IOC Report
pagamento.exe

loading gif

Files

File Path
Type
Category
Malicious
pagamento.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\aut9FCD.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autA00D.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\soliloquised
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\unbarricadoed
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\pagamento.exe
"C:\Users\user\Desktop\pagamento.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\pagamento.exe"
malicious

URLs

Name
IP
Malicious
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.org/
193.122.6.168
http://checkip.dyndns.com
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/8.46.123.33(
unknown
http://checkip.dyndns.org/q
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
193.122.6.168

IPs

IP
Domain
Country
Malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
193.122.6.168
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2F1C000
trusted library allocation
page read and write
malicious
2300000
direct allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
2D51000
trusted library allocation
page read and write
malicious
2EA6000
trusted library allocation
page read and write
6950000
heap
page read and write
EF7000
stack
page read and write
FE9000
heap
page read and write
1190000
trusted library allocation
page read and write
51CE000
stack
page read and write
68A0000
trusted library allocation
page execute and read and write
51D0000
trusted library allocation
page read and write
11BD000
trusted library allocation
page execute and read and write
BA0000
unkown
page readonly
2FA4000
trusted library allocation
page read and write
687E000
stack
page read and write
5670000
trusted library allocation
page read and write
4163000
direct allocation
page read and write
16A4000
heap
page read and write
3CF0000
heap
page read and write
C62000
unkown
page readonly
6400000
heap
page read and write
18BF000
heap
page read and write
11B0000
trusted library allocation
page read and write
41E0000
direct allocation
page read and write
41E0000
direct allocation
page read and write
2F9F000
trusted library allocation
page read and write
BA1000
unkown
page execute read
1796000
heap
page read and write
6920000
trusted library allocation
page read and write
4163000
direct allocation
page read and write
2F8C000
trusted library allocation
page read and write
F8A000
heap
page read and write
2E9E000
trusted library allocation
page read and write
13A0000
heap
page read and write
2F00000
trusted library allocation
page read and write
170B000
heap
page read and write
41E0000
direct allocation
page read and write
2EA2000
trusted library allocation
page read and write
62FE000
stack
page read and write
4309000
direct allocation
page read and write
142F000
stack
page read and write
2DFA000
trusted library allocation
page read and write
3DB9000
trusted library allocation
page read and write
BA1000
unkown
page execute read
4040000
direct allocation
page read and write
4309000
direct allocation
page read and write
51FD000
trusted library allocation
page read and write
11D2000
trusted library allocation
page read and write
11D7000
trusted library allocation
page execute and read and write
13FF000
stack
page read and write
2E46000
trusted library allocation
page read and write
5210000
heap
page read and write
2E17000
trusted library allocation
page read and write
63FE000
stack
page read and write
2E08000
trusted library allocation
page read and write
4163000
direct allocation
page read and write
2ED3000
trusted library allocation
page read and write
11A4000
trusted library allocation
page read and write
2E14000
trusted library allocation
page read and write
41E0000
direct allocation
page read and write
F96000
heap
page read and write
187F000
heap
page read and write
11D0000
trusted library allocation
page read and write
2E9A000
trusted library allocation
page read and write
2E56000
trusted library allocation
page read and write
2DF7000
trusted library allocation
page read and write
4040000
direct allocation
page read and write
653D000
stack
page read and write
16E6000
heap
page read and write
1696000
heap
page read and write
15E0000
heap
page read and write
1550000
heap
page read and write
2E2F000
trusted library allocation
page read and write
11CA000
trusted library allocation
page execute and read and write
11AD000
trusted library allocation
page execute and read and write
17DB000
heap
page read and write
16A4000
heap
page read and write
3DDD000
trusted library allocation
page read and write
430D000
direct allocation
page read and write
4309000
direct allocation
page read and write
1787000
heap
page read and write
437E000
direct allocation
page read and write
400000
system
page execute and read and write
2EE0000
trusted library allocation
page read and write
188E000
heap
page read and write
159E000
stack
page read and write
C3C000
unkown
page readonly
2FD2000
trusted library allocation
page read and write
2F86000
trusted library allocation
page read and write
430D000
direct allocation
page read and write
5202000
trusted library allocation
page read and write
51F6000
trusted library allocation
page read and write
4040000
direct allocation
page read and write
170B000
heap
page read and write
170B000
heap
page read and write
51EE000
trusted library allocation
page read and write
F60000
heap
page read and write
53AD000
stack
page read and write
66BF000
stack
page read and write
16D5000
heap
page read and write
18C0000
heap
page read and write
430D000
direct allocation
page read and write
4309000
direct allocation
page read and write
6880000
trusted library allocation
page read and write
F68000
heap
page read and write
2380000
heap
page read and write
437E000
direct allocation
page read and write
11F0000
trusted library allocation
page read and write
13D0000
heap
page execute and read and write
1650000
heap
page read and write
688A000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
1779000
heap
page read and write
68C0000
trusted library allocation
page read and write
170B000
heap
page read and write
F30000
heap
page read and write
3D51000
trusted library allocation
page read and write
2F96000
trusted library allocation
page read and write
139D000
stack
page read and write
6457000
heap
page read and write
169E000
heap
page read and write
2EC5000
trusted library allocation
page read and write
1075000
heap
page read and write
2E0B000
trusted library allocation
page read and write
56A0000
heap
page execute and read and write
1890000
heap
page read and write
2DFF000
trusted library allocation
page read and write
16B3000
heap
page read and write
2E52000
trusted library allocation
page read and write
437E000
direct allocation
page read and write
4040000
direct allocation
page read and write
51F1000
trusted library allocation
page read and write
140E000
stack
page read and write
2F81000
trusted library allocation
page read and write
2FCC000
trusted library allocation
page read and write
118E000
stack
page read and write
430D000
direct allocation
page read and write
58B0000
trusted library allocation
page read and write
16E5000
heap
page read and write
677E000
stack
page read and write
17D0000
heap
page read and write
6890000
trusted library allocation
page execute and read and write
2E44000
trusted library allocation
page read and write
103A000
stack
page read and write
C70000
unkown
page write copy
2EB7000
trusted library allocation
page read and write
657E000
stack
page read and write
1817000
heap
page read and write
170B000
heap
page read and write
1017000
heap
page read and write
41E0000
direct allocation
page read and write
2E5A000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
1668000
heap
page read and write
5340000
trusted library allocation
page read and write
3CF4000
heap
page read and write
17AB000
heap
page read and write
11DB000
trusted library allocation
page execute and read and write
170B000
heap
page read and write
66FE000
stack
page read and write
2FD4000
trusted library allocation
page read and write
2FDE000
trusted library allocation
page read and write
430D000
direct allocation
page read and write
2E4E000
trusted library allocation
page read and write
1660000
heap
page read and write
5213000
heap
page read and write
51DE000
trusted library allocation
page read and write
C3C000
unkown
page readonly
69A0000
trusted library allocation
page execute and read and write
51DB000
trusted library allocation
page read and write
C74000
unkown
page readonly
1687000
heap
page read and write
58B8000
trusted library allocation
page read and write
2FD8000
trusted library allocation
page read and write
C6C000
unkown
page write copy
531E000
stack
page read and write
104D000
heap
page read and write
2C8E000
stack
page read and write
180B000
heap
page read and write
4040000
direct allocation
page read and write
58B6000
trusted library allocation
page read and write
16A4000
heap
page read and write
4E4E000
stack
page read and write
3017000
trusted library allocation
page read and write
11D5000
trusted library allocation
page execute and read and write
51D6000
trusted library allocation
page read and write
15DE000
stack
page read and write
3DD4000
trusted library allocation
page read and write
170B000
heap
page read and write
170B000
heap
page read and write
135E000
stack
page read and write
41E0000
direct allocation
page read and write
4163000
direct allocation
page read and write
17EF000
heap
page read and write
2E8E000
trusted library allocation
page read and write
11C6000
trusted library allocation
page execute and read and write
5680000
trusted library allocation
page execute and read and write
131E000
stack
page read and write
11A3000
trusted library allocation
page execute and read and write
58C0000
trusted library allocation
page execute and read and write
225E000
stack
page read and write
C6C000
unkown
page read and write
1200000
trusted library allocation
page execute and read and write
2E92000
trusted library allocation
page read and write
437E000
direct allocation
page read and write
C74000
unkown
page readonly
11C2000
trusted library allocation
page read and write
688F000
trusted library allocation
page read and write
5470000
heap
page read and write
1070000
heap
page read and write
BBA000
stack
page read and write
170C000
heap
page read and write
566F000
stack
page read and write
5690000
trusted library allocation
page read and write
13E0000
heap
page read and write
169E000
heap
page read and write
5320000
trusted library allocation
page read and write
2EFC000
trusted library allocation
page read and write
3D79000
trusted library allocation
page read and write
18CF000
heap
page read and write
65BE000
stack
page read and write
13C0000
trusted library allocation
page read and write
1831000
heap
page read and write
673E000
stack
page read and write
1697000
heap
page read and write
6883000
trusted library allocation
page read and write
58BB000
trusted library allocation
page read and write
1210000
heap
page read and write
170B000
heap
page read and write
F20000
heap
page read and write
11A0000
trusted library allocation
page read and write
2E02000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
16F4000
heap
page read and write
51EA000
trusted library allocation
page read and write
22F0000
direct allocation
page execute and read and write
1895000
heap
page read and write
187F000
heap
page read and write
170B000
heap
page read and write
4309000
direct allocation
page read and write
170B000
heap
page read and write
2EAA000
trusted library allocation
page read and write
BA0000
unkown
page readonly
188E000
heap
page read and write
430D000
direct allocation
page read and write
437E000
direct allocation
page read and write
6DA0000
heap
page read and write
4163000
direct allocation
page read and write
3DE9000
trusted library allocation
page read and write
1470000
heap
page read and write
143F000
stack
page read and write
4163000
direct allocation
page read and write
18C2000
heap
page read and write
6464000
heap
page read and write
4309000
direct allocation
page read and write
18CF000
heap
page read and write
16B9000
heap
page read and write
1E5D000
stack
page read and write
16F4000
heap
page read and write
141B000
stack
page read and write
C62000
unkown
page readonly
569E000
trusted library allocation
page read and write
18C2000
heap
page read and write
437E000
direct allocation
page read and write
2FA9000
trusted library allocation
page read and write
1696000
heap
page read and write
4040000
direct allocation
page read and write
2D40000
heap
page read and write
2E96000
trusted library allocation
page read and write
There are 260 hidden memdumps, click here to show them.