IOC Report
PRESUPUESTO DE NOVIEMBRE...exe

loading gif

Files

File Path
Type
Category
Malicious
PRESUPUESTO DE NOVIEMBRE...exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PRESUPUESTO DE NOVIEMBRE...exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
"C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe"
malicious
C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
"C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe"
malicious

URLs

Name
IP
Malicious
https://api.telegram.org
unknown
malicious
https://api.telegram.org/bot
unknown
malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://www.office.com/lB_q
unknown
https://chrome.google.com/webstore?hl=enlB_q
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:103386%0D%0ADate%20and%20Time:%2001/11/2024%20/%2001:21:53%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20103386%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://tempuri.org/DataSet1.xsd
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://reallyfreegeoip.org/xml/173.254.250.77
188.114.97.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://varders.kozow.com:8081
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://reallyfreegeoip.org/xml/173.254.250.77$
unknown
http://checkip.dyndns.org/
132.226.247.73
http://51.38.247.67:8081/_send_.php?L
unknown
http://anotherarmy.dns.army:8081
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:103386%0D%0ADate%20a
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://api.telegram.org/bot7783218527:AAHN8_CA9nVnpNHtK0tB7lGdN14pvWhfSn8/sendDocument?chat_id=8178
unknown
https://reallyfreegeoip.org
unknown
https://api.telegram.org/bot7783218527:AAHN8_CA9nVnpNHtK0tB7lGdN14pvWhfSn8/sendDocument?chat_id=8178506397&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery
149.154.167.220
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
132.226.247.73

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRESUPUESTO DE NOVIEMBRE_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRESUPUESTO DE NOVIEMBRE_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRESUPUESTO DE NOVIEMBRE_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRESUPUESTO DE NOVIEMBRE_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRESUPUESTO DE NOVIEMBRE_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRESUPUESTO DE NOVIEMBRE_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRESUPUESTO DE NOVIEMBRE_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRESUPUESTO DE NOVIEMBRE_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRESUPUESTO DE NOVIEMBRE_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRESUPUESTO DE NOVIEMBRE_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRESUPUESTO DE NOVIEMBRE_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRESUPUESTO DE NOVIEMBRE_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRESUPUESTO DE NOVIEMBRE_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PRESUPUESTO DE NOVIEMBRE_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
47AA000
trusted library allocation
page read and write
malicious
3316000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3121000
trusted library allocation
page read and write
malicious
DF7000
stack
page read and write
31DC000
trusted library allocation
page read and write
6E8E000
stack
page read and write
5966000
trusted library allocation
page read and write
16AD000
trusted library allocation
page execute and read and write
2E90000
heap
page read and write
32D8000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
2FF0000
heap
page read and write
4218000
trusted library allocation
page read and write
13A0000
heap
page read and write
5788000
heap
page read and write
FC0000
heap
page read and write
168E000
stack
page read and write
14BA000
heap
page read and write
122D000
trusted library allocation
page execute and read and write
5470000
trusted library allocation
page read and write
4F58000
trusted library allocation
page read and write
1480000
heap
page read and write
545D000
trusted library allocation
page read and write
437D000
trusted library allocation
page read and write
41F1000
trusted library allocation
page read and write
3389000
trusted library allocation
page read and write
6F96000
trusted library allocation
page read and write
5670000
trusted library allocation
page read and write
435E000
trusted library allocation
page read and write
145B000
trusted library allocation
page execute and read and write
3189000
trusted library allocation
page read and write
2F3E000
stack
page read and write
C6A000
unkown
page readonly
32E0000
trusted library allocation
page read and write
569D000
trusted library allocation
page read and write
77D0000
trusted library section
page read and write
34E8000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
4208000
trusted library allocation
page read and write
4349000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
34BA000
trusted library allocation
page read and write
2F6A000
trusted library allocation
page execute and read and write
4134000
trusted library allocation
page read and write
6F74000
trusted library allocation
page read and write
795E000
stack
page read and write
339E000
trusted library allocation
page read and write
1693000
trusted library allocation
page execute and read and write
7AB6000
trusted library allocation
page read and write
31D1000
trusted library allocation
page read and write
6F80000
trusted library allocation
page execute and read and write
54F0000
trusted library allocation
page read and write
34B2000
trusted library allocation
page read and write
1070000
heap
page read and write
6A0E000
stack
page read and write
412F000
trusted library allocation
page read and write
33B0000
trusted library allocation
page read and write
41DA000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
1490000
heap
page read and write
7AAB000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page execute and read and write
578C000
heap
page read and write
6F50000
trusted library allocation
page read and write
6A10000
heap
page read and write
2FA0000
heap
page read and write
2F7B000
trusted library allocation
page execute and read and write
33D7000
trusted library allocation
page read and write
627E000
stack
page read and write
62CE000
stack
page read and write
5905000
heap
page read and write
44A9000
trusted library allocation
page read and write
2E60000
trusted library allocation
page execute and read and write
133E000
stack
page read and write
1242000
trusted library allocation
page read and write
1520000
trusted library allocation
page read and write
5682000
trusted library allocation
page read and write
32B5000
trusted library allocation
page read and write
785E000
stack
page read and write
317D000
trusted library allocation
page read and write
3F59000
trusted library allocation
page read and write
ECEE000
stack
page read and write
6FC5000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
5451000
trusted library allocation
page read and write
31D4000
trusted library allocation
page read and write
56D0000
trusted library allocation
page read and write
1285000
heap
page read and write
4141000
trusted library allocation
page read and write
32A7000
trusted library allocation
page read and write
5640000
heap
page read and write
167C000
stack
page read and write
432D000
trusted library allocation
page read and write
13A5000
heap
page read and write
124A000
trusted library allocation
page execute and read and write
5940000
trusted library allocation
page execute and read and write
1223000
trusted library allocation
page execute and read and write
43D3000
trusted library allocation
page read and write
56C0000
trusted library allocation
page read and write
322D000
trusted library allocation
page read and write
311F000
stack
page read and write
63B4000
heap
page read and write
568E000
trusted library allocation
page read and write
2F62000
trusted library allocation
page read and write
3000000
trusted library allocation
page execute and read and write
3421000
trusted library allocation
page read and write
BA0000
unkown
page readonly
33A7000
trusted library allocation
page read and write
42FF000
trusted library allocation
page read and write
6390000
heap
page read and write
1690000
trusted library allocation
page read and write
1292000
heap
page read and write
4420000
trusted library allocation
page read and write
5750000
heap
page read and write
7810000
trusted library allocation
page execute and read and write
623E000
stack
page read and write
3010000
heap
page execute and read and write
3187000
trusted library allocation
page read and write
5970000
heap
page execute and read and write
7EE60000
trusted library allocation
page execute and read and write
3192000
trusted library allocation
page read and write
3196000
trusted library allocation
page read and write
54F2000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
7AFD000
stack
page read and write
1680000
trusted library allocation
page read and write
3465000
trusted library allocation
page read and write
5BBF000
stack
page read and write
5456000
trusted library allocation
page read and write
14C7000
heap
page read and write
5900000
heap
page read and write
1452000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
125E000
heap
page read and write
3426000
trusted library allocation
page read and write
7AA0000
trusted library allocation
page read and write
34C5000
trusted library allocation
page read and write
596A000
trusted library allocation
page read and write
10D5000
heap
page read and write
4121000
trusted library allocation
page read and write
14FE000
stack
page read and write
3430000
trusted library allocation
page read and write
1498000
heap
page read and write
338E000
trusted library allocation
page read and write
32DC000
trusted library allocation
page read and write
6FC2000
trusted library allocation
page read and write
F5A000
stack
page read and write
BA20000
trusted library section
page read and write
5676000
trusted library allocation
page read and write
1390000
heap
page read and write
690E000
stack
page read and write
76CE000
stack
page read and write
31DA000
trusted library allocation
page read and write
2EFE000
stack
page read and write
567B000
trusted library allocation
page read and write
77F1000
trusted library allocation
page read and write
43DB000
trusted library allocation
page read and write
52FE000
stack
page read and write
4329000
trusted library allocation
page read and write
33D9000
trusted library allocation
page read and write
333A000
trusted library allocation
page read and write
5798000
heap
page read and write
31D8000
trusted library allocation
page read and write
418A000
trusted library allocation
page read and write
43A9000
trusted library allocation
page read and write
12E6000
heap
page read and write
44FB000
trusted library allocation
page read and write
169D000
trusted library allocation
page execute and read and write
1457000
trusted library allocation
page execute and read and write
1340000
trusted library allocation
page read and write
444C000
trusted library allocation
page read and write
44D1000
trusted library allocation
page read and write
163F000
stack
page read and write
43D9000
trusted library allocation
page read and write
43CA000
trusted library allocation
page read and write
33D1000
trusted library allocation
page read and write
319A000
trusted library allocation
page read and write
51FC000
stack
page read and write
7AB0000
trusted library allocation
page read and write
5760000
trusted library allocation
page execute and read and write
43E1000
trusted library allocation
page read and write
32AD000
trusted library allocation
page read and write
3492000
trusted library allocation
page read and write
5B70000
trusted library allocation
page execute and read and write
2F51000
trusted library allocation
page read and write
637E000
stack
page read and write
2F66000
trusted library allocation
page execute and read and write
5950000
trusted library allocation
page read and write
32E6000
trusted library allocation
page read and write
12F7000
stack
page read and write
6CCE000
stack
page read and write
58FE000
stack
page read and write
16A8000
heap
page read and write
1250000
heap
page read and write
EAB0000
trusted library allocation
page execute and read and write
4149000
trusted library allocation
page read and write
567E000
trusted library allocation
page read and write
1060000
heap
page read and write
2F90000
trusted library allocation
page read and write
11EE000
stack
page read and write
5C0D000
trusted library allocation
page read and write
32AB000
trusted library allocation
page read and write
FD0000
heap
page read and write
5770000
heap
page execute and read and write
42D7000
trusted library allocation
page read and write
31C8000
trusted library allocation
page read and write
4436000
trusted library allocation
page read and write
50EB000
stack
page read and write
400000
remote allocation
page execute and read and write
3F51000
trusted library allocation
page read and write
4264000
trusted library allocation
page read and write
32BA000
trusted library allocation
page read and write
131D000
heap
page read and write
2F60000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
5920000
trusted library allocation
page execute and read and write
32AF000
trusted library allocation
page read and write
5C10000
trusted library allocation
page execute and read and write
5691000
trusted library allocation
page read and write
16A0000
heap
page read and write
5660000
trusted library allocation
page read and write
154C000
heap
page read and write
77CE000
stack
page read and write
1510000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
1277000
heap
page read and write
1210000
trusted library allocation
page read and write
594E000
stack
page read and write
5128000
trusted library allocation
page read and write
3394000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page read and write
14B0000
heap
page read and write
4425000
trusted library allocation
page read and write
32DE000
trusted library allocation
page read and write
2F4F000
stack
page read and write
16B0000
heap
page read and write
3424000
trusted library allocation
page read and write
1530000
heap
page read and write
5930000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
34B7000
trusted library allocation
page read and write
1246000
trusted library allocation
page execute and read and write
34C1000
trusted library allocation
page read and write
55D3000
heap
page read and write
34BC000
trusted library allocation
page read and write
CFA000
stack
page read and write
6BCE000
stack
page read and write
6B8E000
stack
page read and write
1480000
trusted library allocation
page read and write
3414000
trusted library allocation
page read and write
427A000
trusted library allocation
page read and write
123D000
trusted library allocation
page execute and read and write
7C02000
trusted library allocation
page read and write
413B000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
10D0000
heap
page read and write
5B80000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page execute and read and write
33AC000
trusted library allocation
page read and write
1303000
heap
page read and write
7AB4000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
750E000
heap
page read and write
5B5E000
stack
page read and write
2FF3000
heap
page read and write
10BE000
stack
page read and write
6EF0000
trusted library allocation
page execute and read and write
BA2000
unkown
page readonly
3171000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
2F75000
trusted library allocation
page execute and read and write
1690000
trusted library allocation
page read and write
56E0000
trusted library section
page readonly
2FEE000
stack
page read and write
56B0000
trusted library allocation
page read and write
43CD000
trusted library allocation
page read and write
5696000
trusted library allocation
page read and write
3F95000
trusted library allocation
page read and write
2F72000
trusted library allocation
page read and write
7800000
trusted library allocation
page read and write
6B4E000
stack
page read and write
6EA0000
trusted library allocation
page execute and read and write
1370000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
56F0000
heap
page read and write
3134000
trusted library allocation
page read and write
2F77000
trusted library allocation
page execute and read and write
42EC000
trusted library allocation
page read and write
33DD000
trusted library allocation
page read and write
1357000
trusted library allocation
page read and write
31CC000
trusted library allocation
page read and write
54F8000
trusted library allocation
page read and write
44BE000
trusted library allocation
page read and write
6D8E000
stack
page read and write
3328000
trusted library allocation
page read and write
1582000
heap
page read and write
6EB0000
trusted library allocation
page read and write
3209000
trusted library allocation
page read and write
5810000
heap
page read and write
6A84000
heap
page read and write
1224000
trusted library allocation
page read and write
54D0000
heap
page read and write
4244000
trusted library allocation
page read and write
57C2000
heap
page read and write
342D000
trusted library allocation
page read and write
57D9000
heap
page read and write
1258000
heap
page read and write
32EB000
trusted library allocation
page read and write
44FF000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
5964000
trusted library allocation
page read and write
442C000
trusted library allocation
page read and write
144F000
stack
page read and write
2F40000
heap
page read and write
14AE000
heap
page read and write
574D000
stack
page read and write
1695000
trusted library allocation
page read and write
4432000
trusted library allocation
page read and write
56B4000
trusted library allocation
page read and write
5A5D000
stack
page read and write
7960000
trusted library allocation
page read and write
6380000
heap
page read and write
441A000
trusted library allocation
page read and write
574B000
stack
page read and write
5700000
heap
page read and write
1360000
trusted library allocation
page read and write
14A0000
heap
page execute and read and write
1500000
trusted library allocation
page execute and read and write
6ED0000
trusted library allocation
page execute and read and write
56A2000
trusted library allocation
page read and write
31C4000
trusted library allocation
page read and write
14C5000
heap
page read and write
7500000
heap
page read and write
1694000
trusted library allocation
page read and write
43D6000
trusted library allocation
page read and write
33E3000
trusted library allocation
page read and write
58BE000
stack
page read and write
5910000
trusted library allocation
page read and write
54E0000
trusted library allocation
page execute and read and write
568A000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
55D0000
heap
page read and write
1450000
trusted library allocation
page read and write
There are 337 hidden memdumps, click here to show them.