IOC Report
Arrival Notice CIA INV.exe

loading gif

Files

File Path
Type
Category
Malicious
Arrival Notice CIA INV.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Arrival Notice CIA INV.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Arrival Notice CIA INV.exe
"C:\Users\user\Desktop\Arrival Notice CIA INV.exe"
malicious
C:\Users\user\Desktop\Arrival Notice CIA INV.exe
"C:\Users\user\Desktop\Arrival Notice CIA INV.exe"
malicious

URLs

Name
IP
Malicious
http://r3.o.lencr.org0
unknown
https://account.dyn.com/
unknown
http://fedcraw.org.za
unknown
http://mail.fedcraw.org.za
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://cps.root-x1.letsencrypt.org0
unknown
http://r3.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
mail.fedcraw.org.za
unknown
malicious
fedcraw.org.za
65.181.111.239

IPs

IP
Domain
Country
Malicious
65.181.111.239
fedcraw.org.za
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
3AEE000
trusted library allocation
page read and write
malicious
2CC1000
trusted library allocation
page read and write
malicious
2D10000
trusted library allocation
page read and write
malicious
2D3B000
trusted library allocation
page read and write
malicious
2B18000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
12BE000
stack
page read and write
64DD000
stack
page read and write
106F000
stack
page read and write
2AB0000
trusted library allocation
page execute and read and write
2AC0000
heap
page read and write
4DFE000
stack
page read and write
6D91000
trusted library allocation
page read and write
A9E000
stack
page read and write
2881000
trusted library allocation
page read and write
61F0000
trusted library allocation
page execute and read and write
2A60000
trusted library allocation
page read and write
6320000
trusted library allocation
page execute and read and write
D17000
trusted library allocation
page execute and read and write
2900000
heap
page execute and read and write
2D37000
trusted library allocation
page read and write
AE4000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
3CC1000
trusted library allocation
page read and write
2892000
trusted library allocation
page read and write
3919000
trusted library allocation
page read and write
2A85000
trusted library allocation
page execute and read and write
5191000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
B36000
heap
page read and write
661E000
stack
page read and write
51B4000
trusted library allocation
page read and write
61D0000
trusted library allocation
page read and write
6CD0000
heap
page read and write
D69000
stack
page read and write
2A76000
trusted library allocation
page execute and read and write
D1B000
trusted library allocation
page execute and read and write
3D27000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
62DE000
stack
page read and write
2911000
trusted library allocation
page read and write
55DC000
stack
page read and write
F70000
heap
page read and write
4EF3000
heap
page read and write
6A60000
trusted library allocation
page execute and read and write
5300000
heap
page read and write
2A8B000
trusted library allocation
page execute and read and write
517B000
trusted library allocation
page read and write
631E000
stack
page read and write
50C0000
heap
page read and write
5290000
heap
page execute and read and write
AF3000
trusted library allocation
page read and write
2D18000
trusted library allocation
page read and write
50F8000
heap
page read and write
28E0000
trusted library allocation
page read and write
5B9000
stack
page read and write
A10000
heap
page read and write
651E000
stack
page read and write
5020000
heap
page execute and read and write
F27000
heap
page read and write
AE3000
trusted library allocation
page execute and read and write
61E6000
trusted library allocation
page read and write
517E000
trusted library allocation
page read and write
F19000
heap
page read and write
548E000
stack
page read and write
52F0000
trusted library allocation
page read and write
4CFC000
stack
page read and write
B90000
heap
page read and write
DA0000
heap
page read and write
521C000
stack
page read and write
F00000
trusted library allocation
page read and write
D06000
trusted library allocation
page execute and read and write
4FF0000
trusted library allocation
page execute and read and write
866F000
stack
page read and write
B7E000
heap
page read and write
F20000
trusted library allocation
page execute and read and write
B2C000
heap
page read and write
2A6D000
trusted library allocation
page execute and read and write
490000
unkown
page readonly
86AE000
stack
page read and write
3911000
trusted library allocation
page read and write
B43000
heap
page read and write
66A8000
heap
page read and write
5D00000
trusted library section
page read and write
2BB0000
heap
page execute and read and write
5010000
trusted library allocation
page read and write
5154000
heap
page read and write
28C0000
trusted library allocation
page read and write
281E000
stack
page read and write
8F7000
stack
page read and write
5170000
trusted library allocation
page read and write
68DE000
stack
page read and write
EBE000
stack
page read and write
2B0E000
stack
page read and write
EF0000
heap
page read and write
B00000
heap
page read and write
D00000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
DE0000
heap
page read and write
286B000
trusted library allocation
page read and write
B45000
heap
page read and write
D0A000
trusted library allocation
page execute and read and write
492000
unkown
page readonly
2886000
trusted library allocation
page read and write
28B0000
trusted library allocation
page read and write
540D000
stack
page read and write
52A0000
heap
page read and write
6A50000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
66A0000
heap
page read and write
CFF000
stack
page read and write
82AE000
stack
page read and write
D80000
trusted library allocation
page execute and read and write
4D82000
trusted library allocation
page read and write
39B5000
trusted library allocation
page read and write
2CBE000
stack
page read and write
D12000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
B0E000
heap
page read and write
AFD000
trusted library allocation
page execute and read and write
4DC0000
heap
page read and write
2A72000
trusted library allocation
page read and write
2D4E000
trusted library allocation
page read and write
6240000
trusted library allocation
page read and write
2864000
trusted library allocation
page read and write
2D43000
trusted library allocation
page read and write
DC5000
heap
page read and write
4DD0000
trusted library section
page read and write
67DE000
stack
page read and write
6A1D000
stack
page read and write
AD0000
trusted library allocation
page read and write
4DE0000
heap
page read and write
2D52000
trusted library allocation
page read and write
286E000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
102E000
stack
page read and write
11A0000
heap
page read and write
518E000
trusted library allocation
page read and write
EF8000
heap
page read and write
51A2000
trusted library allocation
page read and write
AED000
trusted library allocation
page execute and read and write
D30000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
B08000
heap
page read and write
61C0000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
52EB000
stack
page read and write
623E000
stack
page read and write
826E000
stack
page read and write
1190000
trusted library allocation
page read and write
5196000
trusted library allocation
page read and write
519D000
trusted library allocation
page read and write
6330000
trusted library allocation
page read and write
2A82000
trusted library allocation
page read and write
61D7000
trusted library allocation
page read and write
5182000
trusted library allocation
page read and write
EFE000
stack
page read and write
F62000
heap
page read and write
4ECE000
stack
page read and write
1194000
trusted library allocation
page read and write
28A0000
trusted library allocation
page read and write
856F000
stack
page read and write
7F080000
trusted library allocation
page execute and read and write
87AE000
stack
page read and write
56DE000
stack
page read and write
3CE9000
trusted library allocation
page read and write
10AE000
stack
page read and write
2960000
trusted library allocation
page read and write
EC0000
heap
page read and write
3A03000
trusted library allocation
page read and write
A00000
heap
page read and write
28B5000
trusted library allocation
page read and write
633B000
trusted library allocation
page read and write
1180000
trusted library allocation
page read and write
28AF000
trusted library allocation
page read and write
DB0000
heap
page read and write
F0E000
trusted library allocation
page read and write
10FE000
stack
page read and write
51B0000
trusted library allocation
page read and write
2A7A000
trusted library allocation
page execute and read and write
1193000
trusted library allocation
page execute and read and write
6A70000
heap
page read and write
F24000
heap
page read and write
5140000
trusted library allocation
page read and write
285B000
stack
page read and write
2A80000
trusted library allocation
page read and write
119D000
trusted library allocation
page execute and read and write
4EF0000
heap
page read and write
5820000
trusted library allocation
page read and write
4A0C000
stack
page read and write
61CC000
trusted library allocation
page read and write
2D29000
trusted library allocation
page read and write
2A87000
trusted library allocation
page execute and read and write
F86000
heap
page read and write
2997000
trusted library allocation
page read and write
C6A000
stack
page read and write
2941000
trusted library allocation
page read and write
2969000
trusted library allocation
page read and write
6A40000
heap
page read and write
11B0000
heap
page read and write
66E2000
heap
page read and write
FD9000
heap
page read and write
4EE0000
trusted library section
page read and write
DA8000
heap
page read and write
287E000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
A5E000
stack
page read and write
2A70000
trusted library allocation
page read and write
3967000
trusted library allocation
page read and write
846E000
stack
page read and write
288D000
trusted library allocation
page read and write
D7E000
stack
page read and write
6FBE000
stack
page read and write
F05000
trusted library allocation
page read and write
2AA0000
trusted library allocation
page read and write
4D70000
heap
page read and write
DC0000
heap
page read and write
BCA000
heap
page read and write
529F000
stack
page read and write
2980000
trusted library allocation
page read and write
5828000
trusted library allocation
page read and write
4D90000
trusted library allocation
page execute and read and write
5000000
trusted library allocation
page execute and read and write
4D80000
trusted library allocation
page read and write
920000
heap
page read and write
5150000
heap
page read and write
691E000
stack
page read and write
There are 219 hidden memdumps, click here to show them.