IOC Report
rOrderRequest09-24.exe

loading gif

Files

File Path
Type
Category
Malicious
rOrderRequest09-24.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\wherefore
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rOrderRequest09-24.exe
"C:\Users\user\Desktop\rOrderRequest09-24.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\rOrderRequest09-24.exe"
malicious

URLs

Name
IP
Malicious
http://r10.o.lencr.org0#
unknown
http://mail.agaliofu.top
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://agaliofu.top
unknown
http://r10.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
agaliofu.top
194.36.191.196
malicious
mail.agaliofu.top
unknown
malicious

IPs

IP
Domain
Country
Malicious
194.36.191.196
agaliofu.top
Netherlands
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2901000
trusted library allocation
page read and write
malicious
2983000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
2957000
trusted library allocation
page read and write
malicious
3D60000
direct allocation
page read and write
malicious
4563000
direct allocation
page read and write
54C0000
trusted library allocation
page read and write
4563000
direct allocation
page read and write
C52000
unkown
page readonly
C54000
trusted library allocation
page read and write
13DB000
stack
page read and write
3F82000
heap
page read and write
C6D000
trusted library allocation
page execute and read and write
4590000
direct allocation
page read and write
4D46000
trusted library allocation
page read and write
46B9000
direct allocation
page read and write
505E000
stack
page read and write
3DB0000
heap
page read and write
63AE000
stack
page read and write
4D52000
trusted library allocation
page read and write
43E000
system
page execute and read and write
515E000
stack
page read and write
13EF000
stack
page read and write
3DF7000
heap
page read and write
2961000
trusted library allocation
page read and write
3E1A000
heap
page read and write
C1A000
heap
page read and write
3EF5000
heap
page read and write
28BE000
stack
page read and write
46BD000
direct allocation
page read and write
4F10000
heap
page execute and read and write
B90000
unkown
page readonly
396F000
trusted library allocation
page read and write
C8B000
trusted library allocation
page execute and read and write
529E000
stack
page read and write
3EB0000
heap
page read and write
4EEC000
stack
page read and write
3F21000
heap
page read and write
1780000
heap
page read and write
3EE3000
heap
page read and write
4D4E000
trusted library allocation
page read and write
17E8000
heap
page read and write
1A83000
heap
page read and write
3F73000
heap
page read and write
C82000
trusted library allocation
page read and write
B86000
heap
page read and write
62AE000
stack
page read and write
13BE000
stack
page read and write
5C90000
trusted library allocation
page execute and read and write
1699000
heap
page read and write
C2C000
unkown
page readonly
5E6D000
unkown
page read and write
17C4000
heap
page read and write
AB0000
heap
page read and write
46BD000
direct allocation
page read and write
3F6E000
heap
page read and write
AC0000
heap
page read and write
5430000
trusted library allocation
page read and write
C5C000
unkown
page write copy
43F0000
direct allocation
page read and write
C52000
unkown
page readonly
472E000
direct allocation
page read and write
4440000
direct allocation
page read and write
C70000
trusted library allocation
page read and write
1B12000
heap
page read and write
1B5A000
heap
page read and write
1B07000
heap
page read and write
C50000
trusted library allocation
page read and write
D30000
trusted library allocation
page execute and read and write
23DF000
stack
page read and write
4D44000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
43F0000
direct allocation
page read and write
C85000
trusted library allocation
page execute and read and write
54A0000
trusted library allocation
page execute and read and write
4590000
direct allocation
page read and write
13FF000
stack
page read and write
52DE000
stack
page read and write
28E0000
trusted library allocation
page read and write
3F76000
heap
page read and write
3929000
trusted library allocation
page read and write
B50000
heap
page read and write
1B50000
heap
page read and write
28C0000
trusted library allocation
page read and write
1680000
heap
page read and write
43F2000
heap
page read and write
1A40000
heap
page read and write
1A37000
heap
page read and write
477E000
direct allocation
page read and write
5B80000
heap
page read and write
4D72000
trusted library allocation
page read and write
17E0000
heap
page read and write
501C000
stack
page read and write
53DF000
stack
page read and write
1BC2000
heap
page read and write
3B88000
heap
page read and write
13CE000
stack
page read and write
3DDA000
heap
page read and write
C60000
unkown
page write copy
46B9000
direct allocation
page read and write
DBA000
stack
page read and write
169C000
heap
page read and write
400000
system
page execute and read and write
5497000
trusted library allocation
page read and write
1A43000
heap
page read and write
BE8000
heap
page read and write
54B0000
trusted library allocation
page read and write
3B8C000
heap
page read and write
4D5E000
trusted library allocation
page read and write
3F72000
heap
page execute and read and write
4D6D000
trusted library allocation
page read and write
1A65000
heap
page read and write
298B000
trusted library allocation
page read and write
153E000
stack
page read and write
470D000
direct allocation
page read and write
C46000
heap
page read and write
5F6D000
stack
page read and write
C5C000
unkown
page read and write
6510000
trusted library allocation
page execute and read and write
5460000
trusted library allocation
page read and write
4709000
direct allocation
page read and write
4709000
direct allocation
page read and write
2790000
heap
page read and write
B7A000
heap
page read and write
5BCF000
heap
page read and write
4709000
direct allocation
page read and write
3E3C000
heap
page read and write
4489000
heap
page read and write
4D40000
trusted library allocation
page read and write
5D6E000
stack
page read and write
B84000
heap
page read and write
3F4B000
heap
page read and write
3E94000
heap
page read and write
477E000
direct allocation
page read and write
4D4B000
trusted library allocation
page read and write
295B000
trusted library allocation
page read and write
4563000
direct allocation
page read and write
1BD6000
heap
page read and write
D40000
heap
page read and write
15E0000
heap
page read and write
1B43000
heap
page read and write
C76000
trusted library allocation
page execute and read and write
3F73000
heap
page read and write
46B9000
direct allocation
page read and write
1FDE000
stack
page read and write
6560000
heap
page read and write
3FF2000
heap
page read and write
AA0000
heap
page read and write
158E000
stack
page read and write
472E000
direct allocation
page read and write
C72000
trusted library allocation
page read and write
1BB0000
heap
page read and write
28F0000
heap
page execute and read and write
4D80000
trusted library allocation
page read and write
4DB0000
heap
page read and write
3E8A000
heap
page read and write
43F0000
direct allocation
page read and write
1420000
heap
page read and write
5438000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
470D000
direct allocation
page read and write
C2C000
unkown
page readonly
938000
stack
page read and write
5490000
trusted library allocation
page read and write
C87000
trusted library allocation
page execute and read and write
C53000
trusted library allocation
page execute and read and write
45E0000
direct allocation
page read and write
4590000
direct allocation
page read and write
4D90000
heap
page read and write
3B89000
heap
page read and write
1A2F000
heap
page read and write
CEE000
stack
page read and write
4440000
direct allocation
page read and write
3901000
trusted library allocation
page read and write
5D2E000
stack
page read and write
470D000
direct allocation
page read and write
C64000
unkown
page readonly
297F000
trusted library allocation
page read and write
D2C000
stack
page read and write
17C0000
heap
page read and write
4513000
direct allocation
page read and write
B91000
unkown
page execute read
2971000
trusted library allocation
page read and write
27B0000
heap
page read and write
4D61000
trusted library allocation
page read and write
519E000
stack
page read and write
546D000
trusted library allocation
page read and write
4440000
direct allocation
page read and write
B90000
unkown
page readonly
B58000
heap
page read and write
1B2D000
heap
page read and write
26F8000
trusted library allocation
page read and write
472E000
direct allocation
page read and write
477E000
direct allocation
page read and write
5477000
trusted library allocation
page read and write
B91000
unkown
page execute read
3DB0000
heap
page read and write
B40000
trusted library allocation
page read and write
46BD000
direct allocation
page read and write
980000
heap
page read and write
2955000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
3E6E000
heap
page read and write
4513000
direct allocation
page read and write
1A3E000
heap
page read and write
4D93000
heap
page read and write
C64000
unkown
page readonly
49FD000
stack
page read and write
45E0000
direct allocation
page read and write
4513000
direct allocation
page read and write
45E0000
direct allocation
page read and write
3EFF000
heap
page read and write
3E80000
heap
page read and write
C2E000
heap
page read and write
C5D000
trusted library allocation
page execute and read and write
83A000
stack
page read and write
5D80000
heap
page read and write
1540000
heap
page read and write
5480000
trusted library allocation
page read and write
3C4D000
heap
page read and write
5470000
trusted library allocation
page read and write
4D66000
trusted library allocation
page read and write
1AA0000
heap
page read and write
7F4D0000
trusted library allocation
page execute and read and write
AB5000
heap
page read and write
C7A000
trusted library allocation
page execute and read and write
3FF2000
heap
page read and write
There are 217 hidden memdumps, click here to show them.