IOC Report
INQ No.KP-20-00-PS-PI-INQ-024-PDF.exe

loading gif

Files

File Path
Type
Category
Malicious
INQ No.KP-20-00-PS-PI-INQ-024-PDF.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Countee
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\INQ No.KP-20-00-PS-PI-INQ-024-PDF.exe
"C:\Users\user\Desktop\INQ No.KP-20-00-PS-PI-INQ-024-PDF.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\INQ No.KP-20-00-PS-PI-INQ-024-PDF.exe"
malicious

URLs

Name
IP
Malicious
https://account.dyn.com/
unknown
http://r11.o.lencr.org0#
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://r11.i.lencr.org/0
unknown
http://srv.masternic.net
unknown

Domains

Name
IP
Malicious
srv.masternic.net
174.141.234.138
malicious

IPs

IP
Domain
Country
Malicious
174.141.234.138
srv.masternic.net
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2AEE000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
4670000
direct allocation
page read and write
malicious
2B18000
trusted library allocation
page read and write
malicious
2AA1000
trusted library allocation
page read and write
malicious
3C6E000
stack
page read and write
D50000
trusted library allocation
page read and write
418B000
heap
page read and write
3525000
heap
page read and write
482000
unkown
page readonly
4F6B000
trusted library allocation
page read and write
3B09000
trusted library allocation
page read and write
1B02000
heap
page read and write
9B0000
heap
page read and write
4820000
direct allocation
page read and write
41D1000
heap
page read and write
D87000
trusted library allocation
page execute and read and write
4943000
direct allocation
page read and write
4139000
heap
page read and write
4AE9000
direct allocation
page read and write
490000
unkown
page read and write
54CE000
stack
page read and write
60BD000
stack
page read and write
4150000
heap
page read and write
5FDE000
stack
page read and write
4AED000
direct allocation
page read and write
8AF000
stack
page read and write
400000
unkown
page readonly
2B20000
trusted library allocation
page read and write
418B000
heap
page read and write
3383000
heap
page read and write
406F000
stack
page read and write
8FE000
stack
page read and write
EC6000
heap
page read and write
4AED000
direct allocation
page read and write
D53000
trusted library allocation
page execute and read and write
40FA000
heap
page read and write
6710000
heap
page read and write
560E000
stack
page read and write
F59000
heap
page read and write
418B000
heap
page read and write
57C0000
trusted library allocation
page execute and read and write
11A0000
heap
page read and write
5013000
heap
page read and write
418B000
heap
page read and write
2A70000
trusted library allocation
page read and write
4271000
heap
page read and write
D8B000
trusted library allocation
page execute and read and write
D70000
trusted library allocation
page read and write
57E7000
trusted library allocation
page read and write
4F6E000
trusted library allocation
page read and write
10E8000
trusted library allocation
page read and write
66BE000
stack
page read and write
11B0000
heap
page read and write
1BD0000
heap
page read and write
2B07000
trusted library allocation
page read and write
D7A000
trusted library allocation
page execute and read and write
9C0000
heap
page read and write
3AA1000
trusted library allocation
page read and write
124E000
stack
page read and write
4943000
direct allocation
page read and write
D82000
trusted library allocation
page read and write
D5D000
trusted library allocation
page execute and read and write
4F92000
trusted library allocation
page read and write
D00000
heap
page read and write
548E000
stack
page read and write
1A90000
heap
page read and write
4B5E000
direct allocation
page read and write
9F0000
heap
page read and write
1A8E000
stack
page read and write
3520000
heap
page read and write
DA0000
heap
page read and write
400000
unkown
page readonly
164F000
stack
page read and write
EC4000
heap
page read and write
4820000
direct allocation
page read and write
4AE9000
direct allocation
page read and write
6A60000
heap
page read and write
A8E000
heap
page read and write
4AED000
direct allocation
page read and write
57A0000
trusted library allocation
page read and write
2A5E000
stack
page read and write
4AE9000
direct allocation
page read and write
57B6000
trusted library allocation
page read and write
4943000
direct allocation
page read and write
9F4000
heap
page read and write
41D1000
heap
page read and write
4AB000
unkown
page readonly
3AC9000
trusted library allocation
page read and write
D90000
heap
page read and write
A5A000
heap
page read and write
419B000
heap
page read and write
57D0000
trusted library allocation
page execute and read and write
2B14000
trusted library allocation
page read and write
4672000
heap
page read and write
4110000
heap
page read and write
49C0000
direct allocation
page read and write
42D9000
heap
page read and write
D60000
trusted library allocation
page read and write
4276000
heap
page read and write
4AED000
direct allocation
page read and write
4273000
heap
page read and write
93E000
stack
page read and write
418B000
heap
page read and write
65BE000
stack
page read and write
5230000
heap
page execute and read and write
1090000
trusted library allocation
page read and write
1F0000
heap
page read and write
418B000
heap
page read and write
4820000
direct allocation
page read and write
418B000
heap
page read and write
10DE000
stack
page read and write
4AE9000
direct allocation
page read and write
5790000
trusted library allocation
page read and write
5EA6000
heap
page read and write
4F7A000
trusted library allocation
page read and write
41D1000
heap
page read and write
4F72000
trusted library allocation
page read and write
41D1000
heap
page read and write
1BC0000
heap
page read and write
7F4C0000
trusted library allocation
page execute and read and write
4AE9000
direct allocation
page read and write
EBA000
heap
page read and write
E90000
heap
page read and write
415C000
heap
page read and write
97E000
stack
page read and write
57E0000
trusted library allocation
page read and write
CF8000
stack
page read and write
4B5E000
direct allocation
page read and write
8B4000
stack
page read and write
6720000
trusted library allocation
page execute and read and write
49C0000
direct allocation
page read and write
4070000
heap
page read and write
D54000
trusted library allocation
page read and write
5120000
heap
page read and write
4F66000
trusted library allocation
page read and write
41D1000
heap
page read and write
4A7000
unkown
page read and write
490000
unkown
page write copy
94A000
stack
page read and write
401000
unkown
page execute read
41D1000
heap
page read and write
4820000
direct allocation
page read and write
110000
heap
page read and write
533C000
stack
page read and write
42D9000
heap
page read and write
9A000
stack
page read and write
4BDD000
stack
page read and write
5010000
heap
page read and write
4F81000
trusted library allocation
page read and write
4272000
heap
page execute and read and write
472D000
heap
page read and write
4FA0000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
418B000
heap
page read and write
D40000
trusted library allocation
page read and write
EAE000
heap
page read and write
418B000
heap
page read and write
4B5E000
direct allocation
page read and write
49C0000
direct allocation
page read and write
419B000
heap
page read and write
41D1000
heap
page read and write
5768000
trusted library allocation
page read and write
627D000
stack
page read and write
D85000
trusted library allocation
page execute and read and write
4B5E000
direct allocation
page read and write
607E000
stack
page read and write
5EA0000
heap
page read and write
5EB0000
heap
page read and write
4F7E000
trusted library allocation
page read and write
418B000
heap
page read and write
41D1000
heap
page read and write
418B000
heap
page read and write
500C000
stack
page read and write
990000
heap
page read and write
60C0000
trusted library allocation
page read and write
5F28000
heap
page read and write
482000
unkown
page readonly
1B21000
heap
page read and write
4F60000
trusted library allocation
page read and write
D6D000
trusted library allocation
page execute and read and write
4AED000
direct allocation
page read and write
41D1000
heap
page read and write
DA5000
heap
page read and write
4120000
heap
page read and write
41D1000
heap
page read and write
4ADC000
stack
page read and write
40F4000
heap
page read and write
5760000
trusted library allocation
page read and write
1180000
heap
page read and write
41A4000
heap
page read and write
4F86000
trusted library allocation
page read and write
2AEC000
trusted library allocation
page read and write
105000
heap
page read and write
F6B000
heap
page read and write
400000
system
page execute and read and write
4F64000
trusted library allocation
page read and write
4943000
direct allocation
page read and write
418B000
heap
page read and write
2A60000
trusted library allocation
page execute and read and write
418B000
heap
page read and write
4820000
direct allocation
page read and write
4AB000
unkown
page readonly
4AE9000
direct allocation
page read and write
41D1000
heap
page read and write
579C000
trusted library allocation
page read and write
D72000
trusted library allocation
page read and write
F89000
heap
page read and write
57B0000
trusted library allocation
page read and write
1A4F000
stack
page read and write
D76000
trusted library allocation
page execute and read and write
4820000
direct allocation
page read and write
538E000
stack
page read and write
89F000
stack
page read and write
A3E000
stack
page read and write
4943000
direct allocation
page read and write
5FE0000
trusted library allocation
page read and write
A50000
heap
page read and write
F33000
heap
page read and write
4270000
heap
page read and write
4F8D000
trusted library allocation
page read and write
49C0000
direct allocation
page read and write
4B5E000
direct allocation
page read and write
100000
heap
page read and write
4AED000
direct allocation
page read and write
4943000
direct allocation
page read and write
49C0000
direct allocation
page read and write
418B000
heap
page read and write
1A91000
heap
page read and write
4B5E000
direct allocation
page read and write
55CE000
stack
page read and write
401000
unkown
page execute read
2A90000
heap
page execute and read and write
E98000
heap
page read and write
49C0000
direct allocation
page read and write
570E000
stack
page read and write
4FB0000
trusted library allocation
page read and write
A5E000
heap
page read and write
There are 228 hidden memdumps, click here to show them.