IOC Report
wrong bank details.exe

loading gif

Files

File Path
Type
Category
Malicious
wrong bank details.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\wrong bank details.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\wrong bank details.exe
"C:\Users\user\Desktop\wrong bank details.exe"
malicious
C:\Users\user\Desktop\wrong bank details.exe
"C:\Users\user\Desktop\wrong bank details.exe"
malicious
C:\Users\user\Desktop\wrong bank details.exe
"C:\Users\user\Desktop\wrong bank details.exe"
malicious

URLs

Name
IP
Malicious
https://api.telegram.org
unknown
malicious
https://api.telegram.org/bot
unknown
malicious
http://certificates.godaddy.com/repository/0
unknown
http://certs.godaddy.com/repository/1301
unknown
http://reallyfreegeoip.orgd
unknown
http://crl.godaddy.com/gdig2s1-19134.crl0
unknown
http://checkip.dyndns.org
unknown
https://api.telegram.org/bot8012948610:AAH4T2bfY_PPyXgKFGVw8rmhjBzj3nREYAE/sendDocument?chat_id=4039
unknown
https://certs.godaddy.com/repository/0
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.96.3
https://reallyfreegeoip.org/xml/8.46.123.33l
unknown
http://crl.godaddy.com/gdroot-g2.crl0F
unknown
http://checkip.dyndns.org/
132.226.8.169
http://checkip.dyndns.comd
unknown
https://reallyfreegeoip.org/xml/8.46.123.33d
unknown
http://checkip.dyndns.org/q
unknown
http://crl.godaddy.com/gdroot.crl0F
unknown
http://reallyfreegeoip.org
unknown
http://checkip.dyndns.orgd
unknown
https://reallyfreegeoip.org
unknown
http://api.telegram.orgd
unknown
http://checkip.dyndns.com
unknown
http://api.telegram.org
unknown
http://certificates.godaddy.com/repository/gdig2.crt0
unknown
http://checkip.dyndns.org/d
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://api.telegram.org/bot-/sendDocument?chat_id=
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 18 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
132.226.8.169

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
132.226.8.169
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wrong bank details_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wrong bank details_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wrong bank details_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wrong bank details_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wrong bank details_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wrong bank details_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wrong bank details_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wrong bank details_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wrong bank details_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wrong bank details_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wrong bank details_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wrong bank details_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wrong bank details_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wrong bank details_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3676000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2B74000
trusted library allocation
page read and write
malicious
35A9000
trusted library allocation
page read and write
malicious
610E000
stack
page read and write
28E4000
trusted library allocation
page read and write
2B31000
trusted library allocation
page read and write
2A2F000
trusted library allocation
page read and write
9CE000
stack
page read and write
3A91000
trusted library allocation
page read and write
7330000
heap
page read and write
8C9000
heap
page read and write
4FFA000
trusted library allocation
page read and write
2B2D000
trusted library allocation
page read and write
C70000
trusted library allocation
page read and write
6C70000
trusted library allocation
page read and write
4EBA000
trusted library allocation
page read and write
66C0000
heap
page read and write
2910000
heap
page execute and read and write
730F000
stack
page read and write
4FF6000
trusted library allocation
page read and write
B56000
trusted library allocation
page execute and read and write
806000
heap
page read and write
2891000
trusted library allocation
page read and write
2815000
trusted library allocation
page read and write
2A43000
trusted library allocation
page read and write
4E50000
heap
page read and write
642E000
stack
page read and write
23E0000
trusted library allocation
page read and write
2B04000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
266B000
trusted library allocation
page read and write
624D000
stack
page read and write
2853000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
2801000
trusted library allocation
page read and write
7D0000
heap
page read and write
DB0000
trusted library allocation
page read and write
811000
heap
page read and write
2785000
trusted library allocation
page read and write
2424000
trusted library allocation
page read and write
55D0000
heap
page read and write
DD0000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page execute and read and write
2B04000
trusted library allocation
page read and write
6C00000
trusted library section
page read and write
2420000
trusted library allocation
page read and write
9FFE000
stack
page read and write
243E000
trusted library allocation
page read and write
63EF000
stack
page read and write
55C0000
heap
page read and write
4ED2000
trusted library allocation
page read and write
2BF4000
trusted library allocation
page read and write
C92000
trusted library allocation
page read and write
4F60000
heap
page read and write
67C0000
trusted library allocation
page execute and read and write
760000
heap
page read and write
C9B000
trusted library allocation
page execute and read and write
279A000
trusted library allocation
page read and write
4F40000
trusted library allocation
page execute and read and write
B67000
trusted library allocation
page execute and read and write
2AFE000
trusted library allocation
page read and write
36F6000
trusted library allocation
page read and write
F3E000
stack
page read and write
3A21000
trusted library allocation
page read and write
4A5D000
stack
page read and write
C86000
trusted library allocation
page execute and read and write
B52000
trusted library allocation
page read and write
C97000
trusted library allocation
page execute and read and write
23BC000
stack
page read and write
2AD4000
trusted library allocation
page read and write
2ABB000
trusted library allocation
page read and write
B33000
trusted library allocation
page execute and read and write
2A82000
trusted library allocation
page read and write
2B18000
trusted library allocation
page read and write
4F63000
heap
page read and write
2A6D000
trusted library allocation
page read and write
2400000
heap
page read and write
2B34000
trusted library allocation
page read and write
242B000
trusted library allocation
page read and write
27AE000
trusted library allocation
page read and write
5000000
trusted library allocation
page execute and read and write
6BAE000
stack
page read and write
285F000
stack
page read and write
2446000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
2A82000
trusted library allocation
page read and write
4F5E000
stack
page read and write
2C34000
trusted library allocation
page read and write
1E0000
unkown
page readonly
471D000
stack
page read and write
400000
remote allocation
page execute and read and write
2771000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
25D9000
trusted library allocation
page read and write
C8A000
trusted library allocation
page execute and read and write
B80000
heap
page read and write
B67000
heap
page read and write
2A1A000
trusted library allocation
page read and write
4ECD000
trusted library allocation
page read and write
28A6000
trusted library allocation
page read and write
B23000
trusted library allocation
page execute and read and write
25C000
unkown
page readonly
2868000
trusted library allocation
page read and write
B43000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2A05000
trusted library allocation
page read and write
23F0000
trusted library allocation
page read and write
9B7D000
stack
page read and write
27EC000
trusted library allocation
page read and write
2A21000
trusted library allocation
page read and write
750000
heap
page read and write
C95000
trusted library allocation
page execute and read and write
4EBE000
trusted library allocation
page read and write
2B36000
trusted library allocation
page read and write
B4D000
heap
page read and write
41A000
remote allocation
page execute and read and write
7310000
trusted library section
page read and write
2B43000
trusted library allocation
page read and write
2B39000
trusted library allocation
page read and write
656E000
stack
page read and write
993E000
stack
page read and write
275C000
trusted library allocation
page read and write
6C6A000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
6110000
heap
page read and write
2A96000
trusted library allocation
page read and write
62B0000
heap
page read and write
3ACD000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
2A1E000
stack
page read and write
670000
heap
page read and write
2AD0000
trusted library allocation
page read and write
4EC6000
trusted library allocation
page read and write
4AD2000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
B87000
heap
page read and write
4CF0000
heap
page read and write
29B2000
trusted library allocation
page read and write
3A44000
trusted library allocation
page read and write
6251000
trusted library allocation
page read and write
DA0000
trusted library allocation
page execute and read and write
4F50000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
7DE000
heap
page read and write
B40000
trusted library allocation
page read and write
F7F000
stack
page read and write
2922000
trusted library allocation
page read and write
2B0E000
trusted library allocation
page read and write
7F7000
heap
page read and write
600E000
stack
page read and write
C7D000
trusted library allocation
page execute and read and write
DC0000
heap
page read and write
B50000
trusted library allocation
page read and write
4AD0000
trusted library allocation
page read and write
88B000
heap
page read and write
23C0000
trusted library allocation
page execute and read and write
2974000
trusted library allocation
page read and write
4D4B000
stack
page read and write
C25000
heap
page read and write
2ADC000
trusted library allocation
page read and write
2403000
heap
page read and write
2460000
trusted library allocation
page read and write
369B000
trusted library allocation
page read and write
814000
heap
page read and write
294B000
trusted library allocation
page read and write
2B30000
trusted library allocation
page read and write
29DC000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
B0E000
stack
page read and write
2B20000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6179000
heap
page read and write
DD4000
trusted library allocation
page read and write
4FF4000
trusted library allocation
page read and write
67E0000
heap
page read and write
257E000
stack
page read and write
2AD5000
trusted library allocation
page read and write
2936000
trusted library allocation
page read and write
BB2000
heap
page read and write
B5A000
trusted library allocation
page execute and read and write
237E000
stack
page read and write
B2D000
trusted library allocation
page execute and read and write
F9B000
trusted library allocation
page read and write
7F250000
trusted library allocation
page execute and read and write
2FA000
stack
page read and write
AF7000
stack
page read and write
C6E000
stack
page read and write
3A59000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
2B3D000
trusted library allocation
page read and write
9DBE000
stack
page read and write
B38000
heap
page read and write
2AF9000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
290D000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
7C0000
heap
page read and write
2A58000
trusted library allocation
page read and write
B24000
trusted library allocation
page read and write
B34000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
B4D000
trusted library allocation
page execute and read and write
6F2F000
stack
page read and write
27D8000
trusted library allocation
page read and write
4EA6000
trusted library allocation
page read and write
6E0E000
stack
page read and write
4AF0000
trusted library allocation
page read and write
A0E000
stack
page read and write
4D70000
heap
page execute and read and write
678E000
stack
page read and write
4E55000
heap
page read and write
283F000
trusted library allocation
page read and write
690E000
stack
page read and write
4588000
trusted library allocation
page read and write
3589000
trusted library allocation
page read and write
37AD000
trusted library allocation
page read and write
CA0000
heap
page read and write
2410000
heap
page execute and read and write
6D2E000
stack
page read and write
2960000
trusted library allocation
page read and write
B3D000
trusted library allocation
page execute and read and write
4A60000
trusted library allocation
page read and write
B59000
heap
page read and write
2B17000
trusted library allocation
page read and write
B62000
trusted library allocation
page read and write
28BA000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
4B5E000
stack
page read and write
28CF000
trusted library allocation
page read and write
69B0000
heap
page read and write
29F1000
trusted library allocation
page read and write
630000
heap
page read and write
2C30000
trusted library allocation
page read and write
2330000
trusted library allocation
page read and write
6570000
trusted library allocation
page read and write
B6B000
trusted library allocation
page execute and read and write
BFF000
heap
page read and write
4F3D000
stack
page read and write
1E2000
unkown
page readonly
B10000
trusted library allocation
page read and write
282A000
trusted library allocation
page read and write
720E000
stack
page read and write
2BF2000
trusted library allocation
page read and write
9A3E000
stack
page read and write
7AE000
stack
page read and write
244D000
trusted library allocation
page read and write
2AE9000
trusted library allocation
page read and write
539F000
stack
page read and write
29C7000
trusted library allocation
page read and write
2B1C000
trusted library allocation
page read and write
5130000
trusted library allocation
page execute and read and write
9C7D000
stack
page read and write
2A9C000
trusted library allocation
page read and write
9C80000
heap
page read and write
287D000
trusted library allocation
page read and write
299E000
trusted library allocation
page read and write
4D00000
heap
page read and write
9EFE000
stack
page read and write
2A9E000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page execute and read and write
6CEE000
stack
page read and write
67E2000
trusted library allocation
page read and write
2470000
heap
page read and write
266D000
trusted library allocation
page read and write
2581000
trusted library allocation
page read and write
75A000
stack
page read and write
2900000
trusted library allocation
page read and write
2B37000
trusted library allocation
page read and write
6258000
trusted library allocation
page read and write
25DF000
trusted library allocation
page read and write
3F7000
stack
page read and write
3A4D000
trusted library allocation
page read and write
2AFE000
trusted library allocation
page read and write
4EAE000
trusted library allocation
page read and write
27C3000
trusted library allocation
page read and write
2465000
trusted library allocation
page read and write
4CE0000
trusted library section
page readonly
23D0000
trusted library allocation
page read and write
3581000
trusted library allocation
page read and write
2AD8000
trusted library allocation
page read and write
FB0000
heap
page read and write
7336000
heap
page read and write
4D50000
heap
page read and write
DF0000
heap
page read and write
2AAB000
trusted library allocation
page read and write
7D0000
heap
page read and write
9B3F000
stack
page read and write
2441000
trusted library allocation
page read and write
4AC0000
heap
page read and write
F90000
trusted library allocation
page read and write
9EBE000
stack
page read and write
5150000
heap
page execute and read and write
3752000
trusted library allocation
page read and write
7D8000
heap
page read and write
2989000
trusted library allocation
page read and write
2AC5000
trusted library allocation
page read and write
C82000
trusted library allocation
page read and write
EFF000
stack
page read and write
55EE000
heap
page read and write
4EA0000
trusted library allocation
page read and write
B30000
heap
page read and write
28F8000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page execute and read and write
6D6E000
stack
page read and write
652E000
stack
page read and write
There are 296 hidden memdumps, click here to show them.