Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
OC & PL.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\aut1756.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\immortaliser
|
data
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\OC & PL.exe
|
"C:\Users\user\Desktop\OC & PL.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\OC & PL.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://r10.o.lencr.org0#
|
unknown
|
||
http://mail.agaliofu.top
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://agaliofu.top
|
unknown
|
||
http://r10.i.lencr.org/0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
agaliofu.top
|
194.36.191.196
|
||
mail.agaliofu.top
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
194.36.191.196
|
agaliofu.top
|
Netherlands
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
670000
|
direct allocation
|
page read and write
|
||
2B01000
|
trusted library allocation
|
page read and write
|
||
2B83000
|
trusted library allocation
|
page read and write
|
||
2B57000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
F9D000
|
heap
|
page read and write
|
||
E97000
|
trusted library allocation
|
page execute and read and write
|
||
1B0000
|
heap
|
page read and write
|
||
71A000
|
stack
|
page read and write
|
||
5210000
|
heap
|
page execute and read and write
|
||
7D0000
|
heap
|
page read and write
|
||
2B72000
|
trusted library allocation
|
page read and write
|
||
E86000
|
trusted library allocation
|
page execute and read and write
|
||
E82000
|
trusted library allocation
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
35D0000
|
direct allocation
|
page read and write
|
||
28C0000
|
trusted library allocation
|
page read and write
|
||
2910000
|
trusted library allocation
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
65F0000
|
heap
|
page read and write
|
||
36F9000
|
direct allocation
|
page read and write
|
||
56B2000
|
heap
|
page read and write
|
||
56BB000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
E60000
|
trusted library allocation
|
page read and write
|
||
576D000
|
trusted library allocation
|
page read and write
|
||
3430000
|
direct allocation
|
page read and write
|
||
36FD000
|
direct allocation
|
page read and write
|
||
E28000
|
heap
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
5E6E000
|
stack
|
page read and write
|
||
5F6D000
|
unkown
|
page read and write
|
||
EB0000
|
trusted library allocation
|
page read and write
|
||
E7D000
|
trusted library allocation
|
page execute and read and write
|
||
154E000
|
stack
|
page read and write
|
||
36F9000
|
direct allocation
|
page read and write
|
||
5660000
|
heap
|
page read and write
|
||
36F9000
|
direct allocation
|
page read and write
|
||
2902000
|
trusted library allocation
|
page read and write
|
||
149000
|
stack
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
CB8000
|
heap
|
page read and write
|
||
376E000
|
direct allocation
|
page read and write
|
||
704C6000
|
unkown
|
page readonly
|
||
ED5000
|
heap
|
page read and write
|
||
28FD000
|
trusted library allocation
|
page read and write
|
||
35D0000
|
direct allocation
|
page read and write
|
||
2B5B000
|
trusted library allocation
|
page read and write
|
||
F9D000
|
heap
|
page read and write
|
||
376E000
|
direct allocation
|
page read and write
|
||
3553000
|
direct allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
5780000
|
heap
|
page read and write
|
||
28EE000
|
trusted library allocation
|
page read and write
|
||
E27000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
2920000
|
trusted library allocation
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
36F9000
|
direct allocation
|
page read and write
|
||
704CF000
|
unkown
|
page readonly
|
||
50A0000
|
heap
|
page read and write
|
||
35D0000
|
direct allocation
|
page read and write
|
||
3B6A000
|
trusted library allocation
|
page read and write
|
||
E95000
|
trusted library allocation
|
page execute and read and write
|
||
1C0000
|
heap
|
page read and write
|
||
51AC000
|
stack
|
page read and write
|
||
F9D000
|
heap
|
page read and write
|
||
36FD000
|
direct allocation
|
page read and write
|
||
7D7000
|
unkown
|
page readonly
|
||
2AFE000
|
stack
|
page read and write
|
||
D99000
|
heap
|
page read and write
|
||
F9D000
|
heap
|
page read and write
|
||
704B0000
|
unkown
|
page readonly
|
||
7C7000
|
unkown
|
page readonly
|
||
51EE000
|
stack
|
page read and write
|
||
5684000
|
heap
|
page read and write
|
||
376E000
|
direct allocation
|
page read and write
|
||
F9D000
|
heap
|
page read and write
|
||
28F6000
|
trusted library allocation
|
page read and write
|
||
7D7000
|
unkown
|
page readonly
|
||
7AE000
|
unkown
|
page readonly
|
||
7AE000
|
unkown
|
page readonly
|
||
F9D000
|
heap
|
page read and write
|
||
6620000
|
trusted library allocation
|
page execute and read and write
|
||
DE4000
|
heap
|
page read and write
|
||
4BFE000
|
stack
|
page read and write
|
||
2B61000
|
trusted library allocation
|
page read and write
|
||
5D90000
|
trusted library allocation
|
page execute and read and write
|
||
CF0000
|
heap
|
page read and write
|
||
376E000
|
direct allocation
|
page read and write
|
||
E8A000
|
trusted library allocation
|
page execute and read and write
|
||
F9D000
|
heap
|
page read and write
|
||
28DB000
|
trusted library allocation
|
page read and write
|
||
2B7F000
|
trusted library allocation
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
28E2000
|
trusted library allocation
|
page read and write
|
||
D99000
|
heap
|
page read and write
|
||
F9D000
|
heap
|
page read and write
|
||
CE4000
|
heap
|
page read and write
|
||
5D80000
|
trusted library allocation
|
page read and write
|
||
F9D000
|
heap
|
page read and write
|
||
F9D000
|
heap
|
page read and write
|
||
701000
|
unkown
|
page execute read
|
||
3B29000
|
trusted library allocation
|
page read and write
|
||
299C000
|
stack
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
7BA000
|
unkown
|
page write copy
|
||
531E000
|
stack
|
page read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
36FD000
|
direct allocation
|
page read and write
|
||
56A4000
|
heap
|
page read and write
|
||
541E000
|
stack
|
page read and write
|
||
F9D000
|
heap
|
page read and write
|
||
F9D000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
28F1000
|
trusted library allocation
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
2950000
|
heap
|
page execute and read and write
|
||
700000
|
unkown
|
page readonly
|
||
3B01000
|
trusted library allocation
|
page read and write
|
||
E6D000
|
trusted library allocation
|
page execute and read and write
|
||
376E000
|
direct allocation
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
3553000
|
direct allocation
|
page read and write
|
||
54D000
|
stack
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
28DE000
|
trusted library allocation
|
page read and write
|
||
E63000
|
trusted library allocation
|
page execute and read and write
|
||
C25000
|
heap
|
page read and write
|
||
57B7000
|
trusted library allocation
|
page read and write
|
||
289C000
|
stack
|
page read and write
|
||
36F9000
|
direct allocation
|
page read and write
|
||
E92000
|
trusted library allocation
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
7C7000
|
unkown
|
page readonly
|
||
7F460000
|
trusted library allocation
|
page execute and read and write
|
||
7D5000
|
unkown
|
page readonly
|
||
D5E000
|
heap
|
page read and write
|
||
F52000
|
heap
|
page execute and read and write
|
||
700000
|
unkown
|
page readonly
|
||
1018000
|
trusted library allocation
|
page read and write
|
||
36FD000
|
direct allocation
|
page read and write
|
||
3430000
|
direct allocation
|
page read and write
|
||
3430000
|
direct allocation
|
page read and write
|
||
F9E000
|
heap
|
page read and write
|
||
64EE000
|
stack
|
page read and write
|
||
376E000
|
direct allocation
|
page read and write
|
||
CD2000
|
heap
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page execute and read and write
|
||
C3C000
|
stack
|
page read and write
|
||
50E000
|
stack
|
page read and write
|
||
D5A000
|
heap
|
page read and write
|
||
D99000
|
heap
|
page read and write
|
||
5098000
|
trusted library allocation
|
page read and write
|
||
C7A000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
7BF000
|
unkown
|
page write copy
|
||
C1A000
|
heap
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
5090000
|
trusted library allocation
|
page read and write
|
||
28EA000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
194E000
|
stack
|
page read and write
|
||
36F9000
|
direct allocation
|
page read and write
|
||
7C4000
|
unkown
|
page readonly
|
||
1D0000
|
heap
|
page read and write
|
||
F9D000
|
heap
|
page read and write
|
||
F57000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
BF8000
|
heap
|
page read and write
|
||
36FD000
|
direct allocation
|
page read and write
|
||
78D000
|
unkown
|
page readonly
|
||
DB8000
|
heap
|
page read and write
|
||
606D000
|
stack
|
page read and write
|
||
5777000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
3430000
|
direct allocation
|
page read and write
|
||
D7B000
|
heap
|
page read and write
|
||
6900000
|
heap
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
704B1000
|
unkown
|
page execute read
|
||
28A0000
|
trusted library allocation
|
page execute and read and write
|
||
65EE000
|
stack
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
35D0000
|
direct allocation
|
page read and write
|
||
AF9000
|
stack
|
page read and write
|
||
D99000
|
heap
|
page read and write
|
||
3553000
|
direct allocation
|
page read and write
|
||
F9E000
|
heap
|
page read and write
|
||
F9D000
|
heap
|
page read and write
|
||
50A3000
|
heap
|
page read and write
|
||
2B8B000
|
trusted library allocation
|
page read and write
|
||
7BA000
|
unkown
|
page read and write
|
||
C1B000
|
stack
|
page read and write
|
||
3553000
|
direct allocation
|
page read and write
|
||
35D0000
|
direct allocation
|
page read and write
|
||
3553000
|
direct allocation
|
page read and write
|
||
3430000
|
direct allocation
|
page read and write
|
||
704CD000
|
unkown
|
page read and write
|
||
CF5000
|
heap
|
page read and write
|
||
3553000
|
direct allocation
|
page read and write
|
||
3430000
|
direct allocation
|
page read and write
|
||
551E000
|
stack
|
page read and write
|
||
78D000
|
unkown
|
page readonly
|
||
F9D000
|
heap
|
page read and write
|
||
7D5000
|
unkown
|
page readonly
|
||
BFC000
|
stack
|
page read and write
|
||
36FD000
|
direct allocation
|
page read and write
|
||
35D0000
|
direct allocation
|
page read and write
|
||
28B0000
|
trusted library allocation
|
page read and write
|
||
C27000
|
heap
|
page read and write
|
||
43E000
|
system
|
page execute and read and write
|
||
E64000
|
trusted library allocation
|
page read and write
|
||
DA3000
|
heap
|
page read and write
|
||
D97000
|
heap
|
page read and write
|
||
5E2D000
|
stack
|
page read and write
|
||
E9B000
|
trusted library allocation
|
page execute and read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
56C6000
|
heap
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
701000
|
unkown
|
page execute read
|
||
7C4000
|
unkown
|
page readonly
|
There are 220 hidden memdumps, click here to show them.