IOC Report
new order 00041221.exe

loading gif

Files

File Path
Type
Category
Malicious
new order 00041221.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\new order 00041221.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\new order 00041221.exe
"C:\Users\user\Desktop\new order 00041221.exe"
malicious
C:\Users\user\Desktop\new order 00041221.exe
"C:\Users\user\Desktop\new order 00041221.exe"
malicious

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://r11.o.lencr.org0#
unknown
https://api.telegram.org/bot
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:899552%0D%0ADate%20and%20Time:%2027/07/2024%20/%2000:07:11%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20899552%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://www.office.com/lB
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:899552%0D%0ADate%20a
unknown
https://chrome.google.com/webstore?hl=en0
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://varders.kozow.com:8081
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://checkip.dyndns.org/
193.122.6.168
http://51.38.247.67:8081/_send_.php?L
unknown
http://r11.i.lencr.org/0Q
unknown
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
https://www.office.com/0
unknown
http://anotherarmy.dns.army:8081
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
http://mail.moonbrosurgical.com
unknown
https://reallyfreegeoip.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 28 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
15.164.165.52.in-addr.arpa
unknown
malicious
checkip.dyndns.org
unknown
malicious
mail.moonbrosurgical.com
203.124.44.4
checkip.dyndns.com
193.122.6.168

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
203.124.44.4
mail.moonbrosurgical.com
Pakistan
193.122.6.168
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2EE1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3859000
trusted library allocation
page read and write
malicious
38FA000
trusted library allocation
page read and write
malicious
5A14000
trusted library allocation
page read and write
79E000
heap
page read and write
1300000
heap
page read and write
121D000
trusted library allocation
page execute and read and write
3241000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
5610000
heap
page read and write
AF0000
trusted library allocation
page read and write
40BC000
trusted library allocation
page read and write
2F83000
trusted library allocation
page read and write
6AD0000
trusted library section
page read and write
3275000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
27CD000
trusted library allocation
page read and write
3186000
trusted library allocation
page read and write
2FE7000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
6F7000
stack
page read and write
4C60000
heap
page read and write
3074000
trusted library allocation
page read and write
3193000
trusted library allocation
page read and write
2630000
trusted library allocation
page read and write
4186000
trusted library allocation
page read and write
666E000
stack
page read and write
6DC0000
trusted library allocation
page execute and read and write
6C40000
trusted library allocation
page execute and read and write
5A1A000
trusted library allocation
page read and write
3FD5000
trusted library allocation
page read and write
2F93000
trusted library allocation
page read and write
4F40000
heap
page read and write
318D000
trusted library allocation
page read and write
2F3C000
trusted library allocation
page read and write
69F4000
heap
page read and write
549E000
trusted library allocation
page read and write
6C9E000
stack
page read and write
31E3000
trusted library allocation
page read and write
790000
heap
page read and write
7F7000
heap
page read and write
AF3000
trusted library allocation
page execute and read and write
14FF000
stack
page read and write
4D90000
trusted library allocation
page read and write
3096000
trusted library allocation
page read and write
4094000
trusted library allocation
page read and write
6EE06000
unkown
page readonly
CC0000
trusted library allocation
page read and write
124B000
trusted library allocation
page execute and read and write
1240000
trusted library allocation
page read and write
413A000
trusted library allocation
page read and write
419E000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
5040000
heap
page read and write
2F47000
trusted library allocation
page read and write
326C000
trusted library allocation
page read and write
27BE000
trusted library allocation
page read and write
CAE000
stack
page read and write
2F9B000
trusted library allocation
page read and write
2851000
trusted library allocation
page read and write
4D7C000
trusted library allocation
page read and write
315F000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
54BD000
trusted library allocation
page read and write
6C2E000
stack
page read and write
54AE000
trusted library allocation
page read and write
3EF4000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
6B70000
trusted library allocation
page execute and read and write
12D0000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
28AB000
trusted library allocation
page read and write
B0D000
trusted library allocation
page execute and read and write
AE0000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
1204000
trusted library allocation
page read and write
1230000
heap
page read and write
31DF000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
DCE000
stack
page read and write
4C50000
heap
page read and write
3FC4000
trusted library allocation
page read and write
3F97000
trusted library allocation
page read and write
740000
heap
page read and write
2ED0000
heap
page execute and read and write
4037000
trusted library allocation
page read and write
4208000
trusted library allocation
page read and write
6A09000
heap
page read and write
B16000
trusted library allocation
page execute and read and write
798000
heap
page read and write
12E4000
trusted library allocation
page read and write
696E000
stack
page read and write
1247000
trusted library allocation
page execute and read and write
6D87000
trusted library allocation
page read and write
41E2000
trusted library allocation
page read and write
40EA000
trusted library allocation
page read and write
A7F000
stack
page read and write
315B000
trusted library allocation
page read and write
78E000
stack
page read and write
2640000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
6A6E000
stack
page read and write
4E00000
trusted library section
page read and write
5230000
trusted library allocation
page execute and read and write
4D70000
trusted library allocation
page read and write
40E6000
trusted library allocation
page read and write
963E000
stack
page read and write
B27000
trusted library allocation
page execute and read and write
1226000
trusted library allocation
page execute and read and write
279C000
stack
page read and write
31D4000
trusted library allocation
page read and write
3851000
trusted library allocation
page read and write
2F8B000
trusted library allocation
page read and write
4D60000
heap
page read and write
6D14000
trusted library allocation
page read and write
4E30000
heap
page execute and read and write
4106000
trusted library allocation
page read and write
38BC000
trusted library allocation
page read and write
12CE000
stack
page read and write
B60000
heap
page read and write
6C80000
trusted library allocation
page execute and read and write
5A30000
trusted library allocation
page execute and read and write
4E20000
trusted library allocation
page read and write
6AAE000
stack
page read and write
31D9000
trusted library allocation
page read and write
42B8000
trusted library allocation
page read and write
1203000
trusted library allocation
page execute and read and write
C6F000
stack
page read and write
313D000
trusted library allocation
page read and write
3F09000
trusted library allocation
page read and write
ABE000
stack
page read and write
1270000
trusted library allocation
page execute and read and write
3EEF000
trusted library allocation
page read and write
40A9000
trusted library allocation
page read and write
8A0000
heap
page read and write
1610000
heap
page read and write
418F000
trusted library allocation
page read and write
3143000
trusted library allocation
page read and write
6D36000
trusted library allocation
page read and write
594F000
stack
page read and write
427B000
trusted library allocation
page read and write
3061000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
5383000
heap
page read and write
72A0000
heap
page read and write
269C000
stack
page read and write
861000
heap
page read and write
10F7000
stack
page read and write
411B000
trusted library allocation
page read and write
2DC8000
trusted library allocation
page read and write
4BCC000
stack
page read and write
7D55000
trusted library allocation
page read and write
5A2D000
trusted library allocation
page read and write
54B6000
trusted library allocation
page read and write
2830000
trusted library section
page readonly
6D90000
trusted library allocation
page read and write
4265000
trusted library allocation
page read and write
31C3000
trusted library allocation
page read and write
25C6000
trusted library allocation
page read and write
977D000
stack
page read and write
3F01000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
DF0000
heap
page read and write
6D20000
trusted library allocation
page execute and read and write
6C70000
trusted library allocation
page execute and read and write
1242000
trusted library allocation
page read and write
6EE0D000
unkown
page read and write
4198000
trusted library allocation
page read and write
6D62000
trusted library allocation
page read and write
4CB3000
heap
page read and write
7D3000
heap
page read and write
2F2F000
trusted library allocation
page read and write
98BD000
stack
page read and write
1280000
heap
page read and write
54B1000
trusted library allocation
page read and write
41D7000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
2F51000
trusted library allocation
page read and write
4E11000
trusted library allocation
page read and write
1245000
trusted library allocation
page execute and read and write
93FE000
stack
page read and write
6C60000
trusted library allocation
page execute and read and write
2F9F000
trusted library allocation
page read and write
3261000
trusted library allocation
page read and write
6AEE000
stack
page read and write
94FE000
stack
page read and write
5380000
heap
page read and write
3065000
trusted library allocation
page read and write
6678000
heap
page read and write
1220000
trusted library allocation
page read and write
CD7000
heap
page read and write
5300000
heap
page read and write
9780000
heap
page read and write
282000
unkown
page readonly
4CB0000
heap
page read and write
1210000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
6B2E000
stack
page read and write
41EF000
trusted library allocation
page read and write
D1A000
stack
page read and write
2F55000
trusted library allocation
page read and write
30F2000
trusted library allocation
page read and write
27C1000
trusted library allocation
page read and write
3F47000
trusted library allocation
page read and write
6EDF1000
unkown
page execute read
30A5000
trusted library allocation
page read and write
2840000
heap
page execute and read and write
31D1000
trusted library allocation
page read and write
120D000
trusted library allocation
page execute and read and write
549B000
trusted library allocation
page read and write
7B7000
heap
page read and write
B1A000
trusted library allocation
page execute and read and write
CB0000
trusted library allocation
page read and write
99BE000
stack
page read and write
B12000
trusted library allocation
page read and write
6C30000
trusted library allocation
page read and write
730000
heap
page read and write
25C0000
trusted library allocation
page read and write
7FBF000
stack
page read and write
3067000
trusted library allocation
page read and write
7FB20000
trusted library allocation
page execute and read and write
5A20000
trusted library allocation
page read and write
4001000
trusted library allocation
page read and write
6C90000
trusted library allocation
page execute and read and write
1337000
heap
page read and write
2620000
trusted library allocation
page read and write
5496000
trusted library allocation
page read and write
967D000
stack
page read and write
6CF0000
trusted library allocation
page read and write
1308000
heap
page read and write
3270000
trusted library allocation
page read and write
3214000
trusted library allocation
page read and write
326A000
trusted library allocation
page read and write
3138000
trusted library allocation
page read and write
3FAD000
trusted library allocation
page read and write
3CA000
stack
page read and write
4FDE000
stack
page read and write
2F87000
trusted library allocation
page read and write
41E9000
trusted library allocation
page read and write
CD0000
heap
page read and write
B22000
trusted library allocation
page read and write
9AFE000
stack
page read and write
4166000
trusted library allocation
page read and write
4021000
trusted library allocation
page read and write
3EE1000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page execute and read and write
4195000
trusted library allocation
page read and write
27AB000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
2E9C000
stack
page read and write
30D0000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page execute and read and write
1222000
trusted library allocation
page read and write
27A0000
trusted library allocation
page read and write
99FD000
stack
page read and write
309A000
trusted library allocation
page read and write
66E6000
heap
page read and write
53D0000
trusted library allocation
page read and write
41F2000
trusted library allocation
page read and write
AFD000
trusted library allocation
page execute and read and write
68AE000
stack
page read and write
338000
unkown
page readonly
5560000
trusted library allocation
page read and write
6EDF0000
unkown
page readonly
260E000
stack
page read and write
31DD000
trusted library allocation
page read and write
1334000
heap
page read and write
692E000
stack
page read and write
4F3E000
stack
page read and write
428D000
trusted library allocation
page read and write
13EC000
heap
page read and write
3298000
trusted library allocation
page read and write
3092000
trusted library allocation
page read and write
3A2E000
trusted library allocation
page read and write
6DE0000
heap
page read and write
13AF000
heap
page read and write
AF4000
trusted library allocation
page read and write
DD0000
heap
page read and write
5510000
heap
page execute and read and write
122A000
trusted library allocation
page execute and read and write
656E000
stack
page read and write
4D78000
trusted library allocation
page read and write
25BE000
stack
page read and write
3098000
trusted library allocation
page read and write
4C80000
trusted library allocation
page execute and read and write
2F8F000
trusted library allocation
page read and write
B50000
trusted library allocation
page execute and read and write
7D1000
heap
page read and write
4C90000
heap
page read and write
550D000
stack
page read and write
306F000
trusted library allocation
page read and write
69E2000
heap
page read and write
4193000
trusted library allocation
page read and write
6670000
heap
page read and write
314D000
trusted library allocation
page read and write
6EE0F000
unkown
page readonly
42BB000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
93BE000
stack
page read and write
280000
unkown
page readonly
67AE000
stack
page read and write
3180000
trusted library allocation
page read and write
1200000
trusted library allocation
page read and write
132A000
heap
page read and write
6D65000
trusted library allocation
page read and write
3267000
trusted library allocation
page read and write
2FC7000
trusted library allocation
page read and write
27C6000
trusted library allocation
page read and write
15FE000
stack
page read and write
4C95000
heap
page read and write
953E000
stack
page read and write
804000
heap
page read and write
52EE000
stack
page read and write
7FB000
heap
page read and write
3069000
trusted library allocation
page read and write
4F50000
heap
page read and write
54C2000
trusted library allocation
page read and write
D80000
heap
page read and write
2FC5000
trusted library allocation
page read and write
257E000
stack
page read and write
11F0000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
5A16000
trusted library allocation
page read and write
3156000
trusted library allocation
page read and write
2F97000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
2650000
heap
page read and write
6CA0000
trusted library section
page read and write
131E000
heap
page read and write
52F0000
trusted library section
page read and write
B2B000
trusted library allocation
page execute and read and write
31D7000
trusted library allocation
page read and write
41DC000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
3EFB000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
68ED000
stack
page read and write
2F5A000
trusted library allocation
page read and write
418A000
trusted library allocation
page read and write
There are 333 hidden memdumps, click here to show them.