Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Arba Outstanding Statement.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Idonna
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut8131.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut8181.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\reaffection
|
ASCII text, with very long lines (28708), with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Arba Outstanding Statement.exe
|
"C:\Users\user\Desktop\Arba Outstanding Statement.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\Arba Outstanding Statement.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
104.26.12.205
|
||
https://api.ipify.org
|
unknown
|
||
https://sectigo.com/CPS
|
unknown
|
||
http://kino2.top
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://mail.kino2.top
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.kino2.top
|
unknown
|
||
api.ipify.org
|
104.26.12.205
|
||
kino2.top
|
185.244.151.84
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.26.12.205
|
api.ipify.org
|
United States
|
||
185.244.151.84
|
kino2.top
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5530000
|
trusted library section
|
page read and write
|
||
D90000
|
direct allocation
|
page read and write
|
||
55F0000
|
trusted library section
|
page read and write
|
||
3237000
|
trusted library allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
322F000
|
trusted library allocation
|
page read and write
|
||
2CDF000
|
heap
|
page read and write
|
||
3204000
|
trusted library allocation
|
page read and write
|
||
41B1000
|
trusted library allocation
|
page read and write
|
||
3200000
|
trusted library allocation
|
page read and write
|
||
2C36000
|
trusted library allocation
|
page execute and read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
38D9000
|
direct allocation
|
page read and write
|
||
37B0000
|
direct allocation
|
page read and write
|
||
6A5E000
|
stack
|
page read and write
|
||
3610000
|
direct allocation
|
page read and write
|
||
394E000
|
direct allocation
|
page read and write
|
||
2C45000
|
trusted library allocation
|
page execute and read and write
|
||
5A7C000
|
stack
|
page read and write
|
||
E5000
|
unkown
|
page readonly
|
||
65A000
|
stack
|
page read and write
|
||
31000
|
unkown
|
page execute read
|
||
2C40000
|
trusted library allocation
|
page read and write
|
||
E7B000
|
heap
|
page read and write
|
||
2EB3000
|
heap
|
page read and write
|
||
64DE000
|
stack
|
page read and write
|
||
37B0000
|
direct allocation
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
EE5000
|
heap
|
page read and write
|
||
6AB0000
|
trusted library allocation
|
page read and write
|
||
38DD000
|
direct allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
38D9000
|
direct allocation
|
page read and write
|
||
5590000
|
trusted library allocation
|
page read and write
|
||
FD7000
|
heap
|
page read and write
|
||
6F90000
|
heap
|
page read and write
|
||
3610000
|
direct allocation
|
page read and write
|
||
394E000
|
direct allocation
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
38DD000
|
direct allocation
|
page read and write
|
||
3610000
|
direct allocation
|
page read and write
|
||
550E000
|
trusted library allocation
|
page read and write
|
||
2C2D000
|
trusted library allocation
|
page execute and read and write
|
||
E5000
|
unkown
|
page readonly
|
||
3010000
|
trusted library allocation
|
page read and write
|
||
6AFE000
|
stack
|
page read and write
|
||
EE5000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
A3B000
|
stack
|
page read and write
|
||
5BBE000
|
stack
|
page read and write
|
||
D40000
|
direct allocation
|
page execute and read and write
|
||
FE5000
|
heap
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
42AF000
|
trusted library allocation
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
E48000
|
heap
|
page read and write
|
||
3733000
|
direct allocation
|
page read and write
|
||
31000
|
unkown
|
page execute read
|
||
EDB000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page execute and read and write
|
||
54F6000
|
trusted library allocation
|
page read and write
|
||
EE5000
|
heap
|
page read and write
|
||
2C3A000
|
trusted library allocation
|
page execute and read and write
|
||
7F270000
|
trusted library allocation
|
page execute and read and write
|
||
F8000
|
unkown
|
page readonly
|
||
2C20000
|
trusted library allocation
|
page read and write
|
||
2C1D000
|
trusted library allocation
|
page execute and read and write
|
||
54FE000
|
trusted library allocation
|
page read and write
|
||
550A000
|
trusted library allocation
|
page read and write
|
||
3610000
|
direct allocation
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
F3000
|
unkown
|
page write copy
|
||
BF000
|
unkown
|
page readonly
|
||
E74000
|
heap
|
page read and write
|
||
5858000
|
heap
|
page read and write
|
||
F8000
|
unkown
|
page readonly
|
||
1134000
|
heap
|
page read and write
|
||
31EA000
|
trusted library allocation
|
page read and write
|
||
394E000
|
direct allocation
|
page read and write
|
||
FB8000
|
heap
|
page read and write
|
||
2DC8000
|
trusted library allocation
|
page read and write
|
||
38D9000
|
direct allocation
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
38D9000
|
direct allocation
|
page read and write
|
||
5BFE000
|
stack
|
page read and write
|
||
5861000
|
heap
|
page read and write
|
||
5CFE000
|
stack
|
page read and write
|
||
F05000
|
heap
|
page read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
E72000
|
heap
|
page read and write
|
||
6B8F000
|
stack
|
page read and write
|
||
EE5000
|
heap
|
page read and write
|
||
FF7000
|
heap
|
page read and write
|
||
5502000
|
trusted library allocation
|
page read and write
|
||
5780000
|
heap
|
page read and write
|
||
394E000
|
direct allocation
|
page read and write
|
||
5880000
|
heap
|
page read and write
|
||
57EE000
|
heap
|
page read and write
|
||
5511000
|
trusted library allocation
|
page read and write
|
||
FC8000
|
heap
|
page read and write
|
||
5DC0000
|
heap
|
page read and write
|
||
6BD7000
|
trusted library allocation
|
page read and write
|
||
EE5000
|
heap
|
page read and write
|
||
2C23000
|
trusted library allocation
|
page read and write
|
||
38DD000
|
direct allocation
|
page read and write
|
||
7260000
|
heap
|
page read and write
|
||
322B000
|
trusted library allocation
|
page read and write
|
||
3020000
|
trusted library allocation
|
page read and write
|
||
322D000
|
trusted library allocation
|
page read and write
|
||
5E1D000
|
stack
|
page read and write
|
||
6BD0000
|
trusted library allocation
|
page read and write
|
||
582F000
|
heap
|
page read and write
|
||
FB8000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
E7B000
|
heap
|
page read and write
|
||
111C000
|
heap
|
page read and write
|
||
37B0000
|
direct allocation
|
page read and write
|
||
5ABE000
|
stack
|
page read and write
|
||
FF7000
|
heap
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
EE5000
|
heap
|
page read and write
|
||
2BE0000
|
trusted library section
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
695E000
|
stack
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
38DD000
|
direct allocation
|
page read and write
|
||
3733000
|
direct allocation
|
page read and write
|
||
2C14000
|
trusted library allocation
|
page read and write
|
||
578A000
|
heap
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
3733000
|
direct allocation
|
page read and write
|
||
A5C000
|
stack
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
163F000
|
stack
|
page read and write
|
||
54FB000
|
trusted library allocation
|
page read and write
|
||
FE8000
|
heap
|
page read and write
|
||
3610000
|
direct allocation
|
page read and write
|
||
6A94000
|
trusted library allocation
|
page read and write
|
||
55EC000
|
stack
|
page read and write
|
||
31000
|
unkown
|
page execute read
|
||
5784000
|
heap
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
3733000
|
direct allocation
|
page read and write
|
||
578E000
|
heap
|
page read and write
|
||
BF000
|
unkown
|
page readonly
|
||
2CB7000
|
heap
|
page read and write
|
||
2C4B000
|
trusted library allocation
|
page execute and read and write
|
||
5890000
|
heap
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
1119000
|
heap
|
page read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
31B1000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
426000
|
system
|
page execute and read and write
|
||
FC9000
|
heap
|
page read and write
|
||
3733000
|
direct allocation
|
page read and write
|
||
FB5000
|
heap
|
page read and write
|
||
10E8000
|
heap
|
page read and write
|
||
37B0000
|
direct allocation
|
page read and write
|
||
57E3000
|
heap
|
page read and write
|
||
1139000
|
heap
|
page read and write
|
||
2C42000
|
trusted library allocation
|
page read and write
|
||
31DE000
|
stack
|
page read and write
|
||
EF000
|
unkown
|
page read and write
|
||
30000
|
unkown
|
page readonly
|
||
394E000
|
direct allocation
|
page read and write
|
||
A2E000
|
stack
|
page read and write
|
||
38D9000
|
direct allocation
|
page read and write
|
||
3610000
|
direct allocation
|
page read and write
|
||
2BF0000
|
trusted library section
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
394E000
|
direct allocation
|
page read and write
|
||
5516000
|
trusted library allocation
|
page read and write
|
||
6A88000
|
trusted library allocation
|
page read and write
|
||
57A0000
|
heap
|
page read and write
|
||
37B0000
|
direct allocation
|
page read and write
|
||
5D3D000
|
stack
|
page read and write
|
||
EE6000
|
heap
|
page read and write
|
||
2C30000
|
trusted library allocation
|
page read and write
|
||
5670000
|
heap
|
page execute and read and write
|
||
BD0000
|
heap
|
page read and write
|
||
38DD000
|
direct allocation
|
page read and write
|
||
2C32000
|
trusted library allocation
|
page read and write
|
||
691F000
|
stack
|
page read and write
|
||
1188000
|
heap
|
page read and write
|
||
FD7000
|
heap
|
page read and write
|
||
2C13000
|
trusted library allocation
|
page execute and read and write
|
||
551D000
|
trusted library allocation
|
page read and write
|
||
EF000
|
unkown
|
page write copy
|
||
E3A000
|
stack
|
page read and write
|
||
2FC0000
|
trusted library allocation
|
page read and write
|
||
2C47000
|
trusted library allocation
|
page execute and read and write
|
||
FC8000
|
heap
|
page read and write
|
||
37B0000
|
direct allocation
|
page read and write
|
||
2E9C000
|
stack
|
page read and write
|
||
31F3000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
6A90000
|
trusted library allocation
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
5808000
|
heap
|
page read and write
|
||
38D9000
|
direct allocation
|
page read and write
|
||
6AA0000
|
trusted library allocation
|
page execute and read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
315E000
|
stack
|
page read and write
|
||
445000
|
system
|
page execute and read and write
|
||
E80000
|
heap
|
page read and write
|
||
5DD0000
|
trusted library allocation
|
page execute and read and write
|
||
5660000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
577E000
|
stack
|
page read and write
|
||
CAE000
|
stack
|
page read and write
|
||
30000
|
unkown
|
page readonly
|
||
32E8000
|
trusted library allocation
|
page read and write
|
||
FE8000
|
heap
|
page read and write
|
||
566D000
|
trusted library allocation
|
page read and write
|
||
F38000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
EE5000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page execute and read and write
|
||
6BE0000
|
trusted library allocation
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
E58000
|
heap
|
page read and write
|
||
2EA0000
|
trusted library allocation
|
page execute and read and write
|
||
EC0000
|
heap
|
page read and write
|
||
3733000
|
direct allocation
|
page read and write
|
||
4273000
|
trusted library allocation
|
page read and write
|
||
3243000
|
trusted library allocation
|
page read and write
|
||
38DD000
|
direct allocation
|
page read and write
|
There are 225 hidden memdumps, click here to show them.