IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://tail-cease.cyou/api
104.21.93.105
malicious
https://tail-cease.cyou/
unknown
https://tail-cease.cyou:443/apia/
unknown
https://tail-cease.cyou/d
unknown
https://tail-cease.cyou/b
unknown

Domains

Name
IP
Malicious
tail-cease.cyou
104.21.93.105
malicious

IPs

IP
Domain
Country
Malicious
104.21.93.105
tail-cease.cyou
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
B20000
direct allocation
page read and write
B98000
heap
page read and write
436000
unkown
page execute and read and write
43B1000
heap
page read and write
8FB000
stack
page read and write
4A04000
trusted library allocation
page read and write
B20000
direct allocation
page read and write
43B1000
heap
page read and write
32F000
unkown
page execute and read and write
52E0000
heap
page read and write
2FAF000
stack
page read and write
B20000
direct allocation
page read and write
B20000
direct allocation
page read and write
43B1000
heap
page read and write
B20000
direct allocation
page read and write
4F0E000
stack
page read and write
49F0000
direct allocation
page execute and read and write
BFA000
heap
page read and write
43B1000
heap
page read and write
27A7000
heap
page read and write
386F000
stack
page read and write
326E000
stack
page read and write
960000
heap
page read and write
BB7000
heap
page read and write
43B1000
heap
page read and write
43B0000
heap
page read and write
B20000
direct allocation
page read and write
43B1000
heap
page read and write
43B1000
heap
page read and write
BFD000
heap
page read and write
BF4000
heap
page read and write
4830000
direct allocation
page read and write
4EA0000
remote allocation
page read and write
49D0000
direct allocation
page execute and read and write
BB7000
heap
page read and write
B20000
direct allocation
page read and write
27AD000
heap
page read and write
38AE000
stack
page read and write
312E000
stack
page read and write
42AE000
stack
page read and write
43B1000
heap
page read and write
4C3E000
stack
page read and write
43B1000
heap
page read and write
140000
unkown
page readonly
44D000
unkown
page execute and write copy
3B2E000
stack
page read and write
49C0000
direct allocation
page execute and read and write
BF4000
heap
page read and write
ABE000
stack
page read and write
B83000
heap
page read and write
43D000
unkown
page execute and read and write
2FEE000
stack
page read and write
C02000
heap
page read and write
26CF000
stack
page read and write
900000
heap
page read and write
3FEF000
stack
page read and write
49C0000
direct allocation
page execute and read and write
500F000
stack
page read and write
BFD000
heap
page read and write
BFA000
heap
page read and write
49C0000
direct allocation
page execute and read and write
BED000
heap
page read and write
43B1000
heap
page read and write
487B000
stack
page read and write
2AEE000
stack
page read and write
43B1000
heap
page read and write
BF4000
heap
page read and write
B20000
direct allocation
page read and write
3EAF000
stack
page read and write
4840000
direct allocation
page read and write
52BF000
stack
page read and write
47F0000
trusted library allocation
page read and write
4D3F000
stack
page read and write
BEF000
heap
page read and write
274E000
stack
page read and write
CB000
stack
page read and write
482E000
stack
page read and write
426F000
stack
page read and write
2E6F000
stack
page read and write
B64000
heap
page read and write
278E000
stack
page read and write
3EEE000
stack
page read and write
BEF000
heap
page read and write
43B1000
heap
page read and write
30EF000
stack
page read and write
27A0000
heap
page read and write
3D6F000
stack
page read and write
336F000
stack
page read and write
BF2000
heap
page read and write
416E000
stack
page read and write
BEF000
heap
page read and write
43B1000
heap
page read and write
4E7F000
stack
page read and write
B98000
heap
page read and write
44E000
unkown
page execute and write copy
44D000
unkown
page execute and read and write
40D000
unkown
page execute and read and write
B79000
heap
page read and write
49C0000
direct allocation
page execute and read and write
B00000
heap
page read and write
B20000
direct allocation
page read and write
35EF000
stack
page read and write
33AE000
stack
page read and write
5F4000
unkown
page execute and write copy
185000
unkown
page execute and read and write
49B0000
direct allocation
page execute and read and write
2BEF000
stack
page read and write
3C2F000
stack
page read and write
4EA0000
remote allocation
page read and write
5F3000
unkown
page execute and read and write
B74000
heap
page read and write
362E000
stack
page read and write
3C6E000
stack
page read and write
43B1000
heap
page read and write
140000
unkown
page read and write
141000
unkown
page execute and write copy
51BE000
stack
page read and write
43B1000
heap
page read and write
B8C000
heap
page read and write
BF4000
heap
page read and write
A7E000
stack
page read and write
2AAF000
stack
page read and write
C08000
heap
page read and write
BF2000
heap
page read and write
E2E000
stack
page read and write
34AF000
stack
page read and write
B3A000
heap
page read and write
950000
heap
page read and write
B74000
heap
page read and write
270C000
stack
page read and write
2D2F000
stack
page read and write
43B1000
heap
page read and write
4990000
direct allocation
page execute and read and write
965000
heap
page read and write
B69000
heap
page read and write
BEA000
heap
page read and write
49A0000
direct allocation
page execute and read and write
D2F000
stack
page read and write
43AF000
stack
page read and write
322F000
stack
page read and write
29AF000
stack
page read and write
B3E000
heap
page read and write
43B1000
heap
page read and write
43B1000
heap
page read and write
197000
unkown
page write copy
504E000
stack
page read and write
B8C000
heap
page read and write
497F000
stack
page read and write
BF2000
heap
page read and write
130000
heap
page read and write
AFE000
stack
page read and write
2C2E000
stack
page read and write
B20000
direct allocation
page read and write
C08000
heap
page read and write
43B1000
heap
page read and write
2EAE000
stack
page read and write
43B1000
heap
page read and write
43B1000
heap
page read and write
BFF000
heap
page read and write
43B1000
heap
page read and write
4D7E000
stack
page read and write
B30000
heap
page read and write
B20000
direct allocation
page read and write
49E0000
direct allocation
page execute and read and write
4BFD000
stack
page read and write
3AEF000
stack
page read and write
BFD000
heap
page read and write
402E000
stack
page read and write
4830000
direct allocation
page read and write
197000
unkown
page read and write
28AF000
stack
page read and write
49C0000
direct allocation
page execute and read and write
2D6E000
stack
page read and write
199000
unkown
page execute and read and write
514E000
stack
page read and write
43B1000
heap
page read and write
34EE000
stack
page read and write
43B1000
heap
page read and write
376E000
stack
page read and write
B79000
heap
page read and write
B20000
direct allocation
page read and write
BFD000
heap
page read and write
C08000
heap
page read and write
49CD000
stack
page read and write
412F000
stack
page read and write
4884000
direct allocation
page read and write
BFA000
heap
page read and write
B69000
heap
page read and write
372F000
stack
page read and write
141000
unkown
page execute and read and write
B20000
direct allocation
page read and write
39EE000
stack
page read and write
43B1000
heap
page read and write
39AF000
stack
page read and write
3DAE000
stack
page read and write
4AFD000
stack
page read and write
BFA000
heap
page read and write
49C0000
direct allocation
page execute and read and write
B20000
direct allocation
page read and write
4830000
direct allocation
page read and write
B83000
heap
page read and write
4EA0000
remote allocation
page read and write
There are 192 hidden memdumps, click here to show them.