IOC Report
Payment.exe

loading gif

Files

File Path
Type
Category
Malicious
Payment.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Countee
data
dropped
C:\Users\user\AppData\Local\Temp\aut1FF7.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut2065.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\subpredication
ASCII text, with very long lines (28714), with no line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Payment.exe
"C:\Users\user\Desktop\Payment.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\Payment.exe"
malicious

URLs

Name
IP
Malicious
smtp.italiacanda-it.com
malicious
https://api.ipify.org/
104.26.13.205
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
http://smtp.italiacanda-it.com
unknown
https://api.ipify.org/t
unknown
http://us2.smtp.mailhostbox.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
smtp.italiacanda-it.com
unknown
malicious
us2.smtp.mailhostbox.com
208.91.198.143
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
208.91.198.143
us2.smtp.mailhostbox.com
United States
208.91.199.225
unknown
United States
208.91.199.223
unknown
United States
104.26.13.205
api.ipify.org
United States
208.91.199.224
unknown
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
system
page execute and read and write
malicious
1110000
direct allocation
page read and write
malicious
2EC0000
trusted library section
page read and write
malicious
2C9F000
heap
page read and write
malicious
5590000
trusted library section
page read and write
malicious
3F71000
trusted library allocation
page read and write
malicious
2FC4000
trusted library allocation
page read and write
malicious
2FEF000
trusted library allocation
page read and write
malicious
5630000
heap
page execute and read and write
11BD000
heap
page read and write
2B60000
trusted library allocation
page read and write
1160000
heap
page read and write
1188000
heap
page read and write
2B20000
trusted library allocation
page read and write
BE0000
heap
page read and write
4033000
trusted library allocation
page read and write
BC0000
heap
page read and write
426000
system
page execute and read and write
3CBD000
direct allocation
page read and write
EF8000
stack
page read and write
1060000
heap
page read and write
11EB000
heap
page read and write
1180000
heap
page read and write
1150000
heap
page read and write
1050000
trusted library allocation
page read and write
7A0000
unkown
page readonly
56C5000
heap
page read and write
1228000
heap
page read and write
5550000
trusted library allocation
page read and write
445000
system
page execute and read and write
561C000
stack
page read and write
12D2000
heap
page read and write
7A1000
unkown
page execute read
1176000
trusted library allocation
page execute and read and write
2B25000
trusted library allocation
page execute and read and write
11C0000
heap
page read and write
2FED000
trusted library allocation
page read and write
FBE000
stack
page read and write
12A3000
heap
page read and write
681E000
stack
page read and write
1044000
trusted library allocation
page read and write
126D000
heap
page read and write
1064000
heap
page read and write
3D2E000
direct allocation
page read and write
56B7000
heap
page read and write
1020000
trusted library section
page read and write
11BB000
heap
page read and write
6958000
trusted library allocation
page read and write
691E000
stack
page read and write
13CD000
heap
page read and write
2B27000
trusted library allocation
page execute and read and write
3B90000
direct allocation
page read and write
5BBF000
stack
page read and write
4072000
trusted library allocation
page read and write
3B13000
direct allocation
page read and write
3B90000
direct allocation
page read and write
B90000
trusted library allocation
page read and write
4F78000
trusted library allocation
page read and write
3B13000
direct allocation
page read and write
7A1000
unkown
page execute read
FDB000
stack
page read and write
1040000
trusted library allocation
page read and write
3CB9000
direct allocation
page read and write
12AC000
heap
page read and write
639F000
stack
page read and write
2F71000
trusted library allocation
page read and write
5CED000
stack
page read and write
5C8D000
trusted library allocation
page read and write
1352000
heap
page read and write
2F68000
heap
page read and write
5ABD000
stack
page read and write
117A000
trusted library allocation
page execute and read and write
3CB9000
direct allocation
page read and write
FF0000
heap
page read and write
1347000
heap
page read and write
2B2B000
trusted library allocation
page execute and read and write
11DB000
heap
page read and write
9E0000
heap
page read and write
1A1E000
stack
page read and write
104D000
trusted library allocation
page execute and read and write
1100000
direct allocation
page execute and read and write
6970000
trusted library allocation
page execute and read and write
2C70000
heap
page read and write
1050000
heap
page read and write
3CBD000
direct allocation
page read and write
868000
unkown
page readonly
B70000
heap
page read and write
3B90000
direct allocation
page read and write
30A8000
trusted library allocation
page read and write
7A0000
unkown
page readonly
5C80000
trusted library allocation
page read and write
39F0000
direct allocation
page read and write
2FAA000
trusted library allocation
page read and write
B87000
trusted library allocation
page read and write
3B90000
direct allocation
page read and write
11B0000
heap
page read and write
FFC000
stack
page read and write
13E5000
heap
page read and write
1257000
heap
page read and write
6EE0F000
unkown
page readonly
6EE06000
unkown
page readonly
855000
unkown
page readonly
13E4000
heap
page read and write
3CB9000
direct allocation
page read and write
13E5000
heap
page read and write
750000
heap
page read and write
3CBD000
direct allocation
page read and write
125E000
heap
page read and write
554E000
stack
page read and write
39F0000
direct allocation
page read and write
6960000
trusted library allocation
page read and write
85F000
unkown
page read and write
3B13000
direct allocation
page read and write
79E000
stack
page read and write
1060000
heap
page read and write
3B13000
direct allocation
page read and write
2E80000
trusted library allocation
page read and write
12BB000
heap
page read and write
2C4E000
stack
page read and write
12BD000
heap
page read and write
555B000
trusted library allocation
page read and write
12AB000
heap
page read and write
12D2000
heap
page read and write
85F000
unkown
page write copy
125E000
heap
page read and write
5576000
trusted library allocation
page read and write
5660000
heap
page read and write
3B13000
direct allocation
page read and write
3CB9000
direct allocation
page read and write
1414000
heap
page read and write
13A5000
heap
page read and write
1065000
heap
page read and write
2B83000
heap
page read and write
2B50000
trusted library allocation
page execute and read and write
5562000
trusted library allocation
page read and write
3B90000
direct allocation
page read and write
2FB3000
trusted library allocation
page read and write
3D2E000
direct allocation
page read and write
6EE0D000
unkown
page read and write
3B90000
direct allocation
page read and write
3001000
trusted library allocation
page read and write
5740000
heap
page read and write
12D3000
heap
page read and write
3CBD000
direct allocation
page read and write
12D2000
heap
page read and write
1404000
heap
page read and write
2FEB000
trusted library allocation
page read and write
6EDF0000
unkown
page readonly
1172000
trusted library allocation
page read and write
B0A000
stack
page read and write
13DF000
heap
page read and write
3CBD000
direct allocation
page read and write
12BC000
heap
page read and write
9DE000
stack
page read and write
3CB9000
direct allocation
page read and write
3D2E000
direct allocation
page read and write
3D2E000
direct allocation
page read and write
510E000
stack
page read and write
2C67000
heap
page read and write
6EDF1000
unkown
page execute read
1254000
heap
page read and write
3CB9000
direct allocation
page read and write
105D000
trusted library allocation
page execute and read and write
1170000
trusted library allocation
page read and write
12D2000
heap
page read and write
1244000
heap
page read and write
12D2000
heap
page read and write
1043000
trusted library allocation
page execute and read and write
39F0000
direct allocation
page read and write
2F30000
trusted library allocation
page read and write
2C50000
trusted library allocation
page read and write
5C90000
heap
page read and write
2BCE000
stack
page read and write
56AC000
heap
page read and write
2FC0000
trusted library allocation
page read and write
BB0000
trusted library allocation
page execute and read and write
BA0000
trusted library allocation
page read and write
12D2000
heap
page read and write
1030000
trusted library allocation
page read and write
2F20000
heap
page read and write
6980000
trusted library allocation
page read and write
597E000
stack
page read and write
2C60000
heap
page read and write
593C000
stack
page read and write
2B22000
trusted library allocation
page read and write
56A3000
heap
page read and write
1404000
heap
page read and write
FCE000
stack
page read and write
13F5000
heap
page read and write
1253000
heap
page read and write
6950000
trusted library allocation
page read and write
1405000
heap
page read and write
7F980000
trusted library allocation
page execute and read and write
B80000
trusted library allocation
page read and write
12D2000
heap
page read and write
67DF000
stack
page read and write
5648000
heap
page read and write
1010000
trusted library section
page read and write
3CBD000
direct allocation
page read and write
5646000
heap
page read and write
6964000
trusted library allocation
page read and write
12D2000
heap
page read and write
122C000
heap
page read and write
69CD000
stack
page read and write
2C0C000
stack
page read and write
12D2000
heap
page read and write
3B13000
direct allocation
page read and write
1220000
heap
page read and write
1053000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
557D000
trusted library allocation
page read and write
2E7E000
stack
page read and write
5571000
trusted library allocation
page read and write
5A7E000
stack
page read and write
5CA0000
trusted library allocation
page execute and read and write
3D2E000
direct allocation
page read and write
2F60000
heap
page read and write
556A000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
82F000
unkown
page readonly
6A5E000
stack
page read and write
868000
unkown
page readonly
39F0000
direct allocation
page read and write
1399000
heap
page read and write
39F0000
direct allocation
page read and write
556E000
trusted library allocation
page read and write
2EB0000
heap
page execute and read and write
5640000
heap
page read and write
1373000
heap
page read and write
5BFD000
stack
page read and write
2FF7000
trusted library allocation
page read and write
6AA0000
heap
page read and write
855000
unkown
page readonly
3D2E000
direct allocation
page read and write
863000
unkown
page write copy
82F000
unkown
page readonly
12F2000
heap
page read and write
1253000
heap
page read and write
125E000
heap
page read and write
39F0000
direct allocation
page read and write
555E000
trusted library allocation
page read and write
2B80000
heap
page read and write
6E9000
stack
page read and write
1E1E000
stack
page read and write
13C0000
heap
page read and write
There are 235 hidden memdumps, click here to show them.