IOC Report
Hesaphareketi-01.exe

loading gif

Files

File Path
Type
Category
Malicious
Hesaphareketi-01.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\vaccinators
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Hesaphareketi-01.exe
"C:\Users\user\Desktop\Hesaphareketi-01.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\Hesaphareketi-01.exe"
malicious

URLs

Name
IP
Malicious
http://aborters.duckdns.org:8081
unknown
malicious
http://anotherarmy.dns.army:8081
unknown
malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:813435%0D%0ADate%20and%20Time:%2003/10/2024%20/%2015:06:33%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20813435%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://api.telegram.org/bot
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:813435%0D%0ADate%20a
unknown
http://lifechangerscare.com
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.office.com/lBlq
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://varders.kozow.com:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://checkip.dyndns.org/
132.226.247.73
http://51.38.247.67:8081/_send_.php?L
unknown
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
http://ftp.lifechangerscare.com
unknown
https://reallyfreegeoip.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://chrome.google.com/webstore?hl=enlBlq
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
lifechangerscare.com
216.252.233.118
malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
ftp.lifechangerscare.com
unknown
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
132.226.247.73

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
216.252.233.118
lifechangerscare.com
Switzerland
malicious
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A80000
direct allocation
page read and write
malicious
2AE1000
trusted library allocation
page read and write
malicious
2CD2000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
3AF4000
trusted library allocation
page read and write
E95000
trusted library allocation
page execute and read and write
400C000
heap
page read and write
487E000
direct allocation
page read and write
C35000
heap
page read and write
E64000
trusted library allocation
page read and write
9A000
stack
page read and write
3FC6000
heap
page read and write
3FC6000
heap
page read and write
3FC6000
heap
page read and write
3FC6000
heap
page read and write
107E000
trusted library allocation
page read and write
3D6B000
trusted library allocation
page read and write
2E86000
trusted library allocation
page read and write
6550000
trusted library allocation
page read and write
4809000
direct allocation
page read and write
3E6A000
trusted library allocation
page read and write
109D000
trusted library allocation
page read and write
2E78000
trusted library allocation
page read and write
3FC6000
heap
page read and write
4540000
direct allocation
page read and write
3F76000
heap
page read and write
400000
unkown
page readonly
B2E000
heap
page read and write
3CC1000
trusted library allocation
page read and write
400C000
heap
page read and write
2D55000
trusted library allocation
page read and write
295E000
stack
page read and write
3FC5000
heap
page read and write
400C000
heap
page read and write
2B94000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
6A30000
heap
page read and write
2BA0000
trusted library allocation
page read and write
480D000
direct allocation
page read and write
3D98000
trusted library allocation
page read and write
3B4C000
trusted library allocation
page read and write
3C06000
trusted library allocation
page read and write
2D98000
trusted library allocation
page read and write
9C4000
heap
page read and write
63C0000
trusted library allocation
page execute and read and write
B3B000
heap
page read and write
EB0000
trusted library allocation
page read and write
3B9F000
stack
page read and write
4809000
direct allocation
page read and write
2D71000
trusted library allocation
page read and write
446000
system
page execute and read and write
2BEA000
trusted library allocation
page read and write
3F49000
heap
page read and write
2C67000
trusted library allocation
page read and write
3CAE000
trusted library allocation
page read and write
780000
heap
page read and write
46E0000
direct allocation
page read and write
3FC6000
heap
page read and write
6490000
trusted library allocation
page read and write
B46000
heap
page read and write
2D68000
trusted library allocation
page read and write
2C6B000
trusted library allocation
page read and write
4663000
direct allocation
page read and write
4A7000
unkown
page read and write
FEE000
stack
page read and write
2B80000
trusted library allocation
page read and write
BFC000
heap
page read and write
480D000
direct allocation
page read and write
400C000
heap
page read and write
2B8C000
trusted library allocation
page read and write
490000
unkown
page write copy
B18000
heap
page read and write
2B84000
trusted library allocation
page read and write
A1E000
stack
page read and write
2E7D000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
6400000
trusted library allocation
page execute and read and write
487E000
direct allocation
page read and write
3FC6000
heap
page read and write
2E53000
trusted library allocation
page read and write
487E000
direct allocation
page read and write
106C000
stack
page read and write
61EE000
stack
page read and write
442A000
heap
page read and write
2A50000
heap
page execute and read and write
3FC6000
heap
page read and write
3E21000
heap
page read and write
63D0000
trusted library allocation
page read and write
400C000
heap
page read and write
2C63000
trusted library allocation
page read and write
400C000
heap
page read and write
3D3F000
trusted library allocation
page read and write
2CA7000
trusted library allocation
page read and write
400C000
heap
page read and write
3FC6000
heap
page read and write
4AB000
unkown
page readonly
3050000
heap
page read and write
A40000
heap
page read and write
3AE1000
trusted library allocation
page read and write
10A2000
trusted library allocation
page read and write
3DF4000
trusted library allocation
page read and write
2C76000
trusted library allocation
page read and write
5FD1000
heap
page read and write
3DE7000
trusted library allocation
page read and write
8AF000
stack
page read and write
3DEE000
trusted library allocation
page read and write
3FC6000
heap
page read and write
3F50000
heap
page read and write
5043000
heap
page read and write
400C000
heap
page read and write
3FC6000
heap
page read and write
400C000
heap
page read and write
538E000
stack
page read and write
6430000
trusted library allocation
page execute and read and write
400C000
heap
page read and write
480D000
direct allocation
page read and write
55F4000
trusted library allocation
page read and write
379E000
stack
page read and write
46E0000
direct allocation
page read and write
3FC6000
heap
page read and write
2CE2000
trusted library allocation
page read and write
400000
unkown
page readonly
3DE1000
trusted library allocation
page read and write
3BB2000
trusted library allocation
page read and write
3FC6000
heap
page read and write
EC0000
trusted library allocation
page execute and read and write
3B09000
trusted library allocation
page read and write
3FC6000
heap
page read and write
970000
heap
page read and write
3FC6000
heap
page read and write
400C000
heap
page read and write
2B48000
trusted library allocation
page read and write
2A20000
trusted library allocation
page read and write
400C000
heap
page read and write
2DF1000
trusted library allocation
page read and write
64A7000
trusted library allocation
page read and write
6510000
trusted library allocation
page read and write
B10000
heap
page read and write
400C000
heap
page read and write
400C000
heap
page read and write
400C000
heap
page read and write
487E000
direct allocation
page read and write
3F49000
heap
page read and write
4809000
direct allocation
page read and write
2960000
heap
page read and write
2E7B000
trusted library allocation
page read and write
5F30000
heap
page read and write
ED0000
trusted library allocation
page read and write
400C000
heap
page read and write
AF7000
stack
page read and write
3C3C000
trusted library allocation
page read and write
400C000
heap
page read and write
2B53000
trusted library allocation
page read and write
63AE000
stack
page read and write
2B9C000
trusted library allocation
page read and write
3FC6000
heap
page read and write
ADE000
heap
page read and write
3FC6000
heap
page read and write
2B5B000
trusted library allocation
page read and write
1076000
trusted library allocation
page read and write
AD0000
heap
page read and write
46E0000
direct allocation
page read and write
E60000
trusted library allocation
page read and write
400C000
heap
page read and write
46E0000
direct allocation
page read and write
3FC6000
heap
page read and write
3B9C000
trusted library allocation
page read and write
3FC5000
heap
page read and write
2B32000
trusted library allocation
page read and write
4540000
direct allocation
page read and write
E9B000
trusted library allocation
page execute and read and write
3FC6000
heap
page read and write
3FC6000
heap
page read and write
400C000
heap
page read and write
3FC6000
heap
page read and write
487E000
direct allocation
page read and write
6420000
trusted library allocation
page execute and read and write
3FC6000
heap
page read and write
400C000
heap
page read and write
2D9E000
trusted library allocation
page read and write
3FC6000
heap
page read and write
3FC6000
heap
page read and write
3FC6000
heap
page read and write
400C000
heap
page read and write
4052000
heap
page read and write
64C0000
trusted library allocation
page execute and read and write
400C000
heap
page read and write
2DEE000
trusted library allocation
page read and write
E7D000
trusted library allocation
page execute and read and write
3CEF000
trusted library allocation
page read and write
4663000
direct allocation
page read and write
400C000
heap
page read and write
400C000
heap
page read and write
3DA3000
trusted library allocation
page read and write
5FB9000
heap
page read and write
400C000
heap
page read and write
400C000
heap
page read and write
2E73000
trusted library allocation
page read and write
E82000
trusted library allocation
page read and write
3D9A000
trusted library allocation
page read and write
400000
system
page execute and read and write
9BE000
stack
page read and write
3E0D000
trusted library allocation
page read and write
2D4A000
trusted library allocation
page read and write
3FC6000
heap
page read and write
2E26000
trusted library allocation
page read and write
3F05000
heap
page read and write
3F75000
heap
page read and write
2DD5000
trusted library allocation
page read and write
4540000
direct allocation
page read and write
2978000
trusted library allocation
page read and write
2CF8000
trusted library allocation
page read and write
2B57000
trusted library allocation
page read and write
46E0000
direct allocation
page read and write
ADA000
heap
page read and write
5040000
heap
page read and write
3FC6000
heap
page read and write
4809000
direct allocation
page read and write
6540000
trusted library allocation
page execute and read and write
3C50000
heap
page read and write
63F0000
trusted library allocation
page read and write
3D50000
heap
page read and write
5DEE000
stack
page read and write
3FC6000
heap
page read and write
400C000
heap
page read and write
3E8A000
heap
page read and write
400C000
heap
page read and write
400C000
heap
page read and write
2A30000
trusted library allocation
page read and write
4663000
direct allocation
page read and write
3D8F000
trusted library allocation
page read and write
400C000
heap
page read and write
4540000
direct allocation
page read and write
3B01000
trusted library allocation
page read and write
400C000
heap
page read and write
490000
unkown
page read and write
3FC6000
heap
page read and write
400C000
heap
page read and write
2E82000
trusted library allocation
page read and write
400C000
heap
page read and write
60EE000
stack
page read and write
3FC6000
heap
page read and write
64D6000
trusted library allocation
page read and write
4809000
direct allocation
page read and write
400C000
heap
page read and write
435A000
heap
page read and write
3F76000
heap
page read and write
9C0000
heap
page read and write
2DE2000
trusted library allocation
page read and write
E6D000
trusted library allocation
page execute and read and write
46E0000
direct allocation
page read and write
3C26000
trusted library allocation
page read and write
B07000
heap
page read and write
400C000
heap
page read and write
2C9A000
trusted library allocation
page read and write
7D0000
heap
page read and write
3EDB000
heap
page read and write
3FC6000
heap
page read and write
3BDA000
trusted library allocation
page read and write
7CE000
stack
page read and write
2C71000
trusted library allocation
page read and write
4540000
direct allocation
page read and write
6520000
trusted library allocation
page read and write
4BDE000
stack
page read and write
3DDC000
trusted library allocation
page read and write
8FE000
stack
page read and write
3F2A000
heap
page read and write
3E32000
heap
page read and write
2D5F000
trusted library allocation
page read and write
3F48000
heap
page execute and read and write
482000
unkown
page readonly
2C98000
trusted library allocation
page read and write
3E35000
heap
page read and write
400C000
heap
page read and write
3E80000
trusted library allocation
page read and write
3FC6000
heap
page read and write
400C000
heap
page read and write
5E2E000
stack
page read and write
3DF7000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
3FC6000
heap
page read and write
2C9C000
trusted library allocation
page read and write
BBE000
heap
page read and write
2DEB000
trusted library allocation
page read and write
93E000
stack
page read and write
3E92000
trusted library allocation
page read and write
5F92000
heap
page read and write
63E0000
trusted library allocation
page execute and read and write
2EA9000
trusted library allocation
page read and write
3D94000
trusted library allocation
page read and write
2DA4000
trusted library allocation
page read and write
B0D000
heap
page read and write
2E7B000
heap
page read and write
A70000
heap
page read and write
3C99000
trusted library allocation
page read and write
3BAE000
heap
page read and write
5F9B000
heap
page read and write
606D000
stack
page read and write
480D000
direct allocation
page read and write
5050000
heap
page read and write
401000
unkown
page execute read
5CEE000
stack
page read and write
3FC6000
heap
page read and write
3CEB000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
B03000
heap
page read and write
3FC6000
heap
page read and write
622E000
stack
page read and write
E97000
trusted library allocation
page execute and read and write
6502000
trusted library allocation
page read and write
6580000
heap
page read and write
3FC6000
heap
page read and write
3D8B000
trusted library allocation
page read and write
108E000
trusted library allocation
page read and write
71A000
stack
page read and write
2B90000
trusted library allocation
page read and write
E4E000
stack
page read and write
400C000
heap
page read and write
100000
heap
page read and write
3F4E000
heap
page read and write
2ABE000
stack
page read and write
482000
unkown
page readonly
400C000
heap
page read and write
480D000
direct allocation
page read and write
2AD0000
heap
page execute and read and write
2CA2000
trusted library allocation
page read and write
2D92000
trusted library allocation
page read and write
3AEF000
trusted library allocation
page read and write
3FC6000
heap
page read and write
2D4F000
trusted library allocation
page read and write
1096000
trusted library allocation
page read and write
400C000
heap
page read and write
C10000
heap
page read and write
3EEA000
heap
page read and write
4809000
direct allocation
page read and write
400C000
heap
page read and write
62AE000
stack
page read and write
2B88000
trusted library allocation
page read and write
400C000
heap
page read and write
400C000
heap
page read and write
E92000
trusted library allocation
page read and write
6539000
trusted library allocation
page read and write
2BC7000
trusted library allocation
page read and write
10B0000
heap
page read and write
E86000
trusted library allocation
page execute and read and write
63BD000
trusted library allocation
page read and write
626E000
stack
page read and write
3FC6000
heap
page read and write
1091000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
5F8D000
heap
page read and write
2B3E000
trusted library allocation
page read and write
5F2F000
stack
page read and write
1E0000
heap
page read and write
3FC6000
heap
page read and write
16CF000
stack
page read and write
4663000
direct allocation
page read and write
3FC6000
heap
page read and write
3BC9000
trusted library allocation
page read and write
2B4A000
trusted library allocation
page read and write
89F000
stack
page read and write
4AB000
unkown
page readonly
3FC6000
heap
page read and write
401000
unkown
page execute read
3E66000
heap
page read and write
2C69000
trusted library allocation
page read and write
60AE000
stack
page read and write
55F6000
trusted library allocation
page read and write
EE0000
heap
page read and write
6505000
trusted library allocation
page read and write
B48000
heap
page read and write
E63000
trusted library allocation
page execute and read and write
3055000
heap
page read and write
3EBD000
trusted library allocation
page read and write
102E000
stack
page read and write
487E000
direct allocation
page read and write
400C000
heap
page read and write
3FC6000
heap
page read and write
3FC6000
heap
page read and write
3D0B000
trusted library allocation
page read and write
3FC6000
heap
page read and write
C30000
heap
page read and write
3E59000
heap
page read and write
6530000
trusted library allocation
page read and write
3D9D000
trusted library allocation
page read and write
940000
heap
page read and write
400C000
heap
page read and write
12CE000
stack
page read and write
3D20000
trusted library allocation
page read and write
6500000
trusted library allocation
page read and write
3AFB000
trusted library allocation
page read and write
64B4000
trusted library allocation
page read and write
E0E000
stack
page read and write
3FC6000
heap
page read and write
2D6D000
trusted library allocation
page read and write
4663000
direct allocation
page read and write
3FC6000
heap
page read and write
2B98000
trusted library allocation
page read and write
3FC6000
heap
page read and write
64A0000
trusted library allocation
page read and write
3FC6000
heap
page read and write
2C94000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
400C000
heap
page read and write
480D000
direct allocation
page read and write
108A000
trusted library allocation
page read and write
400C000
heap
page read and write
400C000
heap
page read and write
4663000
direct allocation
page read and write
3EC0000
trusted library allocation
page read and write
4540000
direct allocation
page read and write
3E30000
heap
page read and write
2D9A000
trusted library allocation
page read and write
6410000
trusted library allocation
page execute and read and write
E8A000
trusted library allocation
page execute and read and write
107B000
trusted library allocation
page read and write
400C000
heap
page read and write
55FA000
trusted library allocation
page read and write
There are 409 hidden memdumps, click here to show them.