Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Payment.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Countee
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut1FF7.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut2065.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\subpredication
|
ASCII text, with very long lines (28714), with no line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Payment.exe
|
"C:\Users\user\Desktop\Payment.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\Payment.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
smtp.italiacanda-it.com
|
|||
https://api.ipify.org/
|
104.26.13.205
|
||
https://api.ipify.org
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://smtp.italiacanda-it.com
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://us2.smtp.mailhostbox.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
smtp.italiacanda-it.com
|
unknown
|
||
us2.smtp.mailhostbox.com
|
208.91.198.143
|
||
api.ipify.org
|
104.26.13.205
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.91.198.143
|
us2.smtp.mailhostbox.com
|
United States
|
||
208.91.199.225
|
unknown
|
United States
|
||
208.91.199.223
|
unknown
|
United States
|
||
104.26.13.205
|
api.ipify.org
|
United States
|
||
208.91.199.224
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
system
|
page execute and read and write
|
||
1110000
|
direct allocation
|
page read and write
|
||
2EC0000
|
trusted library section
|
page read and write
|
||
2C9F000
|
heap
|
page read and write
|
||
5590000
|
trusted library section
|
page read and write
|
||
3F71000
|
trusted library allocation
|
page read and write
|
||
2FC4000
|
trusted library allocation
|
page read and write
|
||
2FEF000
|
trusted library allocation
|
page read and write
|
||
5630000
|
heap
|
page execute and read and write
|
||
11BD000
|
heap
|
page read and write
|
||
2B60000
|
trusted library allocation
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
1188000
|
heap
|
page read and write
|
||
2B20000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
4033000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
426000
|
system
|
page execute and read and write
|
||
3CBD000
|
direct allocation
|
page read and write
|
||
EF8000
|
stack
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
11EB000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
unkown
|
page readonly
|
||
56C5000
|
heap
|
page read and write
|
||
1228000
|
heap
|
page read and write
|
||
5550000
|
trusted library allocation
|
page read and write
|
||
445000
|
system
|
page execute and read and write
|
||
561C000
|
stack
|
page read and write
|
||
12D2000
|
heap
|
page read and write
|
||
7A1000
|
unkown
|
page execute read
|
||
1176000
|
trusted library allocation
|
page execute and read and write
|
||
2B25000
|
trusted library allocation
|
page execute and read and write
|
||
11C0000
|
heap
|
page read and write
|
||
2FED000
|
trusted library allocation
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
12A3000
|
heap
|
page read and write
|
||
681E000
|
stack
|
page read and write
|
||
1044000
|
trusted library allocation
|
page read and write
|
||
126D000
|
heap
|
page read and write
|
||
1064000
|
heap
|
page read and write
|
||
3D2E000
|
direct allocation
|
page read and write
|
||
56B7000
|
heap
|
page read and write
|
||
1020000
|
trusted library section
|
page read and write
|
||
11BB000
|
heap
|
page read and write
|
||
6958000
|
trusted library allocation
|
page read and write
|
||
691E000
|
stack
|
page read and write
|
||
13CD000
|
heap
|
page read and write
|
||
2B27000
|
trusted library allocation
|
page execute and read and write
|
||
3B90000
|
direct allocation
|
page read and write
|
||
5BBF000
|
stack
|
page read and write
|
||
4072000
|
trusted library allocation
|
page read and write
|
||
3B13000
|
direct allocation
|
page read and write
|
||
3B90000
|
direct allocation
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
4F78000
|
trusted library allocation
|
page read and write
|
||
3B13000
|
direct allocation
|
page read and write
|
||
7A1000
|
unkown
|
page execute read
|
||
FDB000
|
stack
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
3CB9000
|
direct allocation
|
page read and write
|
||
12AC000
|
heap
|
page read and write
|
||
639F000
|
stack
|
page read and write
|
||
2F71000
|
trusted library allocation
|
page read and write
|
||
5CED000
|
stack
|
page read and write
|
||
5C8D000
|
trusted library allocation
|
page read and write
|
||
1352000
|
heap
|
page read and write
|
||
2F68000
|
heap
|
page read and write
|
||
5ABD000
|
stack
|
page read and write
|
||
117A000
|
trusted library allocation
|
page execute and read and write
|
||
3CB9000
|
direct allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
1347000
|
heap
|
page read and write
|
||
2B2B000
|
trusted library allocation
|
page execute and read and write
|
||
11DB000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
1A1E000
|
stack
|
page read and write
|
||
104D000
|
trusted library allocation
|
page execute and read and write
|
||
1100000
|
direct allocation
|
page execute and read and write
|
||
6970000
|
trusted library allocation
|
page execute and read and write
|
||
2C70000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
3CBD000
|
direct allocation
|
page read and write
|
||
868000
|
unkown
|
page readonly
|
||
B70000
|
heap
|
page read and write
|
||
3B90000
|
direct allocation
|
page read and write
|
||
30A8000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
unkown
|
page readonly
|
||
5C80000
|
trusted library allocation
|
page read and write
|
||
39F0000
|
direct allocation
|
page read and write
|
||
2FAA000
|
trusted library allocation
|
page read and write
|
||
B87000
|
trusted library allocation
|
page read and write
|
||
3B90000
|
direct allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
13E5000
|
heap
|
page read and write
|
||
1257000
|
heap
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
6EE06000
|
unkown
|
page readonly
|
||
855000
|
unkown
|
page readonly
|
||
13E4000
|
heap
|
page read and write
|
||
3CB9000
|
direct allocation
|
page read and write
|
||
13E5000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
3CBD000
|
direct allocation
|
page read and write
|
||
125E000
|
heap
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
39F0000
|
direct allocation
|
page read and write
|
||
6960000
|
trusted library allocation
|
page read and write
|
||
85F000
|
unkown
|
page read and write
|
||
3B13000
|
direct allocation
|
page read and write
|
||
79E000
|
stack
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
3B13000
|
direct allocation
|
page read and write
|
||
2E80000
|
trusted library allocation
|
page read and write
|
||
12BB000
|
heap
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
12BD000
|
heap
|
page read and write
|
||
555B000
|
trusted library allocation
|
page read and write
|
||
12AB000
|
heap
|
page read and write
|
||
12D2000
|
heap
|
page read and write
|
||
85F000
|
unkown
|
page write copy
|
||
125E000
|
heap
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
5660000
|
heap
|
page read and write
|
||
3B13000
|
direct allocation
|
page read and write
|
||
3CB9000
|
direct allocation
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
13A5000
|
heap
|
page read and write
|
||
1065000
|
heap
|
page read and write
|
||
2B83000
|
heap
|
page read and write
|
||
2B50000
|
trusted library allocation
|
page execute and read and write
|
||
5562000
|
trusted library allocation
|
page read and write
|
||
3B90000
|
direct allocation
|
page read and write
|
||
2FB3000
|
trusted library allocation
|
page read and write
|
||
3D2E000
|
direct allocation
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
3B90000
|
direct allocation
|
page read and write
|
||
3001000
|
trusted library allocation
|
page read and write
|
||
5740000
|
heap
|
page read and write
|
||
12D3000
|
heap
|
page read and write
|
||
3CBD000
|
direct allocation
|
page read and write
|
||
12D2000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
2FEB000
|
trusted library allocation
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
1172000
|
trusted library allocation
|
page read and write
|
||
B0A000
|
stack
|
page read and write
|
||
13DF000
|
heap
|
page read and write
|
||
3CBD000
|
direct allocation
|
page read and write
|
||
12BC000
|
heap
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
3CB9000
|
direct allocation
|
page read and write
|
||
3D2E000
|
direct allocation
|
page read and write
|
||
3D2E000
|
direct allocation
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
2C67000
|
heap
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
1254000
|
heap
|
page read and write
|
||
3CB9000
|
direct allocation
|
page read and write
|
||
105D000
|
trusted library allocation
|
page execute and read and write
|
||
1170000
|
trusted library allocation
|
page read and write
|
||
12D2000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
12D2000
|
heap
|
page read and write
|
||
1043000
|
trusted library allocation
|
page execute and read and write
|
||
39F0000
|
direct allocation
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
trusted library allocation
|
page read and write
|
||
5C90000
|
heap
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
56AC000
|
heap
|
page read and write
|
||
2FC0000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page execute and read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
12D2000
|
heap
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
6980000
|
trusted library allocation
|
page read and write
|
||
597E000
|
stack
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
593C000
|
stack
|
page read and write
|
||
2B22000
|
trusted library allocation
|
page read and write
|
||
56A3000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
13F5000
|
heap
|
page read and write
|
||
1253000
|
heap
|
page read and write
|
||
6950000
|
trusted library allocation
|
page read and write
|
||
1405000
|
heap
|
page read and write
|
||
7F980000
|
trusted library allocation
|
page execute and read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
12D2000
|
heap
|
page read and write
|
||
67DF000
|
stack
|
page read and write
|
||
5648000
|
heap
|
page read and write
|
||
1010000
|
trusted library section
|
page read and write
|
||
3CBD000
|
direct allocation
|
page read and write
|
||
5646000
|
heap
|
page read and write
|
||
6964000
|
trusted library allocation
|
page read and write
|
||
12D2000
|
heap
|
page read and write
|
||
122C000
|
heap
|
page read and write
|
||
69CD000
|
stack
|
page read and write
|
||
2C0C000
|
stack
|
page read and write
|
||
12D2000
|
heap
|
page read and write
|
||
3B13000
|
direct allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
1053000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
trusted library allocation
|
page read and write
|
||
557D000
|
trusted library allocation
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
5571000
|
trusted library allocation
|
page read and write
|
||
5A7E000
|
stack
|
page read and write
|
||
5CA0000
|
trusted library allocation
|
page execute and read and write
|
||
3D2E000
|
direct allocation
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
556A000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
trusted library allocation
|
page read and write
|
||
82F000
|
unkown
|
page readonly
|
||
6A5E000
|
stack
|
page read and write
|
||
868000
|
unkown
|
page readonly
|
||
39F0000
|
direct allocation
|
page read and write
|
||
1399000
|
heap
|
page read and write
|
||
39F0000
|
direct allocation
|
page read and write
|
||
556E000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
heap
|
page execute and read and write
|
||
5640000
|
heap
|
page read and write
|
||
1373000
|
heap
|
page read and write
|
||
5BFD000
|
stack
|
page read and write
|
||
2FF7000
|
trusted library allocation
|
page read and write
|
||
6AA0000
|
heap
|
page read and write
|
||
855000
|
unkown
|
page readonly
|
||
3D2E000
|
direct allocation
|
page read and write
|
||
863000
|
unkown
|
page write copy
|
||
82F000
|
unkown
|
page readonly
|
||
12F2000
|
heap
|
page read and write
|
||
1253000
|
heap
|
page read and write
|
||
125E000
|
heap
|
page read and write
|
||
39F0000
|
direct allocation
|
page read and write
|
||
555E000
|
trusted library allocation
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
6E9000
|
stack
|
page read and write
|
||
1E1E000
|
stack
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
There are 235 hidden memdumps, click here to show them.