IOC Report
rinvoice.exe

loading gif

Files

File Path
Type
Category
Malicious
rinvoice.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\aut183A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut186A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\caprone
data
dropped
C:\Users\user\AppData\Local\Temp\undiscernibly
ASCII text, with very long lines (28756), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rinvoice.exe
"C:\Users\user\Desktop\rinvoice.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\rinvoice.exe"
malicious

URLs

Name
IP
Malicious
http://r3.o.lencr.org0
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://mail.uniform.gr
unknown
http://r3.i.lencr.org/0#
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
mail.uniform.gr
185.25.23.138
malicious
ip-api.com
208.95.112.1
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
185.25.23.138
mail.uniform.gr
Greece
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3A71000
trusted library allocation
page read and write
malicious
271F000
heap
page read and write
malicious
29E0000
trusted library section
page read and write
malicious
2AA2000
trusted library allocation
page read and write
malicious
2ACE000
trusted library allocation
page read and write
malicious
2AF1000
trusted library allocation
page read and write
malicious
4F50000
trusted library section
page read and write
malicious
2832000
trusted library allocation
page read and write
2510000
trusted library allocation
page read and write
3B76000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
24E3000
trusted library allocation
page read and write
170E000
stack
page read and write
6930000
heap
page read and write
EA0000
direct allocation
page read and write
A30000
heap
page read and write
2826000
trusted library allocation
page read and write
2AF9000
trusted library allocation
page read and write
A60000
heap
page read and write
FAC000
heap
page read and write
39E9000
direct allocation
page read and write
82F000
unkown
page readonly
39ED000
direct allocation
page read and write
4FF0000
heap
page read and write
7A1000
unkown
page execute read
FAA000
heap
page read and write
DF0000
heap
page read and write
FB8000
heap
page read and write
3B34000
trusted library allocation
page read and write
532C000
stack
page read and write
109A000
heap
page read and write
29DE000
stack
page read and write
10CE000
heap
page read and write
C8F000
stack
page read and write
6580000
trusted library allocation
page read and write
3893000
direct allocation
page read and write
5770000
heap
page read and write
283A000
trusted library allocation
page read and write
82F000
unkown
page readonly
1B0E000
stack
page read and write
863000
unkown
page write copy
7A0000
unkown
page readonly
8F8000
stack
page read and write
28C0000
trusted library allocation
page read and write
24FA000
trusted library allocation
page execute and read and write
4C0D000
stack
page read and write
426000
system
page execute and read and write
6450000
trusted library allocation
page read and write
10C9000
heap
page read and write
24D4000
trusted library allocation
page read and write
24ED000
trusted library allocation
page execute and read and write
39ED000
direct allocation
page read and write
BB0000
trusted library section
page read and write
3A39000
direct allocation
page read and write
BC0000
heap
page read and write
3A3D000
direct allocation
page read and write
24F0000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
7A0000
unkown
page readonly
3A3D000
direct allocation
page read and write
5EA000
stack
page read and write
2A60000
heap
page execute and read and write
3770000
direct allocation
page read and write
284D000
trusted library allocation
page read and write
F10000
heap
page read and write
D0D000
stack
page read and write
632E000
stack
page read and write
3843000
direct allocation
page read and write
F4B000
heap
page read and write
3770000
direct allocation
page read and write
CCD000
stack
page read and write
5790000
trusted library allocation
page read and write
64A7000
trusted library allocation
page read and write
7FB40000
trusted library allocation
page execute and read and write
3770000
direct allocation
page read and write
4FDD000
trusted library allocation
page read and write
2517000
trusted library allocation
page execute and read and write
6430000
trusted library allocation
page execute and read and write
3A5E000
direct allocation
page read and write
3720000
direct allocation
page read and write
855000
unkown
page readonly
855000
unkown
page readonly
3A5E000
direct allocation
page read and write
61ED000
stack
page read and write
5780000
trusted library allocation
page execute and read and write
DD0000
direct allocation
page execute and read and write
5470000
heap
page read and write
5488000
heap
page read and write
3843000
direct allocation
page read and write
2587000
heap
page read and write
536E000
stack
page read and write
3A3D000
direct allocation
page read and write
1095000
heap
page read and write
3AAE000
direct allocation
page read and write
28BE000
stack
page read and write
522C000
stack
page read and write
653E000
stack
page read and write
102B000
heap
page read and write
257E000
stack
page read and write
3893000
direct allocation
page read and write
2870000
heap
page read and write
3A39000
direct allocation
page read and write
24D0000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
2A71000
trusted library allocation
page read and write
DB0000
heap
page read and write
24C0000
trusted library allocation
page read and write
28D0000
heap
page read and write
546E000
stack
page read and write
38C0000
direct allocation
page read and write
283E000
trusted library allocation
page read and write
2500000
heap
page read and write
FB8000
heap
page read and write
2846000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
F4E000
heap
page read and write
4A78000
trusted library allocation
page read and write
2512000
trusted library allocation
page read and write
56ED000
stack
page read and write
3AAE000
direct allocation
page read and write
C6C000
heap
page read and write
54B2000
heap
page read and write
2B01000
trusted library allocation
page read and write
FB8000
heap
page read and write
282B000
trusted library allocation
page read and write
FB8000
heap
page read and write
282E000
trusted library allocation
page read and write
A50000
trusted library section
page read and write
FB8000
heap
page read and write
F4E000
heap
page read and write
6440000
trusted library allocation
page read and write
10C9000
heap
page read and write
E90000
heap
page read and write
F91000
heap
page read and write
85F000
unkown
page write copy
2530000
trusted library allocation
page read and write
2820000
trusted library allocation
page read and write
649E000
stack
page read and write
56AF000
stack
page read and write
CAB000
stack
page read and write
51EE000
stack
page read and write
6B0000
heap
page read and write
10B9000
heap
page read and write
FD8000
heap
page read and write
85F000
unkown
page read and write
39E9000
direct allocation
page read and write
10B9000
heap
page read and write
3893000
direct allocation
page read and write
3A5E000
direct allocation
page read and write
39E9000
direct allocation
page read and write
109A000
heap
page read and write
24F2000
trusted library allocation
page read and write
F18000
heap
page read and write
24A0000
heap
page read and write
3910000
direct allocation
page read and write
4FE0000
heap
page execute and read and write
3843000
direct allocation
page read and write
2580000
heap
page read and write
24E0000
trusted library allocation
page read and write
BFC000
heap
page read and write
25E0000
trusted library allocation
page read and write
2841000
trusted library allocation
page read and write
445000
system
page execute and read and write
3AAE000
direct allocation
page read and write
55AE000
stack
page read and write
24F6000
trusted library allocation
page execute and read and write
6590000
trusted library allocation
page read and write
400000
system
page execute and read and write
FB9000
heap
page read and write
C46000
heap
page read and write
2515000
trusted library allocation
page execute and read and write
C9F000
stack
page read and write
F4E000
heap
page read and write
642D000
stack
page read and write
104D000
heap
page read and write
6910000
trusted library allocation
page execute and read and write
25F0000
heap
page read and write
24DD000
trusted library allocation
page execute and read and write
BEF000
heap
page read and write
C32000
heap
page read and write
10AA000
heap
page read and write
790000
heap
page read and write
950000
heap
page read and write
659000
stack
page read and write
D4E000
stack
page read and write
2860000
trusted library allocation
page read and write
3720000
direct allocation
page read and write
2810000
trusted library allocation
page read and write
25D0000
trusted library allocation
page execute and read and write
2ACC000
trusted library allocation
page read and write
3A39000
direct allocation
page read and write
251B000
trusted library allocation
page execute and read and write
3910000
direct allocation
page read and write
F43000
heap
page read and write
BF9000
heap
page read and write
5E4E000
stack
page read and write
7A1000
unkown
page execute read
38C0000
direct allocation
page read and write
A65000
heap
page read and write
39ED000
direct allocation
page read and write
6458000
trusted library allocation
page read and write
F42000
heap
page read and write
868000
unkown
page readonly
38C0000
direct allocation
page read and write
C2A000
heap
page read and write
E94000
heap
page read and write
3910000
direct allocation
page read and write
FAB000
heap
page read and write
BC8000
heap
page read and write
3720000
direct allocation
page read and write
2AED000
trusted library allocation
page read and write
1C30000
heap
page read and write
25CC000
stack
page read and write
64A0000
trusted library allocation
page read and write
2503000
heap
page read and write
FB8000
heap
page read and write
868000
unkown
page readonly
24D3000
trusted library allocation
page execute and read and write
62EF000
stack
page read and write
6C10000
heap
page read and write
FAB000
heap
page read and write
There are 211 hidden memdumps, click here to show them.