IOC Report
OKJ2402PRT000025.PDF.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
OKJ2402PRT000025.PDF.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\OKJ2402PRT000025.PDF.scr.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\OKJ2402PRT000025.PDF.scr.exe
"C:\Users\user\Desktop\OKJ2402PRT000025.PDF.scr.exe"
malicious
C:\Users\user\Desktop\OKJ2402PRT000025.PDF.scr.exe
"C:\Users\user\Desktop\OKJ2402PRT000025.PDF.scr.exe"
malicious

URLs

Name
IP
Malicious
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
http://ocsp.sectigo.com0A
unknown
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
http://us2.smtp.mailhostbox.com
unknown

Domains

Name
IP
Malicious
us2.smtp.mailhostbox.com
208.91.199.224

IPs

IP
Domain
Country
Malicious
208.91.199.224
us2.smtp.mailhostbox.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
296A000
trusted library allocation
page read and write
malicious
293E000
trusted library allocation
page read and write
malicious
28F1000
trusted library allocation
page read and write
malicious
4F27000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
609D000
stack
page read and write
11D0000
heap
page read and write
26D0000
heap
page read and write
540E000
stack
page read and write
2FC0000
trusted library allocation
page read and write
EF8E000
stack
page read and write
2958000
trusted library allocation
page read and write
28C0000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
3919000
trusted library allocation
page read and write
BF4000
heap
page read and write
DD6000
stack
page read and write
5D90000
trusted library allocation
page read and write
EE4E000
stack
page read and write
4E34000
trusted library allocation
page read and write
5E00000
trusted library allocation
page execute and read and write
65E0000
trusted library allocation
page read and write
28B0000
trusted library allocation
page read and write
123D000
trusted library allocation
page execute and read and write
2972000
trusted library allocation
page read and write
73DF000
stack
page read and write
4AE3000
trusted library allocation
page read and write
DBE000
stack
page read and write
75C0000
trusted library allocation
page read and write
58C0000
heap
page execute and read and write
5610000
trusted library section
page read and write
4E56000
trusted library allocation
page read and write
64DE000
stack
page read and write
1400000
trusted library allocation
page execute and read and write
B92000
unkown
page readonly
2FF8000
trusted library allocation
page read and write
75BE000
stack
page read and write
16A0000
heap
page read and write
5630000
heap
page read and write
65DF000
stack
page read and write
E10000
heap
page read and write
4A47000
trusted library allocation
page read and write
4A95000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1040000
heap
page read and write
72DE000
stack
page read and write
3580000
trusted library allocation
page read and write
74BE000
stack
page read and write
2F70000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
B64B000
trusted library allocation
page read and write
2616000
trusted library allocation
page execute and read and write
5570000
heap
page read and write
E68E000
stack
page read and write
6620000
trusted library allocation
page execute and read and write
ACE000
unkown
page read and write
1050000
heap
page read and write
1317000
heap
page read and write
2FD0000
trusted library allocation
page execute and read and write
5600000
trusted library allocation
page execute and read and write
7EE20000
trusted library allocation
page execute and read and write
2625000
trusted library allocation
page execute and read and write
261A000
trusted library allocation
page execute and read and write
280E000
stack
page read and write
31E0000
heap
page execute and read and write
4FC0000
heap
page execute and read and write
B640000
trusted library allocation
page read and write
41F9000
trusted library allocation
page read and write
E98F000
stack
page read and write
EACE000
stack
page read and write
10B5000
heap
page read and write
126E000
heap
page read and write
5DA0000
trusted library allocation
page read and write
63A0000
heap
page read and write
6900000
heap
page read and write
55A0000
trusted library allocation
page read and write
4E36000
trusted library allocation
page read and write
163F000
stack
page read and write
28D0000
trusted library allocation
page read and write
B5C0000
trusted library section
page read and write
346C000
trusted library allocation
page read and write
293C000
trusted library allocation
page read and write
12A2000
heap
page read and write
268E000
stack
page read and write
2FB0000
heap
page read and write
1240000
trusted library allocation
page read and write
5580000
trusted library allocation
page execute and read and write
326D000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
1260000
heap
page read and write
7690000
trusted library allocation
page read and write
1344000
heap
page read and write
3190000
trusted library allocation
page read and write
262B000
trusted library allocation
page execute and read and write
13FC000
stack
page read and write
2622000
trusted library allocation
page read and write
EB0D000
stack
page read and write
1341000
heap
page read and write
C31000
heap
page read and write
55F0000
trusted library allocation
page read and write
55E0000
heap
page read and write
1224000
trusted library allocation
page read and write
BC8000
heap
page read and write
4ECC000
stack
page read and write
26F0000
trusted library allocation
page execute and read and write
125B000
trusted library allocation
page execute and read and write
4E70000
trusted library allocation
page read and write
A50000
heap
page read and write
55D5000
heap
page read and write
5EF0000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
28D4000
trusted library allocation
page read and write
2620000
trusted library allocation
page read and write
7612000
trusted library allocation
page read and write
2818000
trusted library allocation
page read and write
73E0000
trusted library section
page read and write
63B0000
heap
page read and write
153E000
stack
page read and write
4E30000
trusted library allocation
page read and write
166D000
trusted library allocation
page read and write
75D0000
trusted library allocation
page execute and read and write
EC10000
heap
page read and write
BE8000
heap
page read and write
1242000
trusted library allocation
page read and write
31D0000
heap
page read and write
77A2000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
59D0000
heap
page read and write
1430000
heap
page read and write
7F2C0000
trusted library allocation
page execute and read and write
938000
stack
page read and write
260D000
trusted library allocation
page execute and read and write
839000
stack
page read and write
A70000
heap
page read and write
4EF3000
heap
page read and write
1250000
trusted library allocation
page read and write
2627000
trusted library allocation
page execute and read and write
EC0D000
stack
page read and write
4E62000
trusted library allocation
page read and write
E9CE000
stack
page read and write
2700000
heap
page read and write
1640000
trusted library allocation
page read and write
2610000
trusted library allocation
page read and write
B90000
unkown
page readonly
122D000
trusted library allocation
page execute and read and write
C55000
heap
page read and write
11CE000
stack
page read and write
59E0000
heap
page read and write
5BD0000
trusted library section
page read and write
5DB0000
trusted library allocation
page execute and read and write
BC0000
heap
page read and write
2612000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
1690000
trusted library allocation
page read and write
5B5E000
stack
page read and write
164B000
trusted library allocation
page read and write
31C0000
trusted library section
page readonly
6610000
heap
page read and write
556B000
stack
page read and write
165E000
trusted library allocation
page read and write
2FE0000
heap
page read and write
520C000
stack
page read and write
E88E000
stack
page read and write
B647000
trusted library allocation
page read and write
12EE000
heap
page read and write
318C000
stack
page read and write
5633000
heap
page read and write
41F1000
trusted library allocation
page read and write
E6E0000
trusted library allocation
page execute and read and write
EE8E000
stack
page read and write
54A9000
trusted library allocation
page read and write
1223000
trusted library allocation
page execute and read and write
54A0000
trusted library allocation
page read and write
38F1000
trusted library allocation
page read and write
59CD000
stack
page read and write
530F000
stack
page read and write
2600000
trusted library allocation
page read and write
5ADE000
heap
page read and write
25E0000
trusted library allocation
page read and write
1666000
trusted library allocation
page read and write
3953000
trusted library allocation
page read and write
4BCE000
trusted library allocation
page read and write
4E3E000
trusted library allocation
page read and write
4FBE000
stack
page read and write
2F4E000
stack
page read and write
E6CE000
stack
page read and write
131B000
heap
page read and write
353C000
trusted library allocation
page read and write
4F3E000
stack
page read and write
63EF000
heap
page read and write
5BE0000
trusted library section
page read and write
5DA6000
trusted library allocation
page read and write
2F50000
trusted library allocation
page read and write
109E000
stack
page read and write
16A7000
heap
page read and write
4F7E000
stack
page read and write
1246000
trusted library allocation
page execute and read and write
4E3B000
trusted library allocation
page read and write
5EE7000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
55D0000
heap
page read and write
1295000
heap
page read and write
ED4D000
stack
page read and write
10B0000
heap
page read and write
A75000
heap
page read and write
1661000
trusted library allocation
page read and write
970000
heap
page read and write
4EF0000
heap
page read and write
1696000
trusted library allocation
page read and write
31F1000
trusted library allocation
page read and write
4E4E000
trusted library allocation
page read and write
13BE000
stack
page read and write
3271000
trusted library allocation
page read and write
4D30000
heap
page read and write
36FE000
trusted library allocation
page read and write
4E51000
trusted library allocation
page read and write
2640000
trusted library allocation
page read and write
71A0000
heap
page read and write
130B000
heap
page read and write
5D8C000
trusted library allocation
page read and write
49ED000
stack
page read and write
26CC000
stack
page read and write
5590000
trusted library allocation
page read and write
4E4A000
trusted library allocation
page read and write
4E5D000
trusted library allocation
page read and write
12A0000
heap
page read and write
5AD0000
heap
page read and write
25F4000
trusted library allocation
page read and write
4EED000
trusted library allocation
page read and write
CDA000
stack
page read and write
4D40000
heap
page read and write
5E9F000
stack
page read and write
5EDE000
stack
page read and write
25F3000
trusted library allocation
page execute and read and write
124A000
trusted library allocation
page execute and read and write
1680000
trusted library allocation
page read and write
25F0000
trusted library allocation
page read and write
1257000
trusted library allocation
page execute and read and write
63E2000
heap
page read and write
1252000
trusted library allocation
page read and write
2966000
trusted library allocation
page read and write
4E42000
trusted library allocation
page read and write
25FD000
trusted library allocation
page execute and read and write
FB0000
heap
page read and write
A78000
heap
page read and write
28E0000
heap
page execute and read and write
1420000
trusted library allocation
page read and write
5A00000
heap
page read and write
BF7000
heap
page read and write
5DFD000
stack
page read and write
There are 241 hidden memdumps, click here to show them.