IOC Report
NOVA ORDEM.exe

loading gif

Files

File Path
Type
Category
Malicious
NOVA ORDEM.exe
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_NOVA ORDEM.exe_183265296818dedab7d0b93d41b13e51f02317e6_4b8a3282_5d79ce14-7b1c-47f3-9856-1b13ca046127\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6844.tmp.dmp
Mini DuMP crash report, 16 streams, Tue Jul 2 06:22:44 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER69FA.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A2A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\NOVA ORDEM.exe
"C:\Users\user\Desktop\NOVA ORDEM.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe"
malicious
C:\Program Files (x86)\Windows Media Player\wmplayer.exe
"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
malicious
C:\Program Files (x86)\Windows Media Player\wmplayer.exe
"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1344 -s 1128

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://upx.sf.net
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
There are 16 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
\REGISTRY\A\{1f78bea8-1360-ce35-619f-8ebb3f1ddf09}\Root\InventoryApplicationFile\nova ordem.exe|12b3dd7daf805cf5
ProgramId
\REGISTRY\A\{1f78bea8-1360-ce35-619f-8ebb3f1ddf09}\Root\InventoryApplicationFile\nova ordem.exe|12b3dd7daf805cf5
FileId
\REGISTRY\A\{1f78bea8-1360-ce35-619f-8ebb3f1ddf09}\Root\InventoryApplicationFile\nova ordem.exe|12b3dd7daf805cf5
LowerCaseLongPath
\REGISTRY\A\{1f78bea8-1360-ce35-619f-8ebb3f1ddf09}\Root\InventoryApplicationFile\nova ordem.exe|12b3dd7daf805cf5
LongPathHash
\REGISTRY\A\{1f78bea8-1360-ce35-619f-8ebb3f1ddf09}\Root\InventoryApplicationFile\nova ordem.exe|12b3dd7daf805cf5
Name
\REGISTRY\A\{1f78bea8-1360-ce35-619f-8ebb3f1ddf09}\Root\InventoryApplicationFile\nova ordem.exe|12b3dd7daf805cf5
OriginalFileName
\REGISTRY\A\{1f78bea8-1360-ce35-619f-8ebb3f1ddf09}\Root\InventoryApplicationFile\nova ordem.exe|12b3dd7daf805cf5
Publisher
\REGISTRY\A\{1f78bea8-1360-ce35-619f-8ebb3f1ddf09}\Root\InventoryApplicationFile\nova ordem.exe|12b3dd7daf805cf5
Version
\REGISTRY\A\{1f78bea8-1360-ce35-619f-8ebb3f1ddf09}\Root\InventoryApplicationFile\nova ordem.exe|12b3dd7daf805cf5
BinFileVersion
\REGISTRY\A\{1f78bea8-1360-ce35-619f-8ebb3f1ddf09}\Root\InventoryApplicationFile\nova ordem.exe|12b3dd7daf805cf5
BinaryType
\REGISTRY\A\{1f78bea8-1360-ce35-619f-8ebb3f1ddf09}\Root\InventoryApplicationFile\nova ordem.exe|12b3dd7daf805cf5
ProductName
\REGISTRY\A\{1f78bea8-1360-ce35-619f-8ebb3f1ddf09}\Root\InventoryApplicationFile\nova ordem.exe|12b3dd7daf805cf5
ProductVersion
\REGISTRY\A\{1f78bea8-1360-ce35-619f-8ebb3f1ddf09}\Root\InventoryApplicationFile\nova ordem.exe|12b3dd7daf805cf5
LinkDate
\REGISTRY\A\{1f78bea8-1360-ce35-619f-8ebb3f1ddf09}\Root\InventoryApplicationFile\nova ordem.exe|12b3dd7daf805cf5
BinProductVersion
\REGISTRY\A\{1f78bea8-1360-ce35-619f-8ebb3f1ddf09}\Root\InventoryApplicationFile\nova ordem.exe|12b3dd7daf805cf5
AppxPackageFullName
\REGISTRY\A\{1f78bea8-1360-ce35-619f-8ebb3f1ddf09}\Root\InventoryApplicationFile\nova ordem.exe|12b3dd7daf805cf5
AppxPackageRelativeId
\REGISTRY\A\{1f78bea8-1360-ce35-619f-8ebb3f1ddf09}\Root\InventoryApplicationFile\nova ordem.exe|12b3dd7daf805cf5
Size
\REGISTRY\A\{1f78bea8-1360-ce35-619f-8ebb3f1ddf09}\Root\InventoryApplicationFile\nova ordem.exe|12b3dd7daf805cf5
Language
\REGISTRY\A\{1f78bea8-1360-ce35-619f-8ebb3f1ddf09}\Root\InventoryApplicationFile\nova ordem.exe|12b3dd7daf805cf5
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3B00000
direct allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2571E87D000
trusted library allocation
page read and write
malicious
2571E540000
trusted library allocation
page read and write
malicious
7FFD9B770000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
372F000
heap
page read and write
2571CAE9000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
25736DB0000
heap
page read and write
2571CA00000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
2571C890000
unkown
page readonly
38D9000
direct allocation
page execute and read and write
25736DDB000
heap
page read and write
3290000
heap
page read and write
25738AA0000
heap
page execute and read and write
2571CB46000
heap
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
7FFD9B940000
trusted library allocation
page read and write
2572E68C000
trusted library allocation
page read and write
7FFD9B917000
trusted library allocation
page read and write
2571CAC0000
heap
page read and write
A5D7AF3000
stack
page read and write
7FFD9B810000
trusted library allocation
page read and write
2571CCC0000
heap
page read and write
323E000
stack
page read and write
2571CD10000
heap
page read and write
2571E525000
trusted library allocation
page read and write
2571CB00000
heap
page read and write
257385D8000
heap
page read and write
2572E8EA000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
2571C892000
unkown
page readonly
328F000
heap
page read and write
3264000
heap
page read and write
2571CD15000
heap
page read and write
3B40000
direct allocation
page read and write
3290000
heap
page read and write
378F000
stack
page read and write
3C50000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
7FFD9B920000
trusted library allocation
page read and write
2571CB34000
heap
page read and write
3200000
direct allocation
page read and write
3284000
heap
page read and write
2F7C000
stack
page read and write
7FFD9B952000
trusted library allocation
page read and write
328A000
heap
page read and write
2571CB2C000
heap
page read and write
3280000
heap
page read and write
A5D7EFE000
stack
page read and write
7FF4038B0000
trusted library allocation
page execute and read and write
25736DC9000
heap
page read and write
2571CA90000
trusted library allocation
page read and write
25736530000
trusted library allocation
page read and write
25737EB0000
trusted library allocation
page read and write
3287000
heap
page read and write
2571CBF0000
trusted library section
page readonly
7FFD9B820000
trusted library allocation
page execute and read and write
3575000
heap
page read and write
3A81000
direct allocation
page execute and read and write
2572E511000
trusted library allocation
page read and write
2571CB2F000
heap
page read and write
2571CAB0000
trusted library allocation
page read and write
A5D85FD000
stack
page read and write
2571CB78000
heap
page read and write
3451000
heap
page read and write
3733000
heap
page read and write
37B0000
direct allocation
page execute and read and write
7FFD9B900000
trusted library allocation
page read and write
2571CB81000
heap
page read and write
2571E5E2000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
A5D83FE000
stack
page read and write
2571CAC6000
heap
page read and write
38DD000
direct allocation
page execute and read and write
2571CEE0000
heap
page read and write
A5D7CFE000
stack
page read and write
25737ED2000
trusted library allocation
page read and write
2573852B000
trusted library section
page read and write
2571C920000
heap
page read and write
2572E501000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
7FFD9B760000
trusted library allocation
page read and write
2571CC10000
heap
page execute and read and write
7FFD9B762000
trusted library allocation
page read and write
2571CBC3000
trusted library allocation
page read and write
394E000
direct allocation
page execute and read and write
3B40000
direct allocation
page read and write
3260000
heap
page read and write
2571E501000
trusted library allocation
page read and write
257385A0000
heap
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
7FFD9B763000
trusted library allocation
page execute and read and write
7FFD9B906000
trusted library allocation
page read and write
2572E50D000
trusted library allocation
page read and write
368E000
stack
page read and write
7FFD9B910000
trusted library allocation
page read and write
3450000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
3452000
heap
page read and write
3451000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
3AF2000
direct allocation
page execute and read and write
A5D7BFE000
stack
page read and write
3264000
heap
page read and write
3606000
heap
page read and write
3B40000
direct allocation
page read and write
2571CCE0000
heap
page read and write
7FFD9B772000
trusted library allocation
page read and write
2FE0000
heap
page read and write
3B40000
direct allocation
page read and write
A5D7DFF000
stack
page read and write
2571CCC5000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
7FFD9B778000
trusted library allocation
page read and write
2F3D000
stack
page read and write
400000
remote allocation
page execute and read and write
2571CBC0000
trusted library allocation
page read and write
257382B0000
heap
page read and write
2571CCA0000
heap
page read and write
7FFD9B91C000
trusted library allocation
page read and write
A5D82FF000
stack
page read and write
2571CEE5000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
257383B0000
trusted library section
page read and write
2571CB03000
heap
page read and write
25736DA0000
heap
page read and write
2FF0000
heap
page read and write
A5D7FFB000
stack
page read and write
2571CACC000
heap
page read and write
A5D81FC000
stack
page read and write
2571CA20000
heap
page read and write
3A7D000
direct allocation
page execute and read and write
37A4000
heap
page read and write
A5D84FE000
stack
page read and write
364E000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
2571CA40000
heap
page read and write
3B40000
direct allocation
page read and write
25736DC0000
heap
page read and write
3B40000
direct allocation
page read and write
2572E507000
trusted library allocation
page read and write
25736CD0000
trusted library section
page read and write
A5D80FC000
stack
page read and write
There are 138 hidden memdumps, click here to show them.