IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/e2b1563c6670f193.php
185.215.113.206
malicious
http://185.215.113.206/e2b1563c6670f193.php3u
unknown
http://185.215.113.206/e2b1563c6670f193.php/
unknown
http://185.215.113.206/e2b1563c6670f193.phpk
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.206/&u
unknown
http://185.215.113.206/e2b1563c6670f193.phpt
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
D1000
unkown
page execute and read and write
malicious
4A80000
direct allocation
page read and write
malicious
B78000
heap
page read and write
malicious
45F1000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
EFE000
stack
page read and write
7F4000
heap
page read and write
45F1000
heap
page read and write
28BE000
stack
page read and write
45F1000
heap
page read and write
45E0000
direct allocation
page read and write
3BCF000
stack
page read and write
45F1000
heap
page read and write
28C0000
heap
page read and write
181000
unkown
page execute and read and write
45F1000
heap
page read and write
D0000
unkown
page read and write
4210000
heap
page read and write
45F1000
heap
page read and write
45E0000
direct allocation
page read and write
32E000
unkown
page execute and read and write
45F1000
heap
page read and write
2F4F000
stack
page read and write
7F4000
heap
page read and write
3C0E000
stack
page read and write
7F4000
heap
page read and write
45F1000
heap
page read and write
4C00000
direct allocation
page execute and read and write
2E4E000
stack
page read and write
7F4000
heap
page read and write
B73000
heap
page read and write
31CF000
stack
page read and write
45F0000
heap
page read and write
7F4000
heap
page read and write
45F1000
heap
page read and write
4C00000
direct allocation
page execute and read and write
4BD0000
direct allocation
page execute and read and write
435F000
stack
page read and write
45F1000
heap
page read and write
45E0000
direct allocation
page read and write
45E0000
direct allocation
page read and write
45F1000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
7F4000
heap
page read and write
BD6000
heap
page read and write
384E000
stack
page read and write
7F4000
heap
page read and write
B5A000
heap
page read and write
45F1000
heap
page read and write
4610000
heap
page read and write
7F4000
heap
page read and write
45F1000
heap
page read and write
A3C000
stack
page read and write
45F1000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
7F4000
heap
page read and write
7F4000
heap
page read and write
5D7000
unkown
page execute and write copy
45E0000
direct allocation
page read and write
45F1000
heap
page read and write
31A000
unkown
page execute and read and write
380F000
stack
page read and write
45E0000
direct allocation
page read and write
1CB7E000
stack
page read and write
7F4000
heap
page read and write
3F8F000
stack
page read and write
B76000
heap
page read and write
45E0000
direct allocation
page read and write
5C8000
unkown
page execute and read and write
1CF4D000
stack
page read and write
394F000
stack
page read and write
45F1000
heap
page read and write
439E000
stack
page read and write
45F1000
heap
page read and write
5D8000
unkown
page execute and write copy
7F4000
heap
page read and write
40CF000
stack
page read and write
45F1000
heap
page read and write
2ACF000
stack
page read and write
45F1000
heap
page read and write
7F4000
heap
page read and write
334E000
stack
page read and write
3ACE000
stack
page read and write
C70000
heap
page read and write
3E4F000
stack
page read and write
7F4000
heap
page read and write
45E0000
direct allocation
page read and write
28C7000
heap
page read and write
287E000
stack
page read and write
EBE000
stack
page read and write
44DE000
stack
page read and write
45DF000
stack
page read and write
358F000
stack
page read and write
4BA000
unkown
page execute and read and write
45E0000
direct allocation
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
4ABE000
stack
page read and write
283C000
stack
page read and write
45E0000
direct allocation
page read and write
45F1000
heap
page read and write
45F2000
heap
page read and write
45E0000
direct allocation
page read and write
27FE000
stack
page read and write
7F4000
heap
page read and write
45F1000
heap
page read and write
DBE000
stack
page read and write
2F8E000
stack
page read and write
1B2000
unkown
page execute and read and write
BA2000
heap
page read and write
4BBF000
stack
page read and write
45F1000
heap
page read and write
7F4000
heap
page read and write
2E0F000
stack
page read and write
45F1000
heap
page read and write
425E000
stack
page read and write
3E8E000
stack
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
7F4000
heap
page read and write
7F4000
heap
page read and write
4A60000
heap
page read and write
4A80000
direct allocation
page read and write
330F000
stack
page read and write
45F1000
heap
page read and write
59E000
unkown
page execute and read and write
7F4000
heap
page read and write
1CB3F000
stack
page read and write
7F4000
heap
page read and write
45F1000
heap
page read and write
D50000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
1CF0E000
stack
page read and write
1C9FF000
stack
page read and write
45F1000
heap
page read and write
7F4000
heap
page read and write
45F1000
heap
page read and write
308F000
stack
page read and write
7F4000
heap
page read and write
449F000
stack
page read and write
7F4000
heap
page read and write
45F1000
heap
page read and write
3D4E000
stack
page read and write
410E000
stack
page read and write
D0000
unkown
page readonly
45F1000
heap
page read and write
7F4000
heap
page read and write
398E000
stack
page read and write
D1000
unkown
page execute and write copy
7F4000
heap
page read and write
4A30000
trusted library allocation
page read and write
7F4000
heap
page read and write
45F1000
heap
page read and write
7F4000
heap
page read and write
45E0000
direct allocation
page read and write
320E000
stack
page read and write
45F1000
heap
page read and write
7F4000
heap
page read and write
29CF000
stack
page read and write
45F1000
heap
page read and write
4C10000
direct allocation
page execute and read and write
4A80000
direct allocation
page read and write
1D04C000
stack
page read and write
45F1000
heap
page read and write
7F4000
heap
page read and write
1CE0D000
stack
page read and write
BB9000
heap
page read and write
45E0000
direct allocation
page read and write
45F1000
heap
page read and write
B5E000
heap
page read and write
1CDCF000
stack
page read and write
45F1000
heap
page read and write
3A8F000
stack
page read and write
775000
unkown
page execute and read and write
36CF000
stack
page read and write
B50000
heap
page read and write
5C1000
unkown
page execute and read and write
7F4000
heap
page read and write
4600000
heap
page read and write
5D7000
unkown
page execute and read and write
35CE000
stack
page read and write
1CC7F000
stack
page read and write
2BCF000
stack
page read and write
45F1000
heap
page read and write
3FCE000
stack
page read and write
7F4000
heap
page read and write
45F1000
heap
page read and write
7F4000
heap
page read and write
45F1000
heap
page read and write
18D000
unkown
page execute and read and write
2D0E000
stack
page read and write
45F1000
heap
page read and write
7F4000
heap
page read and write
45F1000
heap
page read and write
FFE000
stack
page read and write
4C20000
direct allocation
page execute and read and write
B3E000
stack
page read and write
30CE000
stack
page read and write
420F000
stack
page read and write
1CA3E000
stack
page read and write
45F1000
heap
page read and write
3D0F000
stack
page read and write
45E0000
direct allocation
page read and write
7F4000
heap
page read and write
B35000
stack
page read and write
45F1000
heap
page read and write
344F000
stack
page read and write
348E000
stack
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
2CCF000
stack
page read and write
28CB000
heap
page read and write
1CCCE000
stack
page read and write
7F0000
heap
page read and write
370E000
stack
page read and write
1C8FE000
stack
page read and write
There are 218 hidden memdumps, click here to show them.