IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/e2b1563c6670f193.php
185.215.113.206
malicious
http://185.215.113.206/e2b1563c6670f193.php-
unknown
http://185.215.113.206/e2b1563c6670f193.php/
unknown
http://185.215.113.206/e2b1563c6670f193.php9
unknown
http://185.215.113.206/e2b1563c6670f193.phpY
unknown
http://185.215.113.206/e2b1563c6670f193.php/4
unknown
http://185.215.113.206/e2b1563c6670f193.php:
unknown
http://185.215.113.206Y
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4B50000
direct allocation
page read and write
malicious
521000
unkown
page execute and read and write
malicious
EFE000
heap
page read and write
malicious
308E000
stack
page read and write
46D1000
heap
page read and write
354F000
stack
page read and write
5D1000
unkown
page execute and read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
2C8F000
stack
page read and write
28CE000
stack
page read and write
46D1000
heap
page read and write
3CCF000
stack
page read and write
46D1000
heap
page read and write
2910000
direct allocation
page read and write
2910000
direct allocation
page read and write
2A4F000
stack
page read and write
2910000
direct allocation
page read and write
46D1000
heap
page read and write
A0C000
unkown
page execute and read and write
46CF000
stack
page read and write
5DD000
unkown
page execute and read and write
4B8E000
stack
page read and write
46D1000
heap
page read and write
F7F000
heap
page read and write
46D1000
heap
page read and write
9E8000
unkown
page execute and read and write
46D0000
heap
page read and write
390F000
stack
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
D4E000
stack
page read and write
46D1000
heap
page read and write
76A000
unkown
page execute and read and write
4F5000
stack
page read and write
32CF000
stack
page read and write
3F8E000
stack
page read and write
45CE000
stack
page read and write
46D1000
heap
page read and write
31CE000
stack
page read and write
A15000
unkown
page execute and read and write
420E000
stack
page read and write
4CA0000
direct allocation
page execute and read and write
2910000
direct allocation
page read and write
46D1000
heap
page read and write
A23000
unkown
page execute and write copy
46D1000
heap
page read and write
2910000
direct allocation
page read and write
520000
unkown
page readonly
4CC0000
direct allocation
page execute and read and write
3E0F000
stack
page read and write
46D1000
heap
page read and write
3F4F000
stack
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
77E000
unkown
page execute and read and write
46D1000
heap
page read and write
2910000
direct allocation
page read and write
46D1000
heap
page read and write
1D0EC000
stack
page read and write
602000
unkown
page execute and read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
2910000
direct allocation
page read and write
46D1000
heap
page read and write
4C90000
direct allocation
page execute and read and write
1CFEE000
stack
page read and write
46D1000
heap
page read and write
2930000
direct allocation
page read and write
4FE000
stack
page read and write
1CABE000
stack
page read and write
D70000
heap
page read and write
340F000
stack
page read and write
2E0E000
stack
page read and write
46D1000
heap
page read and write
36CE000
stack
page read and write
46D1000
heap
page read and write
2910000
direct allocation
page read and write
46D1000
heap
page read and write
3B8F000
stack
page read and write
2910000
direct allocation
page read and write
2930000
direct allocation
page read and write
BC6000
unkown
page execute and write copy
4CC0000
direct allocation
page execute and read and write
F3F000
heap
page read and write
46D1000
heap
page read and write
4C8F000
stack
page read and write
1CEAE000
stack
page read and write
434E000
stack
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
330E000
stack
page read and write
520000
unkown
page read and write
358E000
stack
page read and write
46D1000
heap
page read and write
D80000
heap
page read and write
2910000
direct allocation
page read and write
3D0E000
stack
page read and write
290B000
stack
page read and write
10EE000
stack
page read and write
3BCE000
stack
page read and write
46D1000
heap
page read and write
1CFAE000
stack
page read and write
46D1000
heap
page read and write
2F4E000
stack
page read and write
46D1000
heap
page read and write
EF8000
heap
page read and write
46D1000
heap
page read and write
294B000
heap
page read and write
46D1000
heap
page read and write
2910000
direct allocation
page read and write
3E4E000
stack
page read and write
46D1000
heap
page read and write
EF0000
heap
page read and write
F56000
heap
page read and write
344E000
stack
page read and write
46D1000
heap
page read and write
2910000
direct allocation
page read and write
46D1000
heap
page read and write
2B4F000
stack
page read and write
46D1000
heap
page read and write
40CE000
stack
page read and write
304F000
stack
page read and write
F82000
heap
page read and write
46D1000
heap
page read and write
ED0000
heap
page read and write
46D1000
heap
page read and write
ECE000
stack
page read and write
408F000
stack
page read and write
1CE5F000
stack
page read and write
3A4F000
stack
page read and write
46F0000
heap
page read and write
46D1000
heap
page read and write
904000
unkown
page execute and read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
1CBFE000
stack
page read and write
4CB0000
direct allocation
page execute and read and write
1CCFF000
stack
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
F45000
heap
page read and write
2DCF000
stack
page read and write
4CCE000
stack
page read and write
318F000
stack
page read and write
2947000
heap
page read and write
41CF000
stack
page read and write
4B10000
trusted library allocation
page read and write
46D1000
heap
page read and write
2CCE000
stack
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
BC5000
unkown
page execute and read and write
4CE0000
direct allocation
page execute and read and write
448E000
stack
page read and write
1CBBF000
stack
page read and write
46D1000
heap
page read and write
380E000
stack
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
430F000
stack
page read and write
2910000
direct allocation
page read and write
A23000
unkown
page execute and read and write
CE0000
heap
page read and write
46D1000
heap
page read and write
2910000
direct allocation
page read and write
46D1000
heap
page read and write
C00000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
1FC000
stack
page read and write
F72000
heap
page read and write
521000
unkown
page execute and write copy
1CA7F000
stack
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
37CF000
stack
page read and write
46D1000
heap
page read and write
E8E000
stack
page read and write
3A8E000
stack
page read and write
1CD5E000
stack
page read and write
A24000
unkown
page execute and write copy
46E0000
heap
page read and write
46D1000
heap
page read and write
444F000
stack
page read and write
2940000
heap
page read and write
458F000
stack
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
368F000
stack
page read and write
2B8E000
stack
page read and write
D85000
heap
page read and write
394E000
stack
page read and write
2F0F000
stack
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
There are 193 hidden memdumps, click here to show them.