IOC Report
Zahlung_09102024,jpg.exe

loading gif

Files

File Path
Type
Category
Malicious
Zahlung_09102024,jpg.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Okeghem
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Zahlung_09102024,jpg.exe
"C:\Users\user\Desktop\Zahlung_09102024,jpg.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\Zahlung_09102024,jpg.exe"
malicious

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:284992%0D%0ADate%20and%20Time:%2010/10/2024%20/%2013:51:17%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20284992%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.office.com/lBjq
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.96.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://varders.kozow.com:8081
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://checkip.dyndns.org/
193.122.130.0
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
http://anotherarmy.dns.army:8081
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://reallyfreegeoip.org
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:284992%0D%0ADate%20a
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://chrome.google.com/webstore?hl=enlBjq
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
193.122.130.0

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
193.122.130.0
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2F20000
direct allocation
page read and write
malicious
2E31000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
6880000
trusted library allocation
page read and write
30E6000
trusted library allocation
page read and write
4239000
trusted library allocation
page read and write
492D000
direct allocation
page read and write
648E000
stack
page read and write
FF7000
heap
page read and write
4800000
direct allocation
page read and write
A79000
heap
page read and write
4660000
direct allocation
page read and write
4075000
heap
page read and write
2E95000
trusted library allocation
page read and write
402F000
heap
page read and write
41CA000
trusted library allocation
page read and write
2C20000
trusted library allocation
page execute and read and write
30A6000
trusted library allocation
page read and write
3EAD000
heap
page read and write
123F000
stack
page read and write
2C60000
trusted library allocation
page read and write
402F000
heap
page read and write
F30000
heap
page read and write
4783000
direct allocation
page read and write
4054000
trusted library allocation
page read and write
571E000
stack
page read and write
492D000
direct allocation
page read and write
402F000
heap
page read and write
4075000
heap
page read and write
402F000
heap
page read and write
402F000
heap
page read and write
401000
unkown
page execute read
2EDE000
trusted library allocation
page read and write
E20000
heap
page read and write
F2D000
trusted library allocation
page execute and read and write
4F2E000
stack
page read and write
F5A000
heap
page read and write
6E60000
heap
page read and write
2AB2000
trusted library allocation
page read and write
6750000
trusted library allocation
page read and write
4075000
heap
page read and write
A05000
heap
page read and write
4783000
direct allocation
page read and write
4660000
direct allocation
page read and write
4197000
trusted library allocation
page read and write
3117000
trusted library allocation
page read and write
4219000
trusted library allocation
page read and write
490000
unkown
page write copy
54C0000
trusted library allocation
page execute and read and write
4800000
direct allocation
page read and write
3DC0000
heap
page read and write
30A1000
trusted library allocation
page read and write
6760000
trusted library allocation
page execute and read and write
5300000
trusted library allocation
page execute and read and write
402F000
heap
page read and write
402F000
heap
page read and write
3B29000
heap
page read and write
3FE6000
heap
page read and write
940000
heap
page read and write
300D000
trusted library allocation
page read and write
492D000
direct allocation
page read and write
4075000
heap
page read and write
402F000
heap
page read and write
42D4000
trusted library allocation
page read and write
F4E000
heap
page read and write
402F000
heap
page read and write
A7B000
heap
page read and write
2FE1000
trusted library allocation
page read and write
42FE000
trusted library allocation
page read and write
499E000
direct allocation
page read and write
3F46000
heap
page read and write
F1D000
trusted library allocation
page execute and read and write
499E000
direct allocation
page read and write
312D000
trusted library allocation
page read and write
4050000
trusted library allocation
page read and write
3EB6000
trusted library allocation
page read and write
42C1000
trusted library allocation
page read and write
3F3B000
heap
page read and write
3CC0000
heap
page read and write
54B0000
trusted library allocation
page read and write
C7A000
stack
page read and write
499E000
direct allocation
page read and write
492D000
direct allocation
page read and write
A10000
heap
page read and write
DE0000
heap
page read and write
4A7000
unkown
page read and write
41D4000
trusted library allocation
page read and write
4075000
heap
page read and write
2EA0000
trusted library allocation
page read and write
3B1F000
stack
page read and write
424F000
trusted library allocation
page read and write
2FDE000
trusted library allocation
page read and write
402F000
heap
page read and write
658E000
stack
page read and write
4075000
heap
page read and write
2F36000
trusted library allocation
page read and write
6790000
trusted library allocation
page execute and read and write
101D000
heap
page read and write
4333000
trusted library allocation
page read and write
402F000
heap
page read and write
4660000
direct allocation
page read and write
4075000
heap
page read and write
400000
unkown
page readonly
402F000
heap
page read and write
2EEE000
trusted library allocation
page read and write
4075000
heap
page read and write
62D0000
heap
page read and write
A4E000
heap
page read and write
40BB000
heap
page read and write
4085000
trusted library allocation
page read and write
41B1000
trusted library allocation
page read and write
2F84000
heap
page read and write
4075000
heap
page read and write
A40000
heap
page read and write
2F14000
trusted library allocation
page read and write
A73000
heap
page read and write
2E16000
trusted library allocation
page read and write
6860000
trusted library allocation
page execute and read and write
499E000
direct allocation
page read and write
4800000
direct allocation
page read and write
8B4000
stack
page read and write
9A000
stack
page read and write
3FFD000
trusted library allocation
page read and write
402F000
heap
page read and write
402F000
heap
page read and write
54D0000
heap
page execute and read and write
93E000
stack
page read and write
3E51000
trusted library allocation
page read and write
4075000
heap
page read and write
3130000
trusted library allocation
page read and write
9AE000
stack
page read and write
4075000
heap
page read and write
FBE000
heap
page read and write
402F000
heap
page read and write
402F000
heap
page read and write
2D5E000
trusted library allocation
page read and write
4783000
direct allocation
page read and write
44DC000
heap
page read and write
482000
unkown
page readonly
3BA3000
heap
page read and write
4013000
trusted library allocation
page read and write
4660000
direct allocation
page read and write
632D000
heap
page read and write
402F000
heap
page read and write
3016000
trusted library allocation
page read and write
674E000
stack
page read and write
4108000
trusted library allocation
page read and write
4800000
direct allocation
page read and write
4075000
heap
page read and write
2EE2000
trusted library allocation
page read and write
402F000
heap
page read and write
402F000
heap
page read and write
2F38000
trusted library allocation
page read and write
41ED000
trusted library allocation
page read and write
6338000
heap
page read and write
402F000
heap
page read and write
402F000
heap
page read and write
2FDC000
trusted library allocation
page read and write
4800000
direct allocation
page read and write
402F000
heap
page read and write
490000
unkown
page read and write
6890000
trusted library allocation
page execute and read and write
3E95000
trusted library allocation
page read and write
3EAA000
heap
page read and write
2EDA000
trusted library allocation
page read and write
2D66000
trusted library allocation
page read and write
41C3000
trusted library allocation
page read and write
2E1A000
trusted library allocation
page read and write
4075000
heap
page read and write
3E31000
trusted library allocation
page read and write
3E59000
trusted library allocation
page read and write
3E44000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
2ED2000
trusted library allocation
page read and write
2FD0000
heap
page read and write
402F000
heap
page read and write
4075000
heap
page read and write
2AB0000
trusted library allocation
page read and write
2D6D000
trusted library allocation
page read and write
401000
unkown
page execute read
402F000
heap
page read and write
2E20000
heap
page execute and read and write
3ED0000
heap
page read and write
2FEB000
trusted library allocation
page read and write
3FB7000
heap
page read and write
3081000
trusted library allocation
page read and write
4075000
heap
page read and write
2F10000
heap
page read and write
EEE000
stack
page read and write
6870000
trusted library allocation
page read and write
EA0000
heap
page read and write
A7E000
heap
page read and write
2D40000
trusted library allocation
page read and write
F38000
heap
page read and write
3124000
trusted library allocation
page read and write
3FE1000
heap
page execute and read and write
2D90000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
3EEA000
heap
page read and write
2D4B000
trusted library allocation
page read and write
3EA3000
trusted library allocation
page read and write
2E97000
trusted library allocation
page read and write
2EEA000
trusted library allocation
page read and write
660E000
stack
page read and write
492D000
direct allocation
page read and write
664E000
stack
page read and write
2AA6000
trusted library allocation
page execute and read and write
53B0000
heap
page read and write
A00000
heap
page read and write
2AA2000
trusted library allocation
page read and write
3F96000
heap
page read and write
2D4E000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
3FA9000
heap
page read and write
43CC000
heap
page read and write
2FAA000
trusted library allocation
page read and write
3E67000
heap
page read and write
42AC000
trusted library allocation
page read and write
4075000
heap
page read and write
6857000
trusted library allocation
page read and write
4075000
heap
page read and write
6840000
trusted library allocation
page read and write
2C50000
heap
page read and write
A4A000
heap
page read and write
402E000
heap
page read and write
4025000
trusted library allocation
page read and write
3EA5000
heap
page read and write
41B8000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
30D7000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
12FE000
stack
page read and write
3012000
trusted library allocation
page read and write
3FA0000
trusted library allocation
page read and write
4075000
heap
page read and write
4075000
heap
page read and write
F13000
trusted library allocation
page execute and read and write
2E8A000
trusted library allocation
page read and write
1E0000
heap
page read and write
301C000
trusted library allocation
page read and write
4075000
heap
page read and write
3F2B000
trusted library allocation
page read and write
3E9C000
trusted library allocation
page read and write
40E3000
trusted library allocation
page read and write
100000
heap
page read and write
89F000
stack
page read and write
3EA9000
trusted library allocation
page read and write
4929000
direct allocation
page read and write
431E000
trusted library allocation
page read and write
492D000
direct allocation
page read and write
3021000
trusted library allocation
page read and write
163E000
stack
page read and write
52AD000
stack
page read and write
4075000
heap
page read and write
3F6A000
trusted library allocation
page read and write
4075000
heap
page read and write
EA5000
heap
page read and write
402F000
heap
page read and write
30AB000
trusted library allocation
page read and write
40F9000
trusted library allocation
page read and write
E6E000
stack
page read and write
3FE2000
heap
page read and write
499E000
direct allocation
page read and write
2DF0000
heap
page read and write
3133000
trusted library allocation
page read and write
4075000
heap
page read and write
9FE000
stack
page read and write
400000
unkown
page readonly
3FE2000
heap
page read and write
30E0000
trusted library allocation
page read and write
4302000
trusted library allocation
page read and write
4660000
direct allocation
page read and write
30B4000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
65CE000
stack
page read and write
4075000
heap
page read and write
406F000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
2EE6000
trusted library allocation
page read and write
4800000
direct allocation
page read and write
4075000
heap
page read and write
402F000
heap
page read and write
2AA0000
trusted library allocation
page read and write
2D3C000
stack
page read and write
2D80000
trusted library allocation
page read and write
402F000
heap
page read and write
632F000
heap
page read and write
2D61000
trusted library allocation
page read and write
4075000
heap
page read and write
418B000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
4075000
heap
page read and write
402F000
heap
page read and write
402F000
heap
page read and write
3F17000
heap
page read and write
68C0000
heap
page read and write
41DF000
trusted library allocation
page read and write
4929000
direct allocation
page read and write
402F000
heap
page read and write
4075000
heap
page read and write
3EAD000
trusted library allocation
page read and write
2ABB000
trusted library allocation
page execute and read and write
E00000
heap
page read and write
3EA0000
heap
page read and write
4929000
direct allocation
page read and write
4783000
direct allocation
page read and write
402F000
heap
page read and write
3F15000
trusted library allocation
page read and write
2D5A000
trusted library allocation
page read and write
3EBB000
trusted library allocation
page read and write
2E2B000
heap
page read and write
4075000
heap
page read and write
8FE000
stack
page read and write
30A9000
trusted library allocation
page read and write
11FE000
stack
page read and write
371E000
stack
page read and write
4075000
heap
page read and write
E70000
heap
page read and write
4075000
heap
page read and write
4075000
heap
page read and write
4075000
heap
page read and write
2D46000
trusted library allocation
page read and write
644F000
stack
page read and write
3E3F000
trusted library allocation
page read and write
52FD000
trusted library allocation
page read and write
402F000
heap
page read and write
402F000
heap
page read and write
403F000
heap
page read and write
2D72000
trusted library allocation
page read and write
4AB000
unkown
page readonly
3EB2000
trusted library allocation
page read and write
2DF3000
heap
page read and write
3EC1000
trusted library allocation
page read and write
61CE000
stack
page read and write
402F000
heap
page read and write
4075000
heap
page read and write
4660000
direct allocation
page read and write
2E14000
trusted library allocation
page read and write
2ECE000
trusted library allocation
page read and write
4929000
direct allocation
page read and write
4075000
heap
page read and write
326E000
trusted library allocation
page read and write
499E000
direct allocation
page read and write
F00000
trusted library allocation
page read and write
4783000
direct allocation
page read and write
400000
system
page execute and read and write
D77000
stack
page read and write
2AAA000
trusted library allocation
page execute and read and write
4075000
heap
page read and write
41A4000
trusted library allocation
page read and write
2EA8000
trusted library allocation
page read and write
2AB7000
trusted library allocation
page execute and read and write
4929000
direct allocation
page read and write
3EB8000
trusted library allocation
page read and write
62CE000
stack
page read and write
402F000
heap
page read and write
2ED6000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
6780000
trusted library allocation
page execute and read and write
4929000
direct allocation
page read and write
F20000
trusted library allocation
page read and write
3F8A000
trusted library allocation
page read and write
402F000
heap
page read and write
2C1E000
stack
page read and write
A7E000
heap
page read and write
41CF000
trusted library allocation
page read and write
4783000
direct allocation
page read and write
2AB5000
trusted library allocation
page execute and read and write
402F000
heap
page read and write
F6A000
heap
page read and write
2EA4000
trusted library allocation
page read and write
6770000
trusted library allocation
page execute and read and write
1800000
heap
page read and write
3E4B000
trusted library allocation
page read and write
2C68000
trusted library allocation
page read and write
3FC0000
heap
page read and write
402F000
heap
page read and write
2F80000
heap
page read and write
2E7E000
trusted library allocation
page read and write
482000
unkown
page readonly
640D000
stack
page read and write
4075000
heap
page read and write
F14000
trusted library allocation
page read and write
3F3E000
trusted library allocation
page read and write
2B1E000
stack
page read and write
2C40000
trusted library allocation
page read and write
4AB000
unkown
page readonly
DF0000
heap
page read and write
2FD5000
heap
page read and write
3E5B000
heap
page read and write
8AF000
stack
page read and write
There are 381 hidden memdumps, click here to show them.