IOC Report
shipment details.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\shipment details.exe
"C:\Users\user\Desktop\shipment details.exe"
malicious
C:\Users\user\Desktop\shipment details.exe
"C:\Users\user\Desktop\shipment details.exe"
malicious

URLs

Name
IP
Malicious
https://api.telegram.org
unknown
malicious
https://api.telegram.org/bot
unknown
malicious
https://api.telegram.org/bot7556271394:AAEi7387e6n5TKFT7iFrsH4cBWT2k35v3D8/sendDocument?chat_id=2135869667&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery
149.154.167.220
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:571345%0D%0ADate%20and%20Time:%2009/10/2024%20/%2004:32:20%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20571345%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://varders.kozow.com:8081
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:571345%0D%0ADate%20a
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://checkip.dyndns.org/
158.101.44.242
http://51.38.247.67:8081/_send_.php?L
unknown
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
http://anotherarmy.dns.army:8081
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
https://api.telegram.org/bot7556271394:AAEi7387e6n5TKFT7iFrsH4cBWT2k35v3D8/sendDocument?chat_id=2135
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
56.163.245.4.in-addr.arpa
unknown
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
158.101.44.242

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
158.101.44.242
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2DA1000
trusted library allocation
page read and write
malicious
2F1D000
trusted library allocation
page read and write
malicious
3AD9000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
9160000
trusted library allocation
page read and write
29A0000
heap
page execute and read and write
4B0E000
stack
page read and write
4276000
trusted library allocation
page read and write
3052000
trusted library allocation
page read and write
CCB000
trusted library allocation
page execute and read and write
6C00000
trusted library allocation
page read and write
3DC9000
trusted library allocation
page read and write
3DBB000
trusted library allocation
page read and write
2E47000
trusted library allocation
page read and write
305F000
trusted library allocation
page read and write
2E4B000
trusted library allocation
page read and write
301C000
trusted library allocation
page read and write
67A7000
heap
page read and write
2F61000
trusted library allocation
page read and write
5500000
heap
page read and write
3E10000
trusted library allocation
page read and write
54DB000
stack
page read and write
B90000
heap
page read and write
2E5B000
trusted library allocation
page read and write
3012000
trusted library allocation
page read and write
C93000
trusted library allocation
page execute and read and write
722000
unkown
page readonly
A39000
stack
page read and write
5400000
trusted library allocation
page read and write
107E000
stack
page read and write
2970000
trusted library allocation
page read and write
3DB4000
trusted library allocation
page read and write
CBA000
trusted library allocation
page execute and read and write
2EA9000
trusted library allocation
page read and write
2F84000
trusted library allocation
page read and write
6D52000
trusted library allocation
page read and write
1126000
heap
page read and write
6BBA000
trusted library allocation
page read and write
4F71000
trusted library allocation
page read and write
4F7D000
trusted library allocation
page read and write
3AD1000
trusted library allocation
page read and write
5E10000
heap
page read and write
2E16000
trusted library allocation
page read and write
5410000
heap
page read and write
1350000
heap
page read and write
53B3000
trusted library allocation
page read and write
3F71000
trusted library allocation
page read and write
D44000
heap
page read and write
2DF0000
trusted library allocation
page read and write
548E000
stack
page read and write
3EB2000
trusted library allocation
page read and write
D10000
heap
page read and write
2AD1000
trusted library allocation
page read and write
5570000
heap
page read and write
12CD000
trusted library allocation
page execute and read and write
3DC1000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
6C10000
trusted library allocation
page execute and read and write
4F82000
trusted library allocation
page read and write
10F8000
heap
page read and write
1090000
heap
page read and write
2E3F000
trusted library allocation
page read and write
30A5000
trusted library allocation
page read and write
29B0000
trusted library allocation
page read and write
CC7000
trusted library allocation
page execute and read and write
CA3000
trusted library allocation
page read and write
3E09000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page execute and read and write
4DA0000
trusted library allocation
page read and write
5580000
heap
page read and write
1310000
trusted library allocation
page read and write
54E0000
heap
page execute and read and write
410B000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
2D84000
trusted library allocation
page read and write
2995000
trusted library allocation
page read and write
4125000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
4137000
trusted library allocation
page read and write
4DA8000
trusted library allocation
page read and write
3E1D000
trusted library allocation
page read and write
5503000
heap
page read and write
2E57000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
301A000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
412C000
trusted library allocation
page read and write
12B0000
heap
page read and write
58EE000
stack
page read and write
1340000
trusted library allocation
page read and write
6C20000
trusted library allocation
page execute and read and write
4F5B000
trusted library allocation
page read and write
662E000
stack
page read and write
4235000
trusted library allocation
page read and write
4148000
trusted library allocation
page read and write
41C3000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
40B6000
trusted library allocation
page read and write
2D90000
heap
page execute and read and write
298F000
trusted library allocation
page read and write
54E0000
trusted library section
page readonly
53C6000
trusted library allocation
page read and write
2C3E000
stack
page read and write
2E53000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
111A000
heap
page read and write
12F0000
trusted library allocation
page read and write
308F000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
2E85000
trusted library allocation
page read and write
2DFC000
trusted library allocation
page read and write
CB6000
trusted library allocation
page execute and read and write
409E000
trusted library allocation
page read and write
6A6F000
stack
page read and write
3021000
trusted library allocation
page read and write
7280000
heap
page read and write
2E1A000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
6BE0000
trusted library allocation
page read and write
7080000
trusted library allocation
page execute and read and write
30AF000
trusted library allocation
page read and write
6D26000
trusted library allocation
page read and write
5420000
trusted library section
page read and write
2E4F000
trusted library allocation
page read and write
686D000
stack
page read and write
70A0000
heap
page read and write
12B7000
heap
page read and write
2E5F000
trusted library allocation
page read and write
2E07000
trusted library allocation
page read and write
C94000
trusted library allocation
page read and write
3FC7000
trusted library allocation
page read and write
410D000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
40B4000
trusted library allocation
page read and write
2F5B000
trusted library allocation
page read and write
2E43000
trusted library allocation
page read and write
12F7000
trusted library allocation
page execute and read and write
4118000
trusted library allocation
page read and write
3048000
trusted library allocation
page read and write
4F3E000
stack
page read and write
6D04000
trusted library allocation
page read and write
6C30000
trusted library allocation
page execute and read and write
B37000
stack
page read and write
3F99000
trusted library allocation
page read and write
2FF2000
trusted library allocation
page read and write
1330000
trusted library allocation
page execute and read and write
4C0E000
stack
page read and write
10D0000
heap
page read and write
5BE0000
heap
page read and write
506E000
stack
page read and write
12C3000
trusted library allocation
page execute and read and write
3FE3000
trusted library allocation
page read and write
6C40000
trusted library allocation
page execute and read and write
5E15000
heap
page read and write
6CF0000
trusted library allocation
page read and write
30A9000
trusted library allocation
page read and write
53E1000
trusted library allocation
page read and write
40FE000
trusted library allocation
page read and write
1320000
heap
page read and write
4FD0000
heap
page read and write
D37000
heap
page read and write
53C0000
trusted library section
page read and write
413E000
trusted library allocation
page read and write
5C00000
heap
page read and write
CE0000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
CAD000
trusted library allocation
page execute and read and write
7622000
trusted library allocation
page read and write
BB0000
heap
page read and write
6D90000
trusted library allocation
page read and write
5286000
trusted library allocation
page read and write
2F44000
trusted library allocation
page read and write
1030000
heap
page read and write
3DA1000
trusted library allocation
page read and write
4143000
trusted library allocation
page read and write
528E000
trusted library allocation
page read and write
6D10000
trusted library allocation
page execute and read and write
418D000
trusted library allocation
page read and write
12EA000
trusted library allocation
page execute and read and write
3E2C000
trusted library allocation
page read and write
30AB000
trusted library allocation
page read and write
12F2000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
53F2000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
4FFC000
trusted library allocation
page read and write
D53000
heap
page read and write
BA0000
heap
page read and write
D1A000
heap
page read and write
6D55000
trusted library allocation
page read and write
30A3000
trusted library allocation
page read and write
6BB6000
trusted library allocation
page read and write
4F6E000
trusted library allocation
page read and write
68AE000
stack
page read and write
5E00000
trusted library allocation
page execute and read and write
2D7C000
stack
page read and write
3EFE000
trusted library allocation
page read and write
4FD3000
heap
page read and write
12AE000
stack
page read and write
6D50000
trusted library allocation
page read and write
10E0000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
2E12000
trusted library allocation
page read and write
E0A000
heap
page read and write
10F0000
heap
page read and write
53D0000
trusted library allocation
page execute and read and write
11D3000
heap
page read and write
5070000
trusted library allocation
page read and write
2F8D000
trusted library allocation
page read and write
68EE000
stack
page read and write
6F20000
heap
page read and write
12E6000
trusted library allocation
page execute and read and write
675A000
heap
page read and write
407C000
trusted library allocation
page read and write
4220000
trusted library allocation
page read and write
4FE0000
heap
page read and write
53ED000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page read and write
406D000
trusted library allocation
page read and write
2E0A000
trusted library allocation
page read and write
4FFA000
trusted library allocation
page read and write
3EDE000
trusted library allocation
page read and write
5C2E000
heap
page read and write
528A000
trusted library allocation
page read and write
3E34000
trusted library allocation
page read and write
55B0000
heap
page read and write
3E21000
trusted library allocation
page read and write
12E2000
trusted library allocation
page read and write
4153000
trusted library allocation
page read and write
4057000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
5E20000
heap
page read and write
3E2A000
trusted library allocation
page read and write
3E89000
trusted library allocation
page read and write
53DA000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
1183000
heap
page read and write
DC7000
stack
page read and write
12C4000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
5000000
trusted library allocation
page execute and read and write
C60000
heap
page read and write
6AAE000
stack
page read and write
12DD000
trusted library allocation
page execute and read and write
3017000
trusted library allocation
page read and write
2D3E000
stack
page read and write
6F2E000
heap
page read and write
79A000
unkown
page readonly
5E55000
heap
page read and write
6BAE000
stack
page read and write
CC2000
trusted library allocation
page read and write
4FFF000
trusted library allocation
page read and write
145E000
stack
page read and write
5BF0000
heap
page read and write
53B1000
trusted library allocation
page read and write
539E000
stack
page read and write
2F92000
trusted library allocation
page read and write
6D77000
trusted library allocation
page read and write
5C04000
heap
page read and write
7230000
trusted library allocation
page read and write
D1E000
heap
page read and write
5E3A000
heap
page read and write
5290000
heap
page execute and read and write
6730000
heap
page read and write
3FF8000
trusted library allocation
page read and write
6A2E000
stack
page read and write
5DDE000
stack
page read and write
53E0000
trusted library allocation
page read and write
304D000
trusted library allocation
page read and write
6BB4000
trusted library allocation
page read and write
29C0000
heap
page read and write
3E2F000
trusted library allocation
page read and write
309D000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
53DE000
trusted library allocation
page read and write
CF0000
trusted library allocation
page execute and read and write
12F5000
trusted library allocation
page execute and read and write
3025000
trusted library allocation
page read and write
3E26000
trusted library allocation
page read and write
4272000
trusted library allocation
page read and write
2ACE000
stack
page read and write
675F000
heap
page read and write
3FC4000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
1080000
heap
page read and write
53B6000
trusted library allocation
page read and write
2EA7000
trusted library allocation
page read and write
3059000
trusted library allocation
page read and write
DC2000
heap
page read and write
31E7000
trusted library allocation
page read and write
C9D000
trusted library allocation
page execute and read and write
53E6000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
CCA000
stack
page read and write
528C000
trusted library allocation
page read and write
12FB000
trusted library allocation
page execute and read and write
3E9F000
trusted library allocation
page read and write
6BCD000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
5E30000
heap
page read and write
4248000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page execute and read and write
3E17000
trusted library allocation
page read and write
672E000
stack
page read and write
720000
unkown
page readonly
3F86000
trusted library allocation
page read and write
3F14000
trusted library allocation
page read and write
69EE000
stack
page read and write
CB0000
trusted library allocation
page read and write
1187000
heap
page read and write
There are 309 hidden memdumps, click here to show them.