IOC Report
MACHINE SPECIFICATION.exe

loading gif

Files

File Path
Type
Category
Malicious
MACHINE SPECIFICATION.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Melber
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MACHINE SPECIFICATION.exe
"C:\Users\user\Desktop\MACHINE SPECIFICATION.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\MACHINE SPECIFICATION.exe"
malicious
C:\Users\user\Desktop\MACHINE SPECIFICATION.exe
"C:\Users\user\Desktop\MACHINE SPECIFICATION.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\MACHINE SPECIFICATION.exe"
malicious

URLs

Name
IP
Malicious
http://checkip.dyndns.org/
193.122.130.0
https://reallyfreegeoip.org/xml/8.46.123.189
104.21.16.1
https://reallyfreegeoip.org/xml/8.46.123.189l
unknown
http://kianaenergy.com
unknown
https://api.telegram.org/bot
unknown
http://r10.i.lencr.org/0-
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://checkip.dyndns.org/q
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org
unknown
http://r10.o.lencr.org0#
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.com
unknown
http://mail.kianaenergy.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://api.telegram.org/bot-/sendDocument?chat_id=
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
kianaenergy.com
5.144.131.244
malicious
mail.kianaenergy.com
unknown
malicious
reallyfreegeoip.org
104.21.16.1
checkip.dyndns.com
193.122.130.0
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
5.144.131.244
kianaenergy.com
Iran (ISLAMIC Republic Of)
malicious
104.21.16.1
reallyfreegeoip.org
United States
193.122.130.0
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2430000
trusted library section
page read and write
malicious
4AD0000
trusted library section
page read and write
malicious
3471000
trusted library allocation
page read and write
malicious
2631000
trusted library allocation
page read and write
malicious
21B0000
heap
page read and write
malicious
4A60000
trusted library allocation
page read and write
403E000
heap
page read and write
E1B000
stack
page read and write
137A000
heap
page read and write
52B0000
trusted library allocation
page read and write
24AB000
trusted library allocation
page read and write
1B1E000
heap
page read and write
1360000
heap
page read and write
1360000
heap
page read and write
1A70000
heap
page read and write
1B18000
heap
page read and write
3EDE000
direct allocation
page read and write
1B1C000
heap
page read and write
5C00000
trusted library allocation
page execute and read and write
17E0000
heap
page read and write
1360000
heap
page read and write
6C0000
unkown
page write copy
182B000
heap
page read and write
25EE000
trusted library allocation
page read and write
1823000
heap
page read and write
4A6B000
trusted library allocation
page read and write
F7D000
stack
page read and write
5E30000
trusted library allocation
page read and write
137A000
heap
page read and write
3EDE000
direct allocation
page read and write
1FD4000
trusted library allocation
page read and write
1FEE000
stack
page read and write
1377000
heap
page read and write
1A7E000
heap
page read and write
5CAE000
stack
page read and write
3571000
trusted library allocation
page read and write
1357000
heap
page read and write
248A000
trusted library allocation
page read and write
61D0000
trusted library allocation
page execute and read and write
3BA0000
direct allocation
page read and write
5BB0000
trusted library allocation
page read and write
6BC000
unkown
page write copy
68C000
unkown
page readonly
3BA0000
direct allocation
page read and write
24A1000
trusted library allocation
page read and write
2497000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
6C4000
unkown
page readonly
24BC000
trusted library allocation
page read and write
4A92000
trusted library allocation
page read and write
24D9000
trusted library allocation
page read and write
1A63000
heap
page read and write
3CC3000
direct allocation
page read and write
4BAE000
stack
page read and write
1FB3000
heap
page read and write
6DE000
unkown
page readonly
10E0000
heap
page read and write
182F000
heap
page read and write
1221000
heap
page read and write
1357000
heap
page read and write
24CF000
trusted library allocation
page read and write
1A87000
heap
page read and write
4A7E000
trusted library allocation
page read and write
568000
heap
page read and write
A9000
stack
page read and write
3D40000
direct allocation
page read and write
24C4000
trusted library allocation
page read and write
26B3000
trusted library allocation
page read and write
17F0000
heap
page read and write
45BE000
direct allocation
page read and write
1352000
heap
page read and write
11A1000
heap
page read and write
2544000
trusted library allocation
page read and write
3D40000
direct allocation
page read and write
1352000
heap
page read and write
4B30000
trusted library allocation
page execute and read and write
26F5000
trusted library allocation
page read and write
2050000
heap
page execute and read and write
135D000
heap
page read and write
6200000
heap
page read and write
24A5000
trusted library allocation
page read and write
470000
heap
page read and write
3EDE000
direct allocation
page read and write
2060000
trusted library allocation
page read and write
1377000
heap
page read and write
68C000
unkown
page readonly
1415000
heap
page read and write
1824000
heap
page read and write
25FA000
trusted library allocation
page read and write
26F1000
trusted library allocation
page read and write
4AC0000
heap
page execute and read and write
40EA000
heap
page read and write
3BAB000
heap
page read and write
68C000
unkown
page readonly
4420000
direct allocation
page read and write
1A7E000
heap
page read and write
2460000
heap
page read and write
68C000
unkown
page readonly
45BE000
direct allocation
page read and write
40E0000
heap
page read and write
2482000
trusted library allocation
page read and write
E3F000
stack
page read and write
1357000
heap
page read and write
1A63000
heap
page read and write
2010000
heap
page read and write
3CC3000
direct allocation
page read and write
24B6000
trusted library allocation
page read and write
5AAE000
stack
page read and write
3E69000
direct allocation
page read and write
1A87000
heap
page read and write
426000
system
page execute and read and write
2547000
trusted library allocation
page read and write
1790000
heap
page read and write
FBE000
stack
page read and write
137A000
heap
page read and write
25BB000
trusted library allocation
page read and write
395A000
heap
page read and write
1122000
heap
page read and write
18A3000
heap
page read and write
1133000
heap
page read and write
1352000
heap
page read and write
2090000
heap
page read and write
52BC000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
1E0000
heap
page read and write
112E000
heap
page execute and read and write
4280000
direct allocation
page read and write
4A81000
trusted library allocation
page read and write
460000
heap
page read and write
1415000
heap
page read and write
4DF2000
heap
page read and write
24C0000
trusted library allocation
page read and write
15CF000
stack
page read and write
248E000
trusted library allocation
page read and write
24AD000
trusted library allocation
page read and write
247C000
trusted library allocation
page read and write
4A6E000
trusted library allocation
page read and write
2484000
trusted library allocation
page read and write
3D40000
direct allocation
page read and write
1A7A000
heap
page read and write
F9E000
stack
page read and write
18EF000
stack
page read and write
4960000
heap
page read and write
255C000
trusted library allocation
page read and write
3E6D000
direct allocation
page read and write
6C4000
unkown
page readonly
23DF000
stack
page read and write
22DE000
stack
page read and write
1B17000
heap
page execute and read and write
11A2000
heap
page read and write
1377000
heap
page read and write
5BDD000
trusted library allocation
page read and write
418D000
heap
page read and write
5F1000
unkown
page execute read
135D000
heap
page read and write
3CC3000
direct allocation
page read and write
1FB0000
heap
page read and write
1240000
heap
page read and write
4549000
direct allocation
page read and write
3BA0000
direct allocation
page read and write
1A87000
heap
page read and write
1FFA000
trusted library allocation
page execute and read and write
504000
heap
page read and write
E0F000
stack
page read and write
2550000
trusted library allocation
page read and write
3E6D000
direct allocation
page read and write
1357000
heap
page read and write
A3A000
stack
page read and write
25B7000
trusted library allocation
page read and write
6B2000
unkown
page readonly
4A66000
trusted library allocation
page read and write
3BA0000
direct allocation
page read and write
3BA0000
direct allocation
page read and write
10C0000
heap
page read and write
FC0000
heap
page read and write
258D000
trusted library allocation
page read and write
15BF000
stack
page read and write
43A3000
direct allocation
page read and write
2488000
trusted library allocation
page read and write
255A000
trusted library allocation
page read and write
582000
heap
page read and write
460E000
stack
page read and write
135D000
heap
page read and write
1FF6000
trusted library allocation
page execute and read and write
1352000
heap
page read and write
34FA000
trusted library allocation
page read and write
ECA000
stack
page read and write
50EE000
stack
page read and write
34E4000
trusted library allocation
page read and write
1FC0000
trusted library allocation
page read and write
570000
heap
page read and write
24C2000
trusted library allocation
page read and write
2002000
trusted library allocation
page read and write
400000
system
page execute and read and write
3EDE000
direct allocation
page read and write
4A8D000
trusted library allocation
page read and write
25E0000
heap
page read and write
3D40000
direct allocation
page read and write
4DCC000
heap
page read and write
18A2000
heap
page read and write
2591000
trusted library allocation
page read and write
135D000
heap
page read and write
436000
system
page execute and read and write
25D9000
trusted library allocation
page read and write
5F0000
unkown
page readonly
4950000
heap
page read and write
6C0000
unkown
page write copy
509000
heap
page read and write
24CB000
trusted library allocation
page read and write
1B27000
heap
page read and write
2490000
trusted library allocation
page read and write
52B9000
trusted library allocation
page read and write
135D000
heap
page read and write
2471000
trusted library allocation
page read and write
F30000
heap
page read and write
3E6D000
direct allocation
page read and write
1377000
heap
page read and write
254D000
trusted library allocation
page read and write
1A7A000
heap
page read and write
25C2000
trusted library allocation
page read and write
4DB0000
heap
page read and write
1A70000
heap
page read and write
4A8000
heap
page read and write
4D0E000
stack
page read and write
1377000
heap
page read and write
1921000
heap
page read and write
113E000
heap
page read and write
1FF2000
trusted library allocation
page read and write
3611000
heap
page read and write
2040000
trusted library allocation
page execute and read and write
5F0000
unkown
page readonly
5BE0000
trusted library allocation
page execute and read and write
17F8000
heap
page read and write
2601000
trusted library allocation
page read and write
52BF000
trusted library allocation
page read and write
1352000
heap
page read and write
137A000
heap
page read and write
5F0000
unkown
page readonly
4AB0000
trusted library allocation
page read and write
1A87000
heap
page read and write
1360000
heap
page read and write
2070000
heap
page read and write
24A9000
trusted library allocation
page read and write
56C000
heap
page read and write
4A0000
heap
page read and write
2477000
trusted library allocation
page read and write
24D7000
trusted library allocation
page read and write
2493000
trusted library allocation
page read and write
4DC4000
heap
page read and write
3CC3000
direct allocation
page read and write
1B28000
heap
page read and write
3E69000
direct allocation
page read and write
15FF000
stack
page read and write
11A1000
heap
page read and write
11A1000
heap
page read and write
3BA0000
direct allocation
page read and write
4C0E000
stack
page read and write
3E69000
direct allocation
page read and write
1FDD000
trusted library allocation
page execute and read and write
5C10000
trusted library allocation
page read and write
3AB3000
heap
page read and write
DFF000
stack
page read and write
2578000
trusted library allocation
page read and write
24A7000
trusted library allocation
page read and write
1360000
heap
page read and write
10F8000
heap
page read and write
1360000
heap
page read and write
34EE000
trusted library allocation
page read and write
1FA0000
heap
page read and write
4E7A000
heap
page read and write
113F000
heap
page read and write
4549000
direct allocation
page read and write
3531000
trusted library allocation
page read and write
454D000
direct allocation
page read and write
3E69000
direct allocation
page read and write
1FE0000
trusted library allocation
page read and write
24B4000
trusted library allocation
page read and write
4A7A000
trusted library allocation
page read and write
3E69000
direct allocation
page read and write
6B2000
unkown
page readonly
5F1000
unkown
page execute read
182F000
heap
page read and write
2030000
trusted library allocation
page read and write
1FE3000
trusted library allocation
page read and write
454D000
direct allocation
page read and write
112F000
heap
page read and write
1B18000
heap
page read and write
248C000
trusted library allocation
page read and write
1377000
heap
page read and write
24C9000
trusted library allocation
page read and write
E2F000
stack
page read and write
6DE000
unkown
page readonly
1FF0000
trusted library allocation
page read and write
137A000
heap
page read and write
13A0000
heap
page read and write
3E69000
direct allocation
page read and write
4A86000
trusted library allocation
page read and write
4287000
heap
page read and write
2583000
trusted library allocation
page read and write
253F000
trusted library allocation
page read and write
526D000
stack
page read and write
3E6D000
direct allocation
page read and write
52AE000
stack
page read and write
1FD0000
trusted library allocation
page read and write
FA0000
heap
page read and write
1FD3000
trusted library allocation
page execute and read and write
23EE000
stack
page read and write
1A7A000
heap
page read and write
24C6000
trusted library allocation
page read and write
5BF0000
trusted library allocation
page read and write
1400000
heap
page read and write
1A70000
heap
page read and write
1A7E000
heap
page read and write
112F000
heap
page read and write
1940000
heap
page read and write
3EDE000
direct allocation
page read and write
5BD0000
trusted library allocation
page read and write
1123000
heap
page read and write
5BAE000
stack
page read and write
4DC000
heap
page read and write
3CC3000
direct allocation
page read and write
3600000
heap
page read and write
2595000
trusted library allocation
page read and write
5A6F000
stack
page read and write
6B2000
unkown
page readonly
1EEF000
stack
page read and write
6DE000
unkown
page readonly
1352000
heap
page read and write
1A7E000
heap
page read and write
25CB000
trusted library allocation
page read and write
1A7000
stack
page read and write
18A2000
heap
page read and write
E70000
heap
page read and write
4280000
direct allocation
page read and write
1822000
heap
page read and write
6DE000
unkown
page readonly
5F0000
unkown
page readonly
4BC0000
trusted library allocation
page read and write
3D40000
direct allocation
page read and write
3D40000
direct allocation
page read and write
25F6000
trusted library allocation
page read and write
6BC000
unkown
page read and write
6BC000
unkown
page write copy
4420000
direct allocation
page read and write
6C4000
unkown
page readonly
5F1000
unkown
page execute read
6400000
heap
page read and write
11A1000
heap
page read and write
3E6D000
direct allocation
page read and write
11A1000
heap
page read and write
24A3000
trusted library allocation
page read and write
512E000
stack
page read and write
10F0000
heap
page read and write
FFE000
stack
page read and write
4CF000
heap
page read and write
3EDE000
direct allocation
page read and write
137A000
heap
page read and write
F50000
heap
page read and write
3590000
direct allocation
page read and write
1750000
heap
page read and write
112A000
heap
page read and write
3604000
heap
page read and write
3A0E000
heap
page read and write
2486000
trusted library allocation
page read and write
490000
trusted library section
page read and write
3C04000
heap
page read and write
43A3000
direct allocation
page read and write
5BC0000
trusted library allocation
page execute and read and write
241E000
stack
page read and write
1754000
heap
page read and write
25F4000
trusted library allocation
page read and write
5F1000
unkown
page execute read
6B2000
unkown
page readonly
1A63000
heap
page read and write
3CC3000
direct allocation
page read and write
15DB000
stack
page read and write
5CEE000
stack
page read and write
1A63000
heap
page read and write
15EF000
stack
page read and write
529000
heap
page read and write
3A06000
heap
page read and write
253C000
trusted library allocation
page read and write
135D000
heap
page read and write
6C4000
unkown
page readonly
3E6D000
direct allocation
page read and write
596E000
stack
page read and write
1357000
heap
page read and write
2005000
trusted library allocation
page execute and read and write
1357000
heap
page read and write
1A70000
heap
page read and write
1122000
heap
page read and write
2007000
trusted library allocation
page execute and read and write
1A7A000
heap
page read and write
522E000
stack
page read and write
2580000
direct allocation
page read and write
24BE000
trusted library allocation
page read and write
25D5000
trusted library allocation
page read and write
200B000
trusted library allocation
page execute and read and write
1FED000
trusted library allocation
page execute and read and write
4B20000
trusted library allocation
page read and write
25DE000
trusted library allocation
page read and write
5BB6000
trusted library allocation
page read and write
1E5000
heap
page read and write
6BC000
unkown
page read and write
4A72000
trusted library allocation
page read and write
There are 395 hidden memdumps, click here to show them.