IOC Report
j7aM8mK3Sy

loading gif

Files

File Path
Type
Category
Malicious
j7aM8mK3Sy.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Excel\XLSTART\DatePicker.xll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\j7aM8mK3Sy.exe
"C:\Users\user\Desktop\j7aM8mK3Sy.exe"

URLs

Name
IP
Malicious
http://www.quepublishing.com/articles/article.aspx?p=2067634
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://stackoverflow.com/questions/43537990/wpf-clickonce-dpi-awareness-per-monitor-v2--
unknown
http://www.codeproject.com/Articles/39204/gTimePicker-Control-to-Pick-a-Time-Value-VB-NET
unknown
https://sectigo.com/CPS0
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://blogs.msdn.com/excel/archive/2007/08/01/sam-radakovitz-on-date-pickers.aspx
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://www.boostexcel.com/
unknown
http://www.fontstuff.com/excel/exltut02.htm
unknown
https://www.codeproject.com/Articles/45684/Culture-Aware-Month-Calendar-and-Datepicker
unknown
https://www.BoostExcel.com/contact.html
unknown
http://pop-up-excel-calendar.billing-invoice-software-office-kit-com.qarchive.org/
unknown
http://www.windowsdevcenter.com/pub/a/windows/2004/04/27/excelhacks.html
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
http://www.fontstuff.com/excel/exltut03.htm
unknown
https://www.BoostExcel.com/date-picker/
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://www.cpearson.com/excel/WeekNumbers.aspx
unknown
There are 11 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\VB and VBA Program Settings\Date Picker for Excel\GlobalOptions
XlEXEPath

Memdumps

Base Address
Regiontype
Protect
Malicious
2F2C000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
D7E0000
trusted library allocation
page execute and read and write
D7D0000
trusted library allocation
page read and write
10142000
heap
page read and write
10248000
heap
page read and write
10670000
trusted library allocation
page read and write
FF32D000
trusted library allocation
page readonly
106A0000
trusted library allocation
page read and write
B131000
heap
page read and write
30F4000
trusted library allocation
page read and write
106B0000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
B1DD000
heap
page read and write
D860000
trusted library allocation
page read and write
FF310000
trusted library allocation
page readonly
B085000
heap
page read and write
B0C8000
heap
page read and write
5210000
heap
page read and write
B077000
heap
page read and write
10238000
heap
page read and write
10550000
trusted library allocation
page read and write
F09000
heap
page read and write
31CA000
trusted library allocation
page read and write
105E000
heap
page read and write
30C4000
trusted library allocation
page read and write
E60000
heap
page read and write
FF324000
trusted library allocation
page execute read
EE5000
trusted library allocation
page execute and read and write
2F1C000
trusted library allocation
page read and write
DB7B000
heap
page read and write
2F2A000
trusted library allocation
page read and write
5203000
heap
page execute and read and write
30DE000
trusted library allocation
page read and write
1010A000
heap
page read and write
10570000
trusted library allocation
page read and write
10ACB000
heap
page read and write
1113000
heap
page read and write
ECD000
trusted library allocation
page execute and read and write
FDC000
stack
page read and write
F0C000
heap
page read and write
31B8000
trusted library allocation
page read and write
311A000
trusted library allocation
page read and write
FF31C000
trusted library allocation
page readonly
E70000
heap
page read and write
EE7000
trusted library allocation
page execute and read and write
31C4000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
FF317000
trusted library allocation
page execute read
8C7000
unkown
page readonly
DFD0000
heap
page read and write
31BE000
trusted library allocation
page read and write
10AC9000
heap
page read and write
EC0000
trusted library allocation
page read and write
1096000
heap
page read and write
B119000
heap
page read and write
D83E000
stack
page read and write
B13B000
heap
page read and write
B85C000
stack
page read and write
B170000
heap
page read and write
100F1000
heap
page read and write
B160000
heap
page read and write
11A4000
heap
page read and write
51EE000
stack
page read and write
4CCC000
stack
page read and write
10111000
heap
page read and write
F9E000
stack
page read and write
B1B4000
heap
page read and write
EB0000
trusted library allocation
page read and write
8B8000
unkown
page readonly
3146000
trusted library allocation
page read and write
30B2000
trusted library allocation
page read and write
104C000
trusted library allocation
page read and write
B1E8000
heap
page read and write
4E2E000
stack
page read and write
74D0000
trusted library allocation
page read and write
AFA0000
heap
page execute and read and write
FF32A000
trusted library allocation
page execute read
1085000
heap
page read and write
B358000
stack
page read and write
B153000
heap
page read and write
30BC000
trusted library allocation
page read and write
10260000
heap
page read and write
EA0000
trusted library allocation
page read and write
10060000
heap
page read and write
ED2000
trusted library allocation
page read and write
11E6000
heap
page read and write
11E8000
heap
page read and write
3100000
trusted library allocation
page read and write
FF31B000
trusted library allocation
page execute read
B0A9000
heap
page read and write
310C000
trusted library allocation
page read and write
51AE000
stack
page read and write
101F7000
heap
page read and write
FF314000
trusted library allocation
page readonly
FF32E000
trusted library allocation
page execute read
1008C000
heap
page read and write
1010000
heap
page execute and read and write
B1D0000
heap
page read and write
3CF4000
trusted library allocation
page read and write
101A7000
heap
page read and write
10A60000
heap
page read and write
4D10000
trusted library allocation
page read and write
FF321000
trusted library allocation
page readonly
101EA000
heap
page read and write
B1C9000
heap
page read and write
1022D000
heap
page read and write
B177000
heap
page read and write
10A70000
heap
page read and write
B129000
heap
page read and write
FF318000
trusted library allocation
page readonly
31AA000
trusted library allocation
page read and write
ED6000
trusted library allocation
page execute and read and write
EBD000
trusted library allocation
page execute and read and write
AFB0000
trusted library allocation
page read and write
10107000
heap
page read and write
D870000
trusted library allocation
page read and write
5220000
heap
page read and write
FF319000
trusted library allocation
page execute read
101D2000
heap
page read and write
FF326000
trusted library allocation
page execute read
106C0000
trusted library allocation
page read and write
AE2E000
stack
page read and write
6B2000
unkown
page readonly
2F18000
trusted library allocation
page read and write
1053C000
stack
page read and write
2F1A000
trusted library allocation
page read and write
101C9000
heap
page read and write
3098000
trusted library allocation
page read and write
B0A7000
heap
page read and write
10560000
trusted library allocation
page read and write
115D000
heap
page read and write
B07D000
heap
page read and write
EC8000
trusted library allocation
page read and write
2C80000
heap
page read and write
FF311000
trusted library allocation
page execute read
10253000
heap
page read and write
FF32B000
trusted library allocation
page readonly
7800000
trusted library section
page read and write
FF31D000
trusted library allocation
page execute read
1009F000
heap
page read and write
B0B3000
heap
page read and write
5230000
trusted library allocation
page execute and read and write
B060000
heap
page read and write
1008F000
heap
page read and write
EB4000
trusted library allocation
page read and write
100EA000
heap
page read and write
10234000
heap
page read and write
9D0000
heap
page read and write
F00000
heap
page read and write
D372000
trusted library allocation
page read and write
1020B000
heap
page read and write
FF31F000
trusted library allocation
page execute read
32CA000
trusted library allocation
page read and write
FF300000
trusted library allocation
page readonly
10ACD000
heap
page read and write
10180000
heap
page read and write
B073000
heap
page read and write
B120000
heap
page read and write
30CE000
trusted library allocation
page read and write
E65000
heap
page read and write
2BEE000
stack
page read and write
FF301000
trusted library allocation
page execute read
10A67000
heap
page read and write
101B2000
heap
page read and write
EEB000
trusted library allocation
page execute and read and write
B81C000
stack
page read and write
101F3000
heap
page read and write
1021B000
heap
page read and write
D7C0000
trusted library allocation
page read and write
1050000
heap
page read and write
EE0000
trusted library allocation
page read and write
B135000
heap
page read and write
CF6000
stack
page read and write
10690000
trusted library allocation
page read and write
77FF000
stack
page read and write
3136000
trusted library allocation
page read and write
2C91000
trusted library allocation
page read and write
B172000
heap
page read and write
FF322000
trusted library allocation
page execute read
9E0000
heap
page read and write
DFCE000
heap
page read and write
101C0000
heap
page read and write
1024B000
heap
page read and write
101AA000
heap
page read and write
10BD000
heap
page read and write
B0F0000
heap
page read and write
31A4000
trusted library allocation
page read and write
1092000
heap
page read and write
B71B000
stack
page read and write
DFD5000
heap
page read and write
F50000
heap
page read and write
B15A000
heap
page read and write
3C91000
trusted library allocation
page read and write
5200000
heap
page execute and read and write
FF320000
trusted library allocation
page execute read
B19E000
heap
page read and write
FF325000
trusted library allocation
page readonly
10246000
heap
page read and write
1049000
trusted library allocation
page read and write
FF313000
trusted library allocation
page execute read
D310000
trusted library allocation
page read and write
100CD000
heap
page read and write
31B0000
trusted library allocation
page read and write
B124000
heap
page read and write
2DBE000
trusted library allocation
page read and write
10227000
heap
page read and write
101E5000
heap
page read and write
10ABE000
heap
page read and write
10071000
heap
page read and write
F20000
trusted library allocation
page execute and read and write
1078000
heap
page read and write
FF328000
trusted library allocation
page execute read
5270000
heap
page read and write
B143000
heap
page read and write
FF0000
trusted library allocation
page read and write
DF7E000
heap
page read and write
AD2D000
stack
page read and write
10105000
heap
page read and write
E0E000
stack
page read and write
132E000
stack
page read and write
B089000
heap
page read and write
3126000
trusted library allocation
page read and write
10540000
trusted library allocation
page read and write
11F0000
heap
page read and write
F30000
trusted library allocation
page read and write
1058000
heap
page read and write
10AA1000
heap
page read and write
EE2000
trusted library allocation
page read and write
10980000
trusted library allocation
page read and write
D7F0000
trusted library allocation
page read and write
10197000
heap
page read and write
30E8000
trusted library allocation
page read and write
101DE000
heap
page read and write
EB3000
trusted library allocation
page execute and read and write
10430000
trusted library allocation
page read and write
32B9000
trusted library allocation
page read and write
10680000
trusted library allocation
page read and write
2C6E000
stack
page read and write
3CA1000
trusted library allocation
page read and write
30A6000
trusted library allocation
page read and write
6B0000
unkown
page readonly
10ACF000
heap
page read and write
FF31A000
trusted library allocation
page readonly
B95C000
stack
page read and write
1221000
heap
page read and write
10AB1000
heap
page read and write
FF315000
trusted library allocation
page execute read
3D32000
trusted library allocation
page read and write
5274000
heap
page read and write
FF32C000
trusted library allocation
page execute read
B108000
heap
page read and write
968000
stack
page read and write
ED0000
trusted library allocation
page read and write
B0AF000
heap
page read and write
There are 245 hidden memdumps, click here to show them.