IOC Report
Arba Outstanding Statement.exe

loading gif

Files

File Path
Type
Category
Malicious
Arba Outstanding Statement.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Idonna
data
dropped
C:\Users\user\AppData\Local\Temp\aut8131.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut8181.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\reaffection
ASCII text, with very long lines (28708), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Arba Outstanding Statement.exe
"C:\Users\user\Desktop\Arba Outstanding Statement.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\Arba Outstanding Statement.exe"
malicious

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.12.205
https://api.ipify.org
unknown
https://sectigo.com/CPS
unknown
http://kino2.top
unknown
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://mail.kino2.top
unknown

Domains

Name
IP
Malicious
mail.kino2.top
unknown
malicious
api.ipify.org
104.26.12.205
kino2.top
185.244.151.84

IPs

IP
Domain
Country
Malicious
104.26.12.205
api.ipify.org
United States
185.244.151.84
kino2.top
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5530000
trusted library section
page read and write
malicious
D90000
direct allocation
page read and write
malicious
55F0000
trusted library section
page read and write
malicious
3237000
trusted library allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
322F000
trusted library allocation
page read and write
malicious
2CDF000
heap
page read and write
malicious
3204000
trusted library allocation
page read and write
malicious
41B1000
trusted library allocation
page read and write
malicious
3200000
trusted library allocation
page read and write
2C36000
trusted library allocation
page execute and read and write
54F0000
trusted library allocation
page read and write
38D9000
direct allocation
page read and write
37B0000
direct allocation
page read and write
6A5E000
stack
page read and write
3610000
direct allocation
page read and write
394E000
direct allocation
page read and write
2C45000
trusted library allocation
page execute and read and write
5A7C000
stack
page read and write
E5000
unkown
page readonly
65A000
stack
page read and write
31000
unkown
page execute read
2C40000
trusted library allocation
page read and write
E7B000
heap
page read and write
2EB3000
heap
page read and write
64DE000
stack
page read and write
37B0000
direct allocation
page read and write
AB0000
heap
page read and write
EE5000
heap
page read and write
6AB0000
trusted library allocation
page read and write
38DD000
direct allocation
page read and write
FB0000
heap
page read and write
38D9000
direct allocation
page read and write
5590000
trusted library allocation
page read and write
FD7000
heap
page read and write
6F90000
heap
page read and write
3610000
direct allocation
page read and write
394E000
direct allocation
page read and write
1110000
heap
page read and write
38DD000
direct allocation
page read and write
3610000
direct allocation
page read and write
550E000
trusted library allocation
page read and write
2C2D000
trusted library allocation
page execute and read and write
E5000
unkown
page readonly
3010000
trusted library allocation
page read and write
6AFE000
stack
page read and write
EE5000
heap
page read and write
3050000
heap
page read and write
A3B000
stack
page read and write
5BBE000
stack
page read and write
D40000
direct allocation
page execute and read and write
FE5000
heap
page read and write
6A80000
trusted library allocation
page read and write
42AF000
trusted library allocation
page read and write
E80000
heap
page read and write
E48000
heap
page read and write
3733000
direct allocation
page read and write
31000
unkown
page execute read
EDB000
heap
page read and write
31A0000
heap
page execute and read and write
54F6000
trusted library allocation
page read and write
EE5000
heap
page read and write
2C3A000
trusted library allocation
page execute and read and write
7F270000
trusted library allocation
page execute and read and write
F8000
unkown
page readonly
2C20000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page execute and read and write
54FE000
trusted library allocation
page read and write
550A000
trusted library allocation
page read and write
3610000
direct allocation
page read and write
FD8000
heap
page read and write
F3000
unkown
page write copy
BF000
unkown
page readonly
E74000
heap
page read and write
5858000
heap
page read and write
F8000
unkown
page readonly
1134000
heap
page read and write
31EA000
trusted library allocation
page read and write
394E000
direct allocation
page read and write
FB8000
heap
page read and write
2DC8000
trusted library allocation
page read and write
38D9000
direct allocation
page read and write
2FD0000
heap
page read and write
38D9000
direct allocation
page read and write
5BFE000
stack
page read and write
5861000
heap
page read and write
5CFE000
stack
page read and write
F05000
heap
page read and write
2CAE000
stack
page read and write
E72000
heap
page read and write
6B8F000
stack
page read and write
EE5000
heap
page read and write
FF7000
heap
page read and write
5502000
trusted library allocation
page read and write
5780000
heap
page read and write
394E000
direct allocation
page read and write
5880000
heap
page read and write
57EE000
heap
page read and write
5511000
trusted library allocation
page read and write
FC8000
heap
page read and write
5DC0000
heap
page read and write
6BD7000
trusted library allocation
page read and write
EE5000
heap
page read and write
2C23000
trusted library allocation
page read and write
38DD000
direct allocation
page read and write
7260000
heap
page read and write
322B000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
322D000
trusted library allocation
page read and write
5E1D000
stack
page read and write
6BD0000
trusted library allocation
page read and write
582F000
heap
page read and write
FB8000
heap
page read and write
C60000
heap
page read and write
E7B000
heap
page read and write
111C000
heap
page read and write
37B0000
direct allocation
page read and write
5ABE000
stack
page read and write
FF7000
heap
page read and write
BCE000
stack
page read and write
EE5000
heap
page read and write
2BE0000
trusted library section
page read and write
2C60000
trusted library allocation
page read and write
695E000
stack
page read and write
10D0000
heap
page read and write
38DD000
direct allocation
page read and write
3733000
direct allocation
page read and write
2C14000
trusted library allocation
page read and write
578A000
heap
page read and write
319E000
stack
page read and write
3733000
direct allocation
page read and write
A5C000
stack
page read and write
E40000
heap
page read and write
163F000
stack
page read and write
54FB000
trusted library allocation
page read and write
FE8000
heap
page read and write
3610000
direct allocation
page read and write
6A94000
trusted library allocation
page read and write
55EC000
stack
page read and write
31000
unkown
page execute read
5784000
heap
page read and write
FD8000
heap
page read and write
3733000
direct allocation
page read and write
578E000
heap
page read and write
BF000
unkown
page readonly
2CB7000
heap
page read and write
2C4B000
trusted library allocation
page execute and read and write
5890000
heap
page read and write
A1F000
stack
page read and write
1119000
heap
page read and write
2C10000
trusted library allocation
page read and write
31B1000
trusted library allocation
page read and write
D80000
heap
page read and write
C40000
heap
page read and write
426000
system
page execute and read and write
FC9000
heap
page read and write
3733000
direct allocation
page read and write
FB5000
heap
page read and write
10E8000
heap
page read and write
37B0000
direct allocation
page read and write
57E3000
heap
page read and write
1139000
heap
page read and write
2C42000
trusted library allocation
page read and write
31DE000
stack
page read and write
EF000
unkown
page read and write
30000
unkown
page readonly
394E000
direct allocation
page read and write
A2E000
stack
page read and write
38D9000
direct allocation
page read and write
3610000
direct allocation
page read and write
2BF0000
trusted library section
page read and write
C50000
heap
page read and write
394E000
direct allocation
page read and write
5516000
trusted library allocation
page read and write
6A88000
trusted library allocation
page read and write
57A0000
heap
page read and write
37B0000
direct allocation
page read and write
5D3D000
stack
page read and write
EE6000
heap
page read and write
2C30000
trusted library allocation
page read and write
5670000
heap
page execute and read and write
BD0000
heap
page read and write
38DD000
direct allocation
page read and write
2C32000
trusted library allocation
page read and write
691F000
stack
page read and write
1188000
heap
page read and write
FD7000
heap
page read and write
2C13000
trusted library allocation
page execute and read and write
551D000
trusted library allocation
page read and write
EF000
unkown
page write copy
E3A000
stack
page read and write
2FC0000
trusted library allocation
page read and write
2C47000
trusted library allocation
page execute and read and write
FC8000
heap
page read and write
37B0000
direct allocation
page read and write
2E9C000
stack
page read and write
31F3000
trusted library allocation
page read and write
2FE0000
heap
page read and write
2EB0000
heap
page read and write
6A90000
trusted library allocation
page read and write
2AD0000
heap
page read and write
5808000
heap
page read and write
38D9000
direct allocation
page read and write
6AA0000
trusted library allocation
page execute and read and write
6F60000
trusted library allocation
page read and write
315E000
stack
page read and write
445000
system
page execute and read and write
E80000
heap
page read and write
5DD0000
trusted library allocation
page execute and read and write
5660000
trusted library allocation
page read and write
10E0000
heap
page read and write
E80000
heap
page read and write
3030000
trusted library allocation
page read and write
2FBE000
stack
page read and write
577E000
stack
page read and write
CAE000
stack
page read and write
30000
unkown
page readonly
32E8000
trusted library allocation
page read and write
FE8000
heap
page read and write
566D000
trusted library allocation
page read and write
F38000
stack
page read and write
C44000
heap
page read and write
EE5000
heap
page read and write
2CB0000
heap
page read and write
6F50000
trusted library allocation
page execute and read and write
6BE0000
trusted library allocation
page read and write
2C00000
trusted library allocation
page read and write
FA0000
heap
page read and write
E58000
heap
page read and write
2EA0000
trusted library allocation
page execute and read and write
EC0000
heap
page read and write
3733000
direct allocation
page read and write
4273000
trusted library allocation
page read and write
3243000
trusted library allocation
page read and write
38DD000
direct allocation
page read and write
There are 225 hidden memdumps, click here to show them.