IOC Report
e-Payment.NET.CMS4006975815.exe

loading gif

Files

File Path
Type
Category
Malicious
e-Payment.NET.CMS4006975815.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\JXHPwNYzysUjKo.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\e-Payment.NET.CMS4006975815.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpD623.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\JXHPwNYzysUjKo.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JXHPwNYzysUjKo.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1djrpbgi.hmy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1oz2nbvv.jlu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5fwcc2aa.lmy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cvedl5xu.utw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kpx5lrh0.pqn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kwbfd31x.i1b.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uk5f5a42.s0f.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xvrcatpp.g5e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpE7F6.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\egsy\logs.dat
ASCII text, with CRLF, CR line terminators
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\e-Payment.NET.CMS4006975815.exe
"C:\Users\user\Desktop\e-Payment.NET.CMS4006975815.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\e-Payment.NET.CMS4006975815.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\JXHPwNYzysUjKo.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXHPwNYzysUjKo" /XML "C:\Users\user\AppData\Local\Temp\tmpD623.tmp"
malicious
C:\Users\user\Desktop\e-Payment.NET.CMS4006975815.exe
"C:\Users\user\Desktop\e-Payment.NET.CMS4006975815.exe"
malicious
C:\Users\user\AppData\Roaming\JXHPwNYzysUjKo.exe
C:\Users\user\AppData\Roaming\JXHPwNYzysUjKo.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXHPwNYzysUjKo" /XML "C:\Users\user\AppData\Local\Temp\tmpE7F6.tmp"
malicious
C:\Users\user\AppData\Roaming\JXHPwNYzysUjKo.exe
"C:\Users\user\AppData\Roaming\JXHPwNYzysUjKo.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
62.102.148.166
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

IPs

IP
Domain
Country
Malicious
62.102.148.166
unknown
Sweden
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\remcos_rpklfmytvo
EXEpath
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2729000
trusted library allocation
page read and write
malicious
38AA000
trusted library allocation
page read and write
malicious
2899000
trusted library allocation
page read and write
malicious
373C000
trusted library allocation
page read and write
malicious
3010000
heap
page read and write
malicious
25D0000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3933000
trusted library allocation
page read and write
818E000
stack
page read and write
69FE000
stack
page read and write
1365000
heap
page read and write
603000
trusted library allocation
page read and write
AEE000
stack
page read and write
5A12000
heap
page read and write
4D90000
heap
page read and write
5E0000
trusted library allocation
page read and write
5A38000
heap
page read and write
650000
trusted library allocation
page execute and read and write
3A7E000
trusted library allocation
page read and write
814E000
stack
page read and write
FE000
unkown
page readonly
5A5B000
heap
page read and write
844E000
stack
page read and write
2400000
heap
page read and write
6A7000
heap
page read and write
EDE000
stack
page read and write
2F00000
heap
page read and write
4D93000
heap
page read and write
4DC0000
heap
page read and write
4E20000
trusted library allocation
page read and write
890E000
stack
page read and write
40000
unkown
page readonly
5010000
heap
page read and write
4D20000
trusted library allocation
page read and write
2620000
heap
page read and write
5A41000
heap
page read and write
7FCE000
stack
page read and write
13E8000
heap
page read and write
67E0000
trusted library allocation
page read and write
A9E000
stack
page read and write
26C0000
heap
page execute and read and write
937000
stack
page read and write
C43000
trusted library allocation
page execute and read and write
5210000
heap
page read and write
4D47000
trusted library allocation
page read and write
6C71000
trusted library allocation
page read and write
FD0000
heap
page read and write
311D000
stack
page read and write
C72000
trusted library allocation
page read and write
848E000
stack
page read and write
C60000
trusted library allocation
page read and write
5A00000
heap
page read and write
D35000
heap
page read and write
24E0000
heap
page read and write
848E000
stack
page read and write
3B38000
trusted library allocation
page read and write
5F4000
trusted library allocation
page read and write
3A1E000
trusted library allocation
page read and write
60D000
trusted library allocation
page execute and read and write
4D2B000
trusted library allocation
page read and write
4885000
trusted library allocation
page read and write
24A5000
trusted library allocation
page read and write
5200000
trusted library allocation
page execute and read and write
2490000
trusted library allocation
page read and write
C7B000
trusted library allocation
page execute and read and write
C30000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
4FA1000
trusted library allocation
page read and write
31F0000
heap
page read and write
4D70000
trusted library allocation
page read and write
2454000
trusted library allocation
page read and write
36D9000
trusted library allocation
page read and write
3440000
heap
page read and write
F10000
heap
page read and write
2650000
trusted library allocation
page execute and read and write
23A5000
trusted library allocation
page read and write
810D000
stack
page read and write
2443000
heap
page read and write
A50000
heap
page read and write
5F0000
trusted library allocation
page read and write
28AE000
trusted library allocation
page read and write
3B30000
trusted library allocation
page read and write
1F0000
heap
page read and write
897D000
stack
page read and write
627000
trusted library allocation
page execute and read and write
8DEE000
stack
page read and write
4E64000
heap
page read and write
531D000
stack
page read and write
2830000
heap
page execute and read and write
B20000
heap
page read and write
38AE000
trusted library allocation
page read and write
5020000
trusted library allocation
page execute and read and write
C53000
trusted library allocation
page read and write
4F90000
trusted library section
page read and write
331F000
stack
page read and write
668000
heap
page read and write
500000
heap
page read and write
4FB0000
trusted library allocation
page read and write
8A4F000
stack
page read and write
970000
heap
page read and write
295B000
trusted library allocation
page read and write
247D000
trusted library allocation
page read and write
640000
trusted library allocation
page read and write
19A000
stack
page read and write
3869000
trusted library allocation
page read and write
2826000
trusted library allocation
page read and write
4D3E000
trusted library allocation
page read and write
96E000
stack
page read and write
7F8E000
stack
page read and write
4D6F000
trusted library allocation
page read and write
C9E000
heap
page read and write
4D24000
trusted library allocation
page read and write
3020000
heap
page read and write
295F000
trusted library allocation
page read and write
4B30000
heap
page read and write
AA0000
heap
page read and write
2872000
trusted library allocation
page read and write
300C000
stack
page read and write
415000
remote allocation
page execute and read and write
4F80000
trusted library allocation
page execute and read and write
29E2000
trusted library allocation
page read and write
3849000
trusted library allocation
page read and write
894E000
stack
page read and write
2810000
trusted library allocation
page read and write
59FE000
stack
page read and write
330E000
stack
page read and write
4B20000
trusted library allocation
page execute and read and write
CAF000
stack
page read and write
2F0B000
heap
page read and write
610000
trusted library allocation
page read and write
CC6000
heap
page read and write
CD3000
heap
page read and write
695000
heap
page read and write
7CCE000
stack
page read and write
834D000
stack
page read and write
2820000
trusted library allocation
page read and write
334F000
stack
page read and write
5A08000
heap
page read and write
6FA000
heap
page read and write
C5D000
trusted library allocation
page execute and read and write
2550000
heap
page read and write
2DBA000
stack
page read and write
C4D000
trusted library allocation
page execute and read and write
4D60000
trusted library allocation
page read and write
23C0000
trusted library allocation
page execute and read and write
4880000
trusted library allocation
page read and write
5A60000
heap
page read and write
CD1000
heap
page read and write
86CE000
stack
page read and write
86D0000
heap
page read and write
16AF000
stack
page read and write
A6E000
stack
page read and write
E90000
trusted library allocation
page read and write
AA5000
heap
page read and write
49DC000
stack
page read and write
85CD000
stack
page read and write
920000
heap
page read and write
24D0000
trusted library allocation
page read and write
36F9000
trusted library allocation
page read and write
2420000
trusted library allocation
page read and write
5A3B000
heap
page read and write
51EE000
stack
page read and write
2471000
trusted library allocation
page read and write
2FCC000
stack
page read and write
2B3E000
unkown
page read and write
28C6000
trusted library allocation
page read and write
26D1000
trusted library allocation
page read and write
2B7F000
unkown
page read and write
970000
heap
page read and write
858E000
stack
page read and write
487E000
stack
page read and write
2A1E000
trusted library allocation
page read and write
2BFF000
stack
page read and write
5030000
heap
page execute and read and write
8FC000
stack
page read and write
C44000
trusted library allocation
page read and write
23AF000
trusted library allocation
page read and write
86CD000
stack
page read and write
C40000
trusted library allocation
page read and write
27FC000
stack
page read and write
F7C000
stack
page read and write
660000
heap
page read and write
CB9000
heap
page read and write
980000
heap
page read and write
4D4D000
trusted library allocation
page read and write
550000
heap
page read and write
834E000
stack
page read and write
4E10000
trusted library allocation
page execute and read and write
4C6B000
stack
page read and write
5331000
trusted library allocation
page read and write
13B0000
heap
page read and write
27EE000
trusted library allocation
page read and write
566E000
stack
page read and write
929000
stack
page read and write
2800000
trusted library allocation
page execute and read and write
4E30000
trusted library section
page read and write
4E40000
heap
page read and write
2961000
trusted library allocation
page read and write
6E9E000
stack
page read and write
3841000
trusted library allocation
page read and write
4D41000
trusted library allocation
page read and write
E8E000
stack
page read and write
990000
heap
page read and write
4DB0000
trusted library allocation
page read and write
2430000
trusted library allocation
page read and write
8A90000
trusted library allocation
page read and write
2476000
trusted library allocation
page read and write
C77000
trusted library allocation
page execute and read and write
5B00000
heap
page read and write
2D7D000
stack
page read and write
2642000
trusted library allocation
page read and write
31BF000
unkown
page read and write
2908000
trusted library allocation
page read and write
5F3000
trusted library allocation
page execute and read and write
4D52000
trusted library allocation
page read and write
4D6D000
stack
page read and write
BBA000
heap
page read and write
5A5000
heap
page read and write
37C3000
trusted library allocation
page read and write
9C0000
heap
page read and write
23A0000
trusted library allocation
page read and write
12FC000
stack
page read and write
2482000
trusted library allocation
page read and write
5150000
heap
page read and write
BAC000
stack
page read and write
2640000
trusted library allocation
page read and write
8A7E000
stack
page read and write
42000
unkown
page readonly
882B000
stack
page read and write
5FD000
trusted library allocation
page execute and read and write
600000
trusted library allocation
page read and write
25D5000
heap
page read and write
616000
trusted library allocation
page execute and read and write
5000000
trusted library allocation
page read and write
4D30000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
8BAC000
stack
page read and write
61A000
trusted library allocation
page execute and read and write
308A000
heap
page read and write
2BBE000
stack
page read and write
2630000
heap
page execute and read and write
4F7000
stack
page read and write
6A1000
heap
page read and write
AB7000
heap
page read and write
7E8E000
stack
page read and write
3775000
trusted library allocation
page read and write
8930000
heap
page read and write
2965000
trusted library allocation
page read and write
2841000
trusted library allocation
page read and write
3AD7000
trusted library allocation
page read and write
48A0000
trusted library allocation
page execute and read and write
C98000
heap
page read and write
5670000
heap
page read and write
25EB000
stack
page read and write
4F7E000
stack
page read and write
7C8E000
stack
page read and write
5CC000
stack
page read and write
5A05000
heap
page read and write
321F000
stack
page read and write
8210000
heap
page read and write
4DF0000
heap
page read and write
3B91000
trusted library allocation
page read and write
BB0000
heap
page read and write
85CE000
stack
page read and write
844F000
stack
page read and write
2963000
trusted library allocation
page read and write
5A0000
heap
page read and write
880D000
stack
page read and write
27BE000
stack
page read and write
8F2E000
stack
page read and write
6EC000
heap
page read and write
5A23000
heap
page read and write
249F000
trusted library allocation
page read and write
26B0000
trusted library allocation
page read and write
F00000
heap
page read and write
8ED000
stack
page read and write
6A3000
heap
page read and write
712000
heap
page read and write
2967000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
F17000
heap
page read and write
4D75000
trusted library allocation
page read and write
306E000
unkown
page read and write
C66000
trusted library allocation
page execute and read and write
FE0000
heap
page read and write
4E00000
trusted library allocation
page read and write
C62000
trusted library allocation
page read and write
5770000
trusted library section
page read and write
2959000
trusted library allocation
page read and write
3080000
heap
page read and write
13E0000
heap
page read and write
C2E000
stack
page read and write
7F750000
trusted library allocation
page execute and read and write
D59000
heap
page read and write
4E8A000
heap
page read and write
3070000
heap
page read and write
8E2E000
stack
page read and write
4E02000
trusted library allocation
page read and write
C6A000
trusted library allocation
page execute and read and write
5A31000
heap
page read and write
EE0000
heap
page read and write
8F30000
trusted library allocation
page read and write
C90000
heap
page read and write
3015000
heap
page read and write
92E000
stack
page read and write
66E000
heap
page read and write
7F550000
trusted library allocation
page execute and read and write
892C000
stack
page read and write
8CAC000
stack
page read and write
50EB000
stack
page read and write
2F8E000
stack
page read and write
AB0000
heap
page read and write
59E000
stack
page read and write
2660000
trusted library allocation
page read and write
612000
trusted library allocation
page read and write
24A0000
trusted library allocation
page read and write
8CEE000
stack
page read and write
54E000
stack
page read and write
2450000
trusted library allocation
page read and write
734000
heap
page read and write
36D1000
trusted library allocation
page read and write
80CE000
stack
page read and write
622000
trusted library allocation
page read and write
62B000
trusted library allocation
page execute and read and write
A2F000
stack
page read and write
2E60000
heap
page read and write
5340000
trusted library allocation
page read and write
858E000
stack
page read and write
B6E000
stack
page read and write
9A0000
heap
page read and write
83A000
stack
page read and write
2A36000
trusted library allocation
page read and write
133E000
stack
page read and write
246E000
trusted library allocation
page read and write
2440000
heap
page read and write
1340000
heap
page read and write
245B000
trusted library allocation
page read and write
239E000
stack
page read and write
488F000
trusted library allocation
page read and write
822A000
heap
page read and write
820D000
stack
page read and write
295D000
trusted library allocation
page read and write
2824000
trusted library allocation
page read and write
1360000
heap
page read and write
688000
heap
page read and write
There are 335 hidden memdumps, click here to show them.