Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Payment details.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Payment details.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Payment details.exe
|
"C:\Users\user\Desktop\Payment details.exe"
|
||
C:\Users\user\Desktop\Payment details.exe
|
"C:\Users\user\Desktop\Payment details.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
104.26.13.205
|
||
http://r3.o.lencr.org0
|
unknown
|
||
https://api.ipify.org
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://mail.teddyjnr.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://r3.i.lencr.org/0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.teddyjnr.com
|
50.87.145.190
|
||
api.ipify.org
|
104.26.13.205
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
50.87.145.190
|
mail.teddyjnr.com
|
United States
|
||
104.26.13.205
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment details_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment details_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment details_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment details_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment details_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment details_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment details_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment details_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment details_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment details_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment details_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment details_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment details_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Payment details_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
30C4000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
3091000
|
trusted library allocation
|
page read and write
|
||
30BC000
|
trusted library allocation
|
page read and write
|
||
36B7000
|
trusted library allocation
|
page read and write
|
||
4EAD000
|
stack
|
page read and write
|
||
40A7000
|
trusted library allocation
|
page read and write
|
||
7260000
|
trusted library allocation
|
page read and write
|
||
2FA000
|
stack
|
page read and write
|
||
3EA7000
|
trusted library allocation
|
page read and write
|
||
30B6000
|
trusted library allocation
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
846000
|
trusted library allocation
|
page execute and read and write
|
||
517E000
|
stack
|
page read and write
|
||
83D0000
|
heap
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
25AB000
|
trusted library allocation
|
page read and write
|
||
6BE000
|
stack
|
page read and write
|
||
25F0000
|
heap
|
page execute and read and write
|
||
8BE000
|
stack
|
page read and write
|
||
402E000
|
trusted library allocation
|
page read and write
|
||
6D9E000
|
stack
|
page read and write
|
||
3081000
|
trusted library allocation
|
page read and write
|
||
4F35000
|
heap
|
page read and write
|
||
4BCD000
|
trusted library allocation
|
page read and write
|
||
5C50000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
577D000
|
stack
|
page read and write
|
||
4D80000
|
trusted library section
|
page read and write
|
||
13E6000
|
trusted library allocation
|
page execute and read and write
|
||
2600000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
trusted library allocation
|
page read and write
|
||
3EF5000
|
trusted library allocation
|
page read and write
|
||
30B8000
|
trusted library allocation
|
page read and write
|
||
2640000
|
heap
|
page read and write
|
||
F99000
|
stack
|
page read and write
|
||
820000
|
trusted library allocation
|
page read and write
|
||
1B0000
|
unkown
|
page readonly
|
||
15D5000
|
trusted library allocation
|
page execute and read and write
|
||
5532000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
heap
|
page execute and read and write
|
||
97C000
|
heap
|
page read and write
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
863E000
|
stack
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
2620000
|
trusted library allocation
|
page read and write
|
||
135E000
|
heap
|
page read and write
|
||
90F000
|
heap
|
page read and write
|
||
6BCE000
|
stack
|
page read and write
|
||
2B52000
|
trusted library allocation
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page execute and read and write
|
||
7F510000
|
trusted library allocation
|
page execute and read and write
|
||
30D6000
|
trusted library allocation
|
page read and write
|
||
13EA000
|
trusted library allocation
|
page execute and read and write
|
||
13E0000
|
trusted library allocation
|
page read and write
|
||
842000
|
trusted library allocation
|
page read and write
|
||
1867000
|
heap
|
page read and write
|
||
870000
|
trusted library allocation
|
page read and write
|
||
24EE000
|
stack
|
page read and write
|
||
474C000
|
stack
|
page read and write
|
||
5780000
|
heap
|
page read and write
|
||
68DE000
|
stack
|
page read and write
|
||
4B23000
|
heap
|
page read and write
|
||
6DF0000
|
trusted library allocation
|
page execute and read and write
|
||
1644000
|
trusted library allocation
|
page read and write
|
||
4B7B000
|
stack
|
page read and write
|
||
6E8E000
|
stack
|
page read and write
|
||
1610000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page execute and read and write
|
||
978000
|
heap
|
page read and write
|
||
2615000
|
trusted library allocation
|
page read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
12F3000
|
heap
|
page read and write
|
||
6BA6000
|
heap
|
page read and write
|
||
85B000
|
trusted library allocation
|
page execute and read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
857000
|
trusted library allocation
|
page execute and read and write
|
||
59BC000
|
stack
|
page read and write
|
||
6AE0000
|
trusted library allocation
|
page execute and read and write
|
||
5512000
|
trusted library allocation
|
page read and write
|
||
1860000
|
heap
|
page read and write
|
||
4041000
|
trusted library allocation
|
page read and write
|
||
67CE000
|
stack
|
page read and write
|
||
13F5000
|
heap
|
page read and write
|
||
3041000
|
trusted library allocation
|
page read and write
|
||
6C9E000
|
stack
|
page read and write
|
||
13CD000
|
trusted library allocation
|
page execute and read and write
|
||
6A1F000
|
stack
|
page read and write
|
||
67DD000
|
stack
|
page read and write
|
||
830000
|
trusted library allocation
|
page read and write
|
||
552D000
|
trusted library allocation
|
page read and write
|
||
4BCB000
|
trusted library allocation
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
6B6C000
|
heap
|
page read and write
|
||
98DF000
|
stack
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
13E2000
|
trusted library allocation
|
page read and write
|
||
252E000
|
stack
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
6DDD000
|
stack
|
page read and write
|
||
99DE000
|
stack
|
page read and write
|
||
25C6000
|
trusted library allocation
|
page read and write
|
||
6D92000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
heap
|
page read and write
|
||
7270000
|
heap
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
6EE7000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
2695000
|
trusted library allocation
|
page read and write
|
||
6C30000
|
trusted library allocation
|
page read and write
|
||
7480000
|
trusted library allocation
|
page execute and read and write
|
||
25D2000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
6A5E000
|
stack
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
15D7000
|
trusted library allocation
|
page execute and read and write
|
||
705000
|
heap
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
2776000
|
trusted library allocation
|
page read and write
|
||
68CE000
|
stack
|
page read and write
|
||
2F30000
|
heap
|
page execute and read and write
|
||
9C1E000
|
stack
|
page read and write
|
||
12F6000
|
heap
|
page read and write
|
||
2610000
|
trusted library allocation
|
page read and write
|
||
57C0000
|
heap
|
page read and write
|
||
A718000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
25A0000
|
trusted library allocation
|
page read and write
|
||
1640000
|
trusted library allocation
|
page read and write
|
||
551A000
|
trusted library allocation
|
page read and write
|
||
7250000
|
trusted library allocation
|
page read and write
|
||
5BBF000
|
stack
|
page read and write
|
||
6C7D000
|
stack
|
page read and write
|
||
13C0000
|
trusted library allocation
|
page read and write
|
||
6B60000
|
heap
|
page read and write
|
||
50D0000
|
trusted library section
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
4AE0000
|
trusted library allocation
|
page read and write
|
||
30CE000
|
trusted library allocation
|
page read and write
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
5526000
|
trusted library allocation
|
page read and write
|
||
550E000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
5C60000
|
heap
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
3F6000
|
stack
|
page read and write
|
||
6B5E000
|
stack
|
page read and write
|
||
824000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
2651000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
trusted library allocation
|
page read and write
|
||
691D000
|
stack
|
page read and write
|
||
6AD0000
|
trusted library allocation
|
page read and write
|
||
1B2000
|
unkown
|
page readonly
|
||
4F80000
|
heap
|
page read and write
|
||
3679000
|
trusted library allocation
|
page read and write
|
||
2530000
|
trusted library allocation
|
page read and write
|
||
823000
|
trusted library allocation
|
page execute and read and write
|
||
3F43000
|
trusted library allocation
|
page read and write
|
||
7FD00000
|
trusted library allocation
|
page execute and read and write
|
||
2692000
|
trusted library allocation
|
page read and write
|
||
50C0000
|
trusted library section
|
page read and write
|
||
13DD000
|
trusted library allocation
|
page execute and read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
5C40000
|
trusted library allocation
|
page read and write
|
||
2532000
|
trusted library allocation
|
page read and write
|
||
9AE0000
|
heap
|
page read and write
|
||
12EA000
|
heap
|
page read and write
|
||
183E000
|
stack
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
669E000
|
stack
|
page read and write
|
||
9ADD000
|
stack
|
page read and write
|
||
5521000
|
trusted library allocation
|
page read and write
|
||
15DB000
|
trusted library allocation
|
page execute and read and write
|
||
4B80000
|
trusted library section
|
page readonly
|
||
13C3000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
911000
|
heap
|
page read and write
|
||
3659000
|
trusted library allocation
|
page read and write
|
||
ACF000
|
stack
|
page read and write
|
||
5C57000
|
trusted library allocation
|
page read and write
|
||
30BA000
|
trusted library allocation
|
page read and write
|
||
2E88000
|
trusted library allocation
|
page read and write
|
||
84A000
|
trusted library allocation
|
page execute and read and write
|
||
6BE0000
|
heap
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page execute and read and write
|
||
307F000
|
trusted library allocation
|
page read and write
|
||
97DE000
|
stack
|
page read and write
|
||
679F000
|
stack
|
page read and write
|
||
13C4000
|
trusted library allocation
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
6C38000
|
trusted library allocation
|
page read and write
|
||
308D000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
9B6000
|
heap
|
page read and write
|
||
669E000
|
heap
|
page read and write
|
||
810000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
stack
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
8640000
|
trusted library section
|
page read and write
|
||
D07000
|
heap
|
page read and write
|
||
4BB0000
|
trusted library allocation
|
page execute and read and write
|
||
134F000
|
heap
|
page read and write
|
||
28AE000
|
trusted library allocation
|
page read and write
|
||
5C4D000
|
trusted library allocation
|
page read and write
|
||
507C000
|
stack
|
page read and write
|
||
1600000
|
trusted library allocation
|
page execute and read and write
|
||
9D5E000
|
stack
|
page read and write
|
||
4069000
|
trusted library allocation
|
page read and write
|
||
6BE0000
|
trusted library allocation
|
page execute and read and write
|
||
4F70000
|
heap
|
page read and write
|
||
AC80000
|
trusted library section
|
page read and write
|
||
56FE000
|
stack
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
55B0000
|
heap
|
page read and write
|
||
6690000
|
heap
|
page read and write
|
||
550B000
|
trusted library allocation
|
page read and write
|
||
25C1000
|
trusted library allocation
|
page read and write
|
||
83D000
|
trusted library allocation
|
page execute and read and write
|
||
25E0000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
trusted library allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
557C000
|
stack
|
page read and write
|
||
852000
|
trusted library allocation
|
page read and write
|
||
134A000
|
heap
|
page read and write
|
||
3077000
|
trusted library allocation
|
page read and write
|
||
5506000
|
trusted library allocation
|
page read and write
|
||
12C8000
|
heap
|
page read and write
|
||
6C20000
|
trusted library allocation
|
page read and write
|
||
258B000
|
stack
|
page read and write
|
||
55B3000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
6DE0000
|
trusted library allocation
|
page execute and read and write
|
||
631F000
|
stack
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
heap
|
page execute and read and write
|
||
15D2000
|
trusted library allocation
|
page read and write
|
||
57A8000
|
trusted library allocation
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
573E000
|
stack
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
3651000
|
trusted library allocation
|
page read and write
|
||
E99000
|
stack
|
page read and write
|
||
9E5E000
|
stack
|
page read and write
|
||
9D1E000
|
stack
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
82D000
|
trusted library allocation
|
page execute and read and write
|
||
841D000
|
heap
|
page read and write
|
||
25BE000
|
trusted library allocation
|
page read and write
|
||
551E000
|
trusted library allocation
|
page read and write
|
||
25CD000
|
trusted library allocation
|
page read and write
|
There are 253 hidden memdumps, click here to show them.