IOC Report
Cleared Payment.exe

loading gif

Files

File Path
Type
Category
Malicious
Cleared Payment.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Cleared Payment.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Cleared Payment.exe
"C:\Users\user\Desktop\Cleared Payment.exe"
malicious
C:\Users\user\Desktop\Cleared Payment.exe
"C:\Users\user\Desktop\Cleared Payment.exe"
malicious
C:\Users\user\Desktop\Cleared Payment.exe
"C:\Users\user\Desktop\Cleared Payment.exe"
malicious

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
http://smtp.italiacanda-it.com
unknown
https://api.ipify.org/t
unknown
http://us2.smtp.mailhostbox.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
smtp.italiacanda-it.com
unknown
malicious
us2.smtp.mailhostbox.com
208.91.199.223
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
208.91.199.223
us2.smtp.mailhostbox.com
United States
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cleared Payment_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cleared Payment_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cleared Payment_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cleared Payment_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cleared Payment_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cleared Payment_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cleared Payment_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cleared Payment_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cleared Payment_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cleared Payment_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cleared Payment_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cleared Payment_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cleared Payment_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Cleared Payment_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2DFC000
trusted library allocation
page read and write
malicious
2E04000
trusted library allocation
page read and write
malicious
3832000
trusted library allocation
page read and write
malicious
41D1000
trusted library allocation
page read and write
malicious
374E000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2DD1000
trusted library allocation
page read and write
malicious
13B7000
heap
page read and write
23B2000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
29E9000
trusted library allocation
page read and write
547E000
stack
page read and write
1330000
heap
page read and write
E5A000
stack
page read and write
681E000
stack
page read and write
2D2000
unkown
page readonly
29E5000
trusted library allocation
page read and write
4BE0000
heap
page read and write
29ED000
trusted library allocation
page read and write
6B3D000
trusted library allocation
page read and write
8F8000
heap
page read and write
29EF000
trusted library allocation
page read and write
5A3F000
stack
page read and write
6B47000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page read and write
4F30000
heap
page read and write
8600000
trusted library allocation
page execute and read and write
58FE000
stack
page read and write
3579000
trusted library allocation
page read and write
1013000
heap
page read and write
6B90000
trusted library allocation
page read and write
29D1000
trusted library allocation
page read and write
29CF000
trusted library allocation
page read and write
F58000
stack
page read and write
4C00000
trusted library allocation
page read and write
8810000
heap
page read and write
2778000
trusted library allocation
page read and write
10F5000
heap
page read and write
4F20000
heap
page read and write
780000
heap
page read and write
505E000
stack
page read and write
4AF0000
trusted library allocation
page read and write
29F5000
trusted library allocation
page read and write
4F10000
trusted library allocation
page execute and read and write
29C1000
trusted library allocation
page read and write
870E000
stack
page read and write
37F5000
trusted library allocation
page read and write
1050000
heap
page read and write
8C0000
trusted library allocation
page read and write
53AE000
trusted library allocation
page read and write
4F40000
heap
page read and write
6C40000
trusted library allocation
page read and write
655D000
stack
page read and write
4AB6000
trusted library allocation
page read and write
8930000
trusted library section
page read and write
4A90000
trusted library allocation
page read and write
6C4F000
stack
page read and write
29F7000
trusted library allocation
page read and write
7F170000
trusted library allocation
page execute and read and write
6C97000
trusted library allocation
page read and write
4ABD000
trusted library allocation
page read and write
54BE000
stack
page read and write
89E000
stack
page read and write
6B1E000
stack
page read and write
13AB000
trusted library allocation
page execute and read and write
641D000
stack
page read and write
66EE000
heap
page read and write
FC0000
heap
page read and write
13A7000
trusted library allocation
page execute and read and write
2797000
trusted library allocation
page read and write
3D81000
trusted library allocation
page read and write
9DE000
heap
page read and write
35C7000
trusted library allocation
page read and write
6DE2000
trusted library allocation
page read and write
924000
heap
page read and write
6F7000
stack
page read and write
4AC2000
trusted library allocation
page read and write
6BF0000
trusted library section
page read and write
23AA000
trusted library allocation
page execute and read and write
275E000
trusted library allocation
page read and write
1009000
heap
page read and write
4C10000
trusted library allocation
page read and write
29E1000
trusted library allocation
page read and write
13B0000
heap
page read and write
139A000
trusted library allocation
page execute and read and write
4AC0000
trusted library allocation
page read and write
25D6000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
222000
unkown
page readonly
1396000
trusted library allocation
page execute and read and write
3615000
trusted library allocation
page read and write
2BF0000
heap
page execute and read and write
54F0000
heap
page read and write
2530000
trusted library allocation
page execute and read and write
8E3000
trusted library allocation
page read and write
4C0B000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page read and write
4DFB000
stack
page read and write
4A94000
trusted library allocation
page read and write
3F0000
heap
page read and write
1016000
heap
page read and write
2C30000
heap
page read and write
8D3000
trusted library allocation
page execute and read and write
84F4000
heap
page read and write
1380000
trusted library allocation
page read and write
750000
heap
page read and write
1058000
heap
page read and write
400000
remote allocation
page execute and read and write
4BA0000
trusted library allocation
page read and write
2550000
trusted library allocation
page read and write
2560000
heap
page execute and read and write
6A5E000
stack
page read and write
241E000
stack
page read and write
8D4000
trusted library allocation
page read and write
29CD000
trusted library allocation
page read and write
4E88000
trusted library allocation
page read and write
29C7000
trusted library allocation
page read and write
6BEE000
stack
page read and write
10F0000
heap
page read and write
FE0000
heap
page read and write
7FB60000
trusted library allocation
page execute and read and write
785000
heap
page read and write
4AE0000
trusted library allocation
page read and write
6B9F000
stack
page read and write
137D000
trusted library allocation
page execute and read and write
37A000
stack
page read and write
4F00000
trusted library allocation
page read and write
FFD000
heap
page read and write
68FC000
heap
page read and write
29E7000
trusted library allocation
page read and write
4AAE000
trusted library allocation
page read and write
2DB6000
trusted library allocation
page read and write
917000
heap
page read and write
4F60000
heap
page read and write
220000
unkown
page readonly
29BD000
trusted library allocation
page read and write
2C04000
trusted library allocation
page read and write
4B60000
trusted library allocation
page execute and read and write
54D0000
heap
page execute and read and write
5125000
heap
page read and write
6F00000
heap
page read and write
AF0000
heap
page read and write
10A4000
heap
page read and write
29C3000
trusted library allocation
page read and write
6C30000
trusted library allocation
page execute and read and write
679E000
stack
page read and write
695E000
stack
page read and write
13A0000
trusted library allocation
page read and write
2571000
trusted library allocation
page read and write
29DD000
trusted library allocation
page read and write
2D3F000
stack
page read and write
66E0000
heap
page read and write
1374000
trusted library allocation
page read and write
4F5C000
stack
page read and write
2BBE000
stack
page read and write
29C5000
trusted library allocation
page read and write
2BE0000
trusted library allocation
page read and write
29F1000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page execute and read and write
991000
heap
page read and write
464C000
stack
page read and write
2540000
trusted library allocation
page read and write
3663000
trusted library allocation
page read and write
6F10000
trusted library allocation
page execute and read and write
23B0000
trusted library allocation
page read and write
29D7000
trusted library allocation
page read and write
56FC000
stack
page read and write
1392000
trusted library allocation
page read and write
2669000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
71E0000
heap
page read and write
29DF000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
29BF000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
29EB000
trusted library allocation
page read and write
29C9000
trusted library allocation
page read and write
53C6000
trusted library allocation
page read and write
45B9000
trusted library allocation
page read and write
45B0000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
53B2000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
23D0000
trusted library allocation
page read and write
971000
heap
page read and write
29DB000
trusted library allocation
page read and write
FD0000
heap
page read and write
23BB000
trusted library allocation
page execute and read and write
2E12000
trusted library allocation
page read and write
474B000
stack
page read and write
3DE6000
trusted library allocation
page read and write
A01E000
stack
page read and write
84A0000
heap
page read and write
4AD0000
trusted library allocation
page read and write
4DB0000
heap
page execute and read and write
6B8D000
stack
page read and write
1360000
trusted library allocation
page read and write
6A9E000
stack
page read and write
6B30000
trusted library allocation
page read and write
4EFE000
stack
page read and write
68E0000
heap
page read and write
4B20000
trusted library allocation
page read and write
27AC000
trusted library allocation
page read and write
6B28000
trusted library allocation
page read and write
89C0000
trusted library allocation
page read and write
68DE000
stack
page read and write
2DF8000
trusted library allocation
page read and write
665E000
stack
page read and write
45AE000
stack
page read and write
2C00000
trusted library allocation
page read and write
691F000
stack
page read and write
777000
heap
page read and write
57FE000
stack
page read and write
53AB000
trusted library allocation
page read and write
541C000
stack
page read and write
23A6000
trusted library allocation
page execute and read and write
2E0B000
trusted library allocation
page read and write
85A0000
trusted library section
page read and write
8D0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
5500000
heap
page read and write
770000
heap
page read and write
8ED000
trusted library allocation
page execute and read and write
651E000
stack
page read and write
3571000
trusted library allocation
page read and write
29F3000
trusted library allocation
page read and write
593E000
stack
page read and write
6C10000
trusted library section
page read and write
6922000
heap
page read and write
2DFA000
trusted library allocation
page read and write
2627000
trusted library allocation
page read and write
936000
heap
page read and write
4AE5000
trusted library allocation
page read and write
6C90000
trusted library allocation
page read and write
138D000
trusted library allocation
page execute and read and write
73E000
stack
page read and write
9CDE000
stack
page read and write
23A2000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
53C1000
trusted library allocation
page read and write
2667000
trusted library allocation
page read and write
1220000
heap
page read and write
53BE000
trusted library allocation
page read and write
3E0000
heap
page read and write
933000
heap
page read and write
6C20000
trusted library section
page read and write
85F1000
trusted library allocation
page read and write
4B50000
heap
page read and write
2DF6000
trusted library allocation
page read and write
AEE000
stack
page read and write
6A1E000
stack
page read and write
53CD000
trusted library allocation
page read and write
669D000
stack
page read and write
54F3000
heap
page read and write
4BD0000
heap
page read and write
53A6000
trusted library allocation
page read and write
23A0000
trusted library allocation
page read and write
29E3000
trusted library allocation
page read and write
54E0000
heap
page read and write
53BA000
trusted library allocation
page read and write
2DCD000
trusted library allocation
page read and write
23B7000
trusted library allocation
page execute and read and write
29D3000
trusted library allocation
page read and write
13A2000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
3DA9000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
29D5000
trusted library allocation
page read and write
4B80000
trusted library allocation
page execute and read and write
239E000
stack
page read and write
67DE000
stack
page read and write
6C9E000
stack
page read and write
2D81000
trusted library allocation
page read and write
FE8000
heap
page read and write
880D000
stack
page read and write
2420000
heap
page read and write
6BB0000
trusted library allocation
page execute and read and write
4BC0000
trusted library section
page readonly
1373000
trusted library allocation
page execute and read and write
45FD000
stack
page read and write
9A5000
heap
page read and write
4B73000
heap
page read and write
29D9000
trusted library allocation
page read and write
2DBF000
trusted library allocation
page read and write
5120000
heap
page read and write
8FE000
heap
page read and write
6CDE000
stack
page read and write
99ED000
trusted library allocation
page read and write
252F000
stack
page read and write
89B0000
trusted library allocation
page execute and read and write
9CF000
heap
page read and write
2A70000
trusted library allocation
page read and write
4B70000
heap
page read and write
13A5000
trusted library allocation
page execute and read and write
9F1E000
stack
page read and write
8F0000
heap
page read and write
8DD000
trusted library allocation
page execute and read and write
2BC0000
trusted library allocation
page execute and read and write
29CB000
trusted library allocation
page read and write
4AB1000
trusted library allocation
page read and write
There are 291 hidden memdumps, click here to show them.