocation
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
59D2000
|
heap
|
page read and write
|
||
3A19000
|
direct allocation
|
page read and write
|
||
254C000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
trusted library allocation
|
page read and write
|
||
38F0000
|
direct allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
EFA000
|
heap
|
page read and write
|
||
E93000
|
heap
|
page read and write
|
||
FC6000
|
heap
|
page read and write
|
||
101A000
|
heap
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
E09000
|
heap
|
page read and write
|
||
24D2000
|
trusted library allocation
|
page read and write
|
||
3A19000
|
direct allocation
|
page read and write
|
||
38F0000
|
direct allocation
|
page read and write
|
||
2360000
|
trusted library allocation
|
page read and write
|
||
24B2000
|
trusted library allocation
|
page read and write
|
||
38F0000
|
direct allocation
|
page read and write
|
||
9C0000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
heap
|
page execute and read and write
|
||
E2D000
|
heap
|
page read and write
|
||
5B0D000
|
stack
|
page read and write
|
||
39E000
|
unkown
|
page readonly
|
||
3B4000
|
unkown
|
page readonly
|
||
3873000
|
direct allocation
|
page read and write
|
||
3A8E000
|
direct allocation
|
page read and write
|
||
3501000
|
trusted library allocation
|
page read and write
|
||
9D2000
|
trusted library allocation
|
page read and write
|
||
7FB20000
|
trusted library allocation
|
page execute and read and write
|
||
59B7000
|
trusted library allocation
|
page read and write
|
||
DCA000
|
heap
|
page read and write
|
||
FC5000
|
heap
|
page execute and read and write
|
||
4B30000
|
heap
|
page read and write
|
||
3A1D000
|
direct allocation
|
page read and write
|
||
785000
|
heap
|
page read and write
|
||
3750000
|
direct allocation
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
15BE000
|
stack
|
page read and write
|
||
3873000
|
direct allocation
|
page read and write
|
||
24AE000
|
trusted library allocation
|
page read and write
|
||
3A19000
|
direct allocation
|
page read and write
|
||
38F0000
|
direct allocation
|
page read and write
|
||
3AF000
|
unkown
|
page write copy
|
||
101A000
|
heap
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
3A1D000
|
direct allocation
|
page read and write
|
||
9E2000
|
trusted library allocation
|
page read and write
|
||
3750000
|
direct allocation
|
page read and write
|
||
101A000
|
heap
|
page read and write
|
||
101A000
|
heap
|
page read and write
|
||
FCB000
|
heap
|
page read and write
|
||
24BE000
|
trusted library allocation
|
page read and write
|
||
3873000
|
direct allocation
|
page read and write
|
||
3750000
|
direct allocation
|
page read and write
|
||
6E7000
|
heap
|
page read and write
|
||
38F0000
|
direct allocation
|
page read and write
|
||
6280000
|
heap
|
page read and write
|
||
101A000
|
heap
|
page read and write
|
||
100B000
|
heap
|
page read and write
|
||
BBC000
|
stack
|
page read and write
|
||
1AE0000
|
heap
|
page read and write
|
||
101A000
|
heap
|
page read and write
|
||
E93000
|
heap
|
page read and write
|
||
538000
|
stack
|
page read and write
|
||
3873000
|
direct allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
There are 223 hidden memdumps, click here to show them.