IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/e2b1563c6670f193.php
185.215.113.206
malicious
http://185.215.113.206/3
unknown
http://185.215.113.206/e2b1563c6670f193.php-
unknown
http://185.215.113.206/e2b1563c6670f193.php/D
unknown
http://185.215.113.206/M
unknown
http://185.215.113.206/e2b1563c6670f193.phpl
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.206/e2b1563c6670f193.php4
unknown
http://185.215.113.206/e2b1563c6670f193.phpT
unknown
http://185.215.113.206/e2b1563c6670f193.phpt
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
BB8000
heap
page read and write
malicious
4FA0000
direct allocation
page read and write
malicious
E91000
unkown
page execute and read and write
malicious
4B00000
direct allocation
page read and write
4B11000
heap
page read and write
B04000
heap
page read and write
477E000
stack
page read and write
4B11000
heap
page read and write
B04000
heap
page read and write
4B11000
heap
page read and write
B04000
heap
page read and write
B04000
heap
page read and write
4B11000
heap
page read and write
337E000
stack
page read and write
4B11000
heap
page read and write
397F000
stack
page read and write
B04000
heap
page read and write
4B00000
direct allocation
page read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
1D19F000
stack
page read and write
4B11000
heap
page read and write
4AFF000
stack
page read and write
B04000
heap
page read and write
1D46D000
stack
page read and write
B9E000
heap
page read and write
4B11000
heap
page read and write
4F50000
trusted library allocation
page read and write
B04000
heap
page read and write
4B00000
direct allocation
page read and write
5140000
direct allocation
page execute and read and write
35BF000
stack
page read and write
1D05F000
stack
page read and write
31FF000
stack
page read and write
4B11000
heap
page read and write
30BF000
stack
page read and write
B04000
heap
page read and write
3BFF000
stack
page read and write
1D32D000
stack
page read and write
B04000
heap
page read and write
E8E000
stack
page read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
B04000
heap
page read and write
5100000
direct allocation
page execute and read and write
4B00000
direct allocation
page read and write
1CF5E000
stack
page read and write
487F000
stack
page read and write
4B11000
heap
page read and write
383F000
stack
page read and write
3D7E000
stack
page read and write
B04000
heap
page read and write
B04000
heap
page read and write
B04000
heap
page read and write
50DF000
stack
page read and write
F41000
unkown
page execute and read and write
1388000
unkown
page execute and write copy
427E000
stack
page read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
BF8000
heap
page read and write
4B20000
heap
page read and write
4FDE000
stack
page read and write
4B00000
direct allocation
page read and write
4B11000
heap
page read and write
B04000
heap
page read and write
4B11000
heap
page read and write
1D56C000
stack
page read and write
4B00000
direct allocation
page read and write
43BE000
stack
page read and write
4B11000
heap
page read and write
50F0000
direct allocation
page execute and read and write
4B11000
heap
page read and write
3D3F000
stack
page read and write
48BE000
stack
page read and write
B04000
heap
page read and write
F4D000
unkown
page execute and read and write
2E77000
heap
page read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
4B30000
heap
page read and write
1D42E000
stack
page read and write
423F000
stack
page read and write
E90000
unkown
page read and write
2D1E000
stack
page read and write
4B10000
heap
page read and write
4B11000
heap
page read and write
B8E000
stack
page read and write
34BE000
stack
page read and write
36FF000
stack
page read and write
2E60000
heap
page read and write
2FBE000
stack
page read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
4B00000
direct allocation
page read and write
4B11000
heap
page read and write
BE4000
heap
page read and write
3C3E000
stack
page read and write
2E70000
heap
page read and write
1378000
unkown
page execute and read and write
4B11000
heap
page read and write
4B00000
direct allocation
page read and write
4B11000
heap
page read and write
B04000
heap
page read and write
B04000
heap
page read and write
126F000
unkown
page execute and read and write
9E0000
heap
page read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
44BF000
stack
page read and write
4B11000
heap
page read and write
C20000
heap
page read and write
347F000
stack
page read and write
4B11000
heap
page read and write
3E7F000
stack
page read and write
10EE000
unkown
page execute and read and write
4F80000
heap
page read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
985000
stack
page read and write
4B18000
heap
page read and write
B04000
heap
page read and write
B04000
heap
page read and write
B04000
heap
page read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
B04000
heap
page read and write
4FA0000
direct allocation
page read and write
B04000
heap
page read and write
1387000
unkown
page execute and write copy
B4E000
stack
page read and write
D8E000
stack
page read and write
B04000
heap
page read and write
B04000
heap
page read and write
88C000
stack
page read and write
B04000
heap
page read and write
4B11000
heap
page read and write
4B00000
direct allocation
page read and write
1D09E000
stack
page read and write
44FE000
stack
page read and write
413E000
stack
page read and write
B04000
heap
page read and write
437F000
stack
page read and write
35FE000
stack
page read and write
4B11000
heap
page read and write
1D1EE000
stack
page read and write
1CF1F000
stack
page read and write
B90000
heap
page read and write
B04000
heap
page read and write
B04000
heap
page read and write
C15000
heap
page read and write
B04000
heap
page read and write
4B00000
direct allocation
page read and write
5110000
direct allocation
page execute and read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
49FE000
stack
page read and write
4B11000
heap
page read and write
2E1F000
stack
page read and write
4B11000
heap
page read and write
4B00000
direct allocation
page read and write
3AFE000
stack
page read and write
B04000
heap
page read and write
323E000
stack
page read and write
4B11000
heap
page read and write
463E000
stack
page read and write
4B11000
heap
page read and write
5130000
direct allocation
page execute and read and write
5120000
direct allocation
page execute and read and write
1520000
unkown
page execute and read and write
4B00000
direct allocation
page read and write
3ABF000
stack
page read and write
E90000
unkown
page readonly
1521000
unkown
page execute and write copy
AC0000
heap
page read and write
F72000
unkown
page execute and read and write
4B11000
heap
page read and write
B00000
heap
page read and write
134A000
unkown
page execute and read and write
45FF000
stack
page read and write
BB3000
heap
page read and write
10DA000
unkown
page execute and read and write
40FF000
stack
page read and write
4B11000
heap
page read and write
B04000
heap
page read and write
2E7B000
heap
page read and write
B04000
heap
page read and write
1387000
unkown
page execute and read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
39BE000
stack
page read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
B04000
heap
page read and write
B04000
heap
page read and write
49BF000
stack
page read and write
387E000
stack
page read and write
4B11000
heap
page read and write
333F000
stack
page read and write
98F000
stack
page read and write
3FFE000
stack
page read and write
373E000
stack
page read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
B9A000
heap
page read and write
2F7F000
stack
page read and write
3EBE000
stack
page read and write
4B11000
heap
page read and write
B04000
heap
page read and write
1371000
unkown
page execute and read and write
30FE000
stack
page read and write
473F000
stack
page read and write
5120000
direct allocation
page execute and read and write
B04000
heap
page read and write
4FA0000
direct allocation
page read and write
4B00000
direct allocation
page read and write
4B11000
heap
page read and write
2E5B000
stack
page read and write
B04000
heap
page read and write
4B00000
direct allocation
page read and write
3FBF000
stack
page read and write
4B11000
heap
page read and write
1CE1E000
stack
page read and write
1D2EF000
stack
page read and write
4B11000
heap
page read and write
4B11000
heap
page read and write
E91000
unkown
page execute and write copy
4B11000
heap
page read and write
There are 222 hidden memdumps, click here to show them.