Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
INQ No.KP-20-00-PS-PI-INQ-024-PDF.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Countee
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\INQ No.KP-20-00-PS-PI-INQ-024-PDF.exe
|
"C:\Users\user\Desktop\INQ No.KP-20-00-PS-PI-INQ-024-PDF.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\INQ No.KP-20-00-PS-PI-INQ-024-PDF.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://account.dyn.com/
|
unknown
|
||
http://r11.o.lencr.org0#
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://r11.i.lencr.org/0
|
unknown
|
||
http://srv.masternic.net
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
srv.masternic.net
|
174.141.234.138
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
174.141.234.138
|
srv.masternic.net
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2AEE000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
4670000
|
direct allocation
|
page read and write
|
||
2B18000
|
trusted library allocation
|
page read and write
|
||
2AA1000
|
trusted library allocation
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
||
418B000
|
heap
|
page read and write
|
||
3525000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
4F6B000
|
trusted library allocation
|
page read and write
|
||
3B09000
|
trusted library allocation
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
4820000
|
direct allocation
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
D87000
|
trusted library allocation
|
page execute and read and write
|
||
4943000
|
direct allocation
|
page read and write
|
||
4139000
|
heap
|
page read and write
|
||
4AE9000
|
direct allocation
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
60BD000
|
stack
|
page read and write
|
||
4150000
|
heap
|
page read and write
|
||
5FDE000
|
stack
|
page read and write
|
||
4AED000
|
direct allocation
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2B20000
|
trusted library allocation
|
page read and write
|
||
418B000
|
heap
|
page read and write
|
||
3383000
|
heap
|
page read and write
|
||
406F000
|
stack
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
EC6000
|
heap
|
page read and write
|
||
4AED000
|
direct allocation
|
page read and write
|
||
D53000
|
trusted library allocation
|
page execute and read and write
|
||
40FA000
|
heap
|
page read and write
|
||
6710000
|
heap
|
page read and write
|
||
560E000
|
stack
|
page read and write
|
||
F59000
|
heap
|
page read and write
|
||
418B000
|
heap
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page execute and read and write
|
||
11A0000
|
heap
|
page read and write
|
||
5013000
|
heap
|
page read and write
|
||
418B000
|
heap
|
page read and write
|
||
2A70000
|
trusted library allocation
|
page read and write
|
||
4271000
|
heap
|
page read and write
|
||
D8B000
|
trusted library allocation
|
page execute and read and write
|
||
D70000
|
trusted library allocation
|
page read and write
|
||
57E7000
|
trusted library allocation
|
page read and write
|
||
4F6E000
|
trusted library allocation
|
page read and write
|
||
10E8000
|
trusted library allocation
|
page read and write
|
||
66BE000
|
stack
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
1BD0000
|
heap
|
page read and write
|
||
2B07000
|
trusted library allocation
|
page read and write
|
||
D7A000
|
trusted library allocation
|
page execute and read and write
|
||
9C0000
|
heap
|
page read and write
|
||
3AA1000
|
trusted library allocation
|
page read and write
|
||
124E000
|
stack
|
page read and write
|
||
4943000
|
direct allocation
|
page read and write
|
||
D82000
|
trusted library allocation
|
page read and write
|
||
D5D000
|
trusted library allocation
|
page execute and read and write
|
||
4F92000
|
trusted library allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
548E000
|
stack
|
page read and write
|
||
1A90000
|
heap
|
page read and write
|
||
4B5E000
|
direct allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
1A8E000
|
stack
|
page read and write
|
||
3520000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
164F000
|
stack
|
page read and write
|
||
EC4000
|
heap
|
page read and write
|
||
4820000
|
direct allocation
|
page read and write
|
||
4AE9000
|
direct allocation
|
page read and write
|
||
6A60000
|
heap
|
page read and write
|
||
A8E000
|
heap
|
page read and write
|
||
4AED000
|
direct allocation
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
4AE9000
|
direct allocation
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
4943000
|
direct allocation
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
3AC9000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
A5A000
|
heap
|
page read and write
|
||
419B000
|
heap
|
page read and write
|
||
57D0000
|
trusted library allocation
|
page execute and read and write
|
||
2B14000
|
trusted library allocation
|
page read and write
|
||
4672000
|
heap
|
page read and write
|
||
4110000
|
heap
|
page read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
42D9000
|
heap
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
4276000
|
heap
|
page read and write
|
||
4AED000
|
direct allocation
|
page read and write
|
||
4273000
|
heap
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
418B000
|
heap
|
page read and write
|
||
65BE000
|
stack
|
page read and write
|
||
5230000
|
heap
|
page execute and read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
418B000
|
heap
|
page read and write
|
||
4820000
|
direct allocation
|
page read and write
|
||
418B000
|
heap
|
page read and write
|
||
10DE000
|
stack
|
page read and write
|
||
4AE9000
|
direct allocation
|
page read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
5EA6000
|
heap
|
page read and write
|
||
4F7A000
|
trusted library allocation
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
4F72000
|
trusted library allocation
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
1BC0000
|
heap
|
page read and write
|
||
7F4C0000
|
trusted library allocation
|
page execute and read and write
|
||
4AE9000
|
direct allocation
|
page read and write
|
||
EBA000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
415C000
|
heap
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
CF8000
|
stack
|
page read and write
|
||
4B5E000
|
direct allocation
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
6720000
|
trusted library allocation
|
page execute and read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
4070000
|
heap
|
page read and write
|
||
D54000
|
trusted library allocation
|
page read and write
|
||
5120000
|
heap
|
page read and write
|
||
4F66000
|
trusted library allocation
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
94A000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
41D1000
|
heap
|
page read and write
|
||
4820000
|
direct allocation
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
533C000
|
stack
|
page read and write
|
||
42D9000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
4BDD000
|
stack
|
page read and write
|
||
5010000
|
heap
|
page read and write
|
||
4F81000
|
trusted library allocation
|
page read and write
|
||
4272000
|
heap
|
page execute and read and write
|
||
472D000
|
heap
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
418B000
|
heap
|
page read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
EAE000
|
heap
|
page read and write
|
||
418B000
|
heap
|
page read and write
|
||
4B5E000
|
direct allocation
|
page read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
419B000
|
heap
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
5768000
|
trusted library allocation
|
page read and write
|
||
627D000
|
stack
|
page read and write
|
||
D85000
|
trusted library allocation
|
page execute and read and write
|
||
4B5E000
|
direct allocation
|
page read and write
|
||
607E000
|
stack
|
page read and write
|
||
5EA0000
|
heap
|
page read and write
|
||
5EB0000
|
heap
|
page read and write
|
||
4F7E000
|
trusted library allocation
|
page read and write
|
||
418B000
|
heap
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
418B000
|
heap
|
page read and write
|
||
500C000
|
stack
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
60C0000
|
trusted library allocation
|
page read and write
|
||
5F28000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
1B21000
|
heap
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
D6D000
|
trusted library allocation
|
page execute and read and write
|
||
4AED000
|
direct allocation
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
DA5000
|
heap
|
page read and write
|
||
4120000
|
heap
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
4ADC000
|
stack
|
page read and write
|
||
40F4000
|
heap
|
page read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
41A4000
|
heap
|
page read and write
|
||
4F86000
|
trusted library allocation
|
page read and write
|
||
2AEC000
|
trusted library allocation
|
page read and write
|
||
105000
|
heap
|
page read and write
|
||
F6B000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
4F64000
|
trusted library allocation
|
page read and write
|
||
4943000
|
direct allocation
|
page read and write
|
||
418B000
|
heap
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page execute and read and write
|
||
418B000
|
heap
|
page read and write
|
||
4820000
|
direct allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
4AE9000
|
direct allocation
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
579C000
|
trusted library allocation
|
page read and write
|
||
D72000
|
trusted library allocation
|
page read and write
|
||
F89000
|
heap
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
1A4F000
|
stack
|
page read and write
|
||
D76000
|
trusted library allocation
|
page execute and read and write
|
||
4820000
|
direct allocation
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
4943000
|
direct allocation
|
page read and write
|
||
5FE0000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
F33000
|
heap
|
page read and write
|
||
4270000
|
heap
|
page read and write
|
||
4F8D000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
4B5E000
|
direct allocation
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
4AED000
|
direct allocation
|
page read and write
|
||
4943000
|
direct allocation
|
page read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
418B000
|
heap
|
page read and write
|
||
1A91000
|
heap
|
page read and write
|
||
4B5E000
|
direct allocation
|
page read and write
|
||
55CE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2A90000
|
heap
|
page execute and read and write
|
||
E98000
|
heap
|
page read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
570E000
|
stack
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
There are 228 hidden memdumps, click here to show them.