IOC Report
OC & PL.exe

loading gif

Files

File Path
Type
Category
Malicious
OC & PL.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\aut1756.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\immortaliser
data
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\OC & PL.exe
"C:\Users\user\Desktop\OC & PL.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\OC & PL.exe"
malicious

URLs

Name
IP
Malicious
http://r10.o.lencr.org0#
unknown
http://mail.agaliofu.top
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.
unknown
http://x1.i.lencr.org/0
unknown
http://agaliofu.top
unknown
http://r10.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
agaliofu.top
194.36.191.196
malicious
mail.agaliofu.top
unknown
malicious

IPs

IP
Domain
Country
Malicious
194.36.191.196
agaliofu.top
Netherlands
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
670000
direct allocation
page read and write
malicious
2B01000
trusted library allocation
page read and write
malicious
2B83000
trusted library allocation
page read and write
malicious
2B57000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
F9D000
heap
page read and write
E97000
trusted library allocation
page execute and read and write
1B0000
heap
page read and write
71A000
stack
page read and write
5210000
heap
page execute and read and write
7D0000
heap
page read and write
2B72000
trusted library allocation
page read and write
E86000
trusted library allocation
page execute and read and write
E82000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
35D0000
direct allocation
page read and write
28C0000
trusted library allocation
page read and write
2910000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
BF0000
heap
page read and write
65F0000
heap
page read and write
36F9000
direct allocation
page read and write
56B2000
heap
page read and write
56BB000
heap
page read and write
5A0000
heap
page read and write
E60000
trusted library allocation
page read and write
576D000
trusted library allocation
page read and write
3430000
direct allocation
page read and write
36FD000
direct allocation
page read and write
E28000
heap
page read and write
57B0000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
400000
system
page execute and read and write
5E6E000
stack
page read and write
5F6D000
unkown
page read and write
EB0000
trusted library allocation
page read and write
E7D000
trusted library allocation
page execute and read and write
154E000
stack
page read and write
36F9000
direct allocation
page read and write
5660000
heap
page read and write
36F9000
direct allocation
page read and write
2902000
trusted library allocation
page read and write
149000
stack
page read and write
C64000
heap
page read and write
CB8000
heap
page read and write
376E000
direct allocation
page read and write
704C6000
unkown
page readonly
ED5000
heap
page read and write
28FD000
trusted library allocation
page read and write
35D0000
direct allocation
page read and write
2B5B000
trusted library allocation
page read and write
F9D000
heap
page read and write
376E000
direct allocation
page read and write
3553000
direct allocation
page read and write
D8B000
heap
page read and write
29DE000
stack
page read and write
5780000
heap
page read and write
28EE000
trusted library allocation
page read and write
E27000
heap
page read and write
780000
heap
page read and write
10B0000
heap
page read and write
2920000
trusted library allocation
page read and write
507E000
stack
page read and write
5790000
trusted library allocation
page read and write
100E000
stack
page read and write
660000
heap
page read and write
36F9000
direct allocation
page read and write
704CF000
unkown
page readonly
50A0000
heap
page read and write
35D0000
direct allocation
page read and write
3B6A000
trusted library allocation
page read and write
E95000
trusted library allocation
page execute and read and write
1C0000
heap
page read and write
51AC000
stack
page read and write
F9D000
heap
page read and write
36FD000
direct allocation
page read and write
7D7000
unkown
page readonly
2AFE000
stack
page read and write
D99000
heap
page read and write
F9D000
heap
page read and write
704B0000
unkown
page readonly
7C7000
unkown
page readonly
51EE000
stack
page read and write
5684000
heap
page read and write
376E000
direct allocation
page read and write
F9D000
heap
page read and write
28F6000
trusted library allocation
page read and write
7D7000
unkown
page readonly
7AE000
unkown
page readonly
7AE000
unkown
page readonly
F9D000
heap
page read and write
6620000
trusted library allocation
page execute and read and write
DE4000
heap
page read and write
4BFE000
stack
page read and write
2B61000
trusted library allocation
page read and write
5D90000
trusted library allocation
page execute and read and write
CF0000
heap
page read and write
376E000
direct allocation
page read and write
E8A000
trusted library allocation
page execute and read and write
F9D000
heap
page read and write
28DB000
trusted library allocation
page read and write
2B7F000
trusted library allocation
page read and write
664000
heap
page read and write
28E2000
trusted library allocation
page read and write
D99000
heap
page read and write
F9D000
heap
page read and write
CE4000
heap
page read and write
5D80000
trusted library allocation
page read and write
F9D000
heap
page read and write
F9D000
heap
page read and write
701000
unkown
page execute read
3B29000
trusted library allocation
page read and write
299C000
stack
page read and write
F51000
heap
page read and write
7BA000
unkown
page write copy
531E000
stack
page read and write
5760000
trusted library allocation
page read and write
36FD000
direct allocation
page read and write
56A4000
heap
page read and write
541E000
stack
page read and write
F9D000
heap
page read and write
F9D000
heap
page read and write
BD0000
heap
page read and write
28F1000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
2950000
heap
page execute and read and write
700000
unkown
page readonly
3B01000
trusted library allocation
page read and write
E6D000
trusted library allocation
page execute and read and write
376E000
direct allocation
page read and write
4F40000
heap
page read and write
3553000
direct allocation
page read and write
54D000
stack
page read and write
E70000
trusted library allocation
page read and write
28DE000
trusted library allocation
page read and write
E63000
trusted library allocation
page execute and read and write
C25000
heap
page read and write
57B7000
trusted library allocation
page read and write
289C000
stack
page read and write
36F9000
direct allocation
page read and write
E92000
trusted library allocation
page read and write
C0E000
stack
page read and write
7C7000
unkown
page readonly
7F460000
trusted library allocation
page execute and read and write
7D5000
unkown
page readonly
D5E000
heap
page read and write
F52000
heap
page execute and read and write
700000
unkown
page readonly
1018000
trusted library allocation
page read and write
36FD000
direct allocation
page read and write
3430000
direct allocation
page read and write
3430000
direct allocation
page read and write
F9E000
heap
page read and write
64EE000
stack
page read and write
376E000
direct allocation
page read and write
CD2000
heap
page read and write
57A0000
trusted library allocation
page execute and read and write
C3C000
stack
page read and write
50E000
stack
page read and write
D5A000
heap
page read and write
D99000
heap
page read and write
5098000
trusted library allocation
page read and write
C7A000
heap
page read and write
D50000
heap
page read and write
7BF000
unkown
page write copy
C1A000
heap
page read and write
F51000
heap
page read and write
5090000
trusted library allocation
page read and write
28EA000
trusted library allocation
page read and write
CD0000
heap
page read and write
194E000
stack
page read and write
36F9000
direct allocation
page read and write
7C4000
unkown
page readonly
1D0000
heap
page read and write
F9D000
heap
page read and write
F57000
heap
page read and write
F50000
heap
page read and write
BF8000
heap
page read and write
36FD000
direct allocation
page read and write
78D000
unkown
page readonly
DB8000
heap
page read and write
606D000
stack
page read and write
5777000
trusted library allocation
page read and write
EC0000
heap
page read and write
3430000
direct allocation
page read and write
D7B000
heap
page read and write
6900000
heap
page read and write
29F0000
heap
page read and write
704B1000
unkown
page execute read
28A0000
trusted library allocation
page execute and read and write
65EE000
stack
page read and write
590000
heap
page read and write
35D0000
direct allocation
page read and write
AF9000
stack
page read and write
D99000
heap
page read and write
3553000
direct allocation
page read and write
F9E000
heap
page read and write
F9D000
heap
page read and write
50A3000
heap
page read and write
2B8B000
trusted library allocation
page read and write
7BA000
unkown
page read and write
C1B000
stack
page read and write
3553000
direct allocation
page read and write
35D0000
direct allocation
page read and write
3553000
direct allocation
page read and write
3430000
direct allocation
page read and write
704CD000
unkown
page read and write
CF5000
heap
page read and write
3553000
direct allocation
page read and write
3430000
direct allocation
page read and write
551E000
stack
page read and write
78D000
unkown
page readonly
F9D000
heap
page read and write
7D5000
unkown
page readonly
BFC000
stack
page read and write
36FD000
direct allocation
page read and write
35D0000
direct allocation
page read and write
28B0000
trusted library allocation
page read and write
C27000
heap
page read and write
43E000
system
page execute and read and write
E64000
trusted library allocation
page read and write
DA3000
heap
page read and write
D97000
heap
page read and write
5E2D000
stack
page read and write
E9B000
trusted library allocation
page execute and read and write
5770000
trusted library allocation
page read and write
56C6000
heap
page read and write
DC5000
heap
page read and write
701000
unkown
page execute read
7C4000
unkown
page readonly
There are 220 hidden memdumps, click here to show them.