IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/e2b1563c6670f193.php
185.215.113.206
malicious
http://185.215.113.206/R
unknown
http://185.215.113.206/e2b1563c6670f193.php/
unknown
http://185.215.113.206/e2b1563c6670f193.phpLZX
unknown
http://185.215.113.206/e2b1563c6670f193.php4Z
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.206/g
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
D38000
heap
page read and write
malicious
4A40000
direct allocation
page read and write
malicious
81000
unkown
page execute and read and write
malicious
45B1000
heap
page read and write
330E000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
2830000
direct allocation
page read and write
1CAFE000
stack
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
308E000
stack
page read and write
3F4F000
stack
page read and write
100E000
stack
page read and write
41CF000
stack
page read and write
B10000
heap
page read and write
45B1000
heap
page read and write
4A40000
direct allocation
page read and write
2DE000
unkown
page execute and read and write
2B4F000
stack
page read and write
45B1000
heap
page read and write
3D0E000
stack
page read and write
D1A000
heap
page read and write
2CA000
unkown
page execute and read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
2E0E000
stack
page read and write
45B1000
heap
page read and write
81000
unkown
page execute and write copy
45B1000
heap
page read and write
2F0F000
stack
page read and write
565000
unkown
page execute and read and write
2CCE000
stack
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
2DCF000
stack
page read and write
3CCE000
stack
page read and write
45B1000
heap
page read and write
2830000
direct allocation
page read and write
AF5000
stack
page read and write
40CE000
stack
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
3E4E000
stack
page read and write
2830000
direct allocation
page read and write
2847000
heap
page read and write
2830000
direct allocation
page read and write
45B1000
heap
page read and write
45C0000
heap
page read and write
45B1000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
57A000
unkown
page execute and write copy
36CE000
stack
page read and write
45B1000
heap
page read and write
D78000
heap
page read and write
1CBFF000
stack
page read and write
344E000
stack
page read and write
BB5000
heap
page read and write
B00000
heap
page read and write
448E000
stack
page read and write
3A4F000
stack
page read and write
282E000
stack
page read and write
45B1000
heap
page read and write
80000
unkown
page read and write
45B1000
heap
page read and write
3BCE000
stack
page read and write
45B1000
heap
page read and write
1CFEE000
stack
page read and write
2830000
direct allocation
page read and write
714000
unkown
page execute and write copy
2830000
direct allocation
page read and write
2830000
direct allocation
page read and write
45B1000
heap
page read and write
D10000
heap
page read and write
45B1000
heap
page read and write
458F000
stack
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
1CC6E000
stack
page read and write
45B1000
heap
page read and write
56B000
unkown
page execute and read and write
4A7E000
stack
page read and write
2830000
direct allocation
page read and write
CCE000
stack
page read and write
2840000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
D0E000
stack
page read and write
1CEED000
stack
page read and write
131000
unkown
page execute and read and write
4B7F000
stack
page read and write
2A4F000
stack
page read and write
45B1000
heap
page read and write
2830000
direct allocation
page read and write
45B2000
heap
page read and write
80000
unkown
page readonly
408F000
stack
page read and write
444F000
stack
page read and write
45B1000
heap
page read and write
1CABF000
stack
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
27EB000
stack
page read and write
4A40000
direct allocation
page read and write
45B1000
heap
page read and write
3F8E000
stack
page read and write
3E0F000
stack
page read and write
2830000
direct allocation
page read and write
354F000
stack
page read and write
2830000
direct allocation
page read and write
45B1000
heap
page read and write
318F000
stack
page read and write
B7E000
stack
page read and write
31CE000
stack
page read and write
45B1000
heap
page read and write
390F000
stack
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
394E000
stack
page read and write
45B1000
heap
page read and write
2B8E000
stack
page read and write
AFE000
stack
page read and write
D95000
heap
page read and write
294F000
stack
page read and write
45B1000
heap
page read and write
D64000
heap
page read and write
2830000
direct allocation
page read and write
45B1000
heap
page read and write
713000
unkown
page execute and read and write
37CF000
stack
page read and write
45B1000
heap
page read and write
D1E000
heap
page read and write
1CD6F000
stack
page read and write
284B000
heap
page read and write
D33000
heap
page read and write
45B0000
heap
page read and write
45B1000
heap
page read and write
46D000
unkown
page execute and read and write
2830000
direct allocation
page read and write
4BCE000
stack
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
3B8F000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
2C8F000
stack
page read and write
13D000
unkown
page execute and read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
32CF000
stack
page read and write
1C97F000
stack
page read and write
430F000
stack
page read and write
1C9BE000
stack
page read and write
368F000
stack
page read and write
45B1000
heap
page read and write
3A8E000
stack
page read and write
F0F000
stack
page read and write
45B1000
heap
page read and write
1CEAC000
stack
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
4B90000
direct allocation
page execute and read and write
45B1000
heap
page read and write
434E000
stack
page read and write
45B1000
heap
page read and write
2F4E000
stack
page read and write
45B1000
heap
page read and write
4590000
heap
page read and write
45B1000
heap
page read and write
BB0000
heap
page read and write
340F000
stack
page read and write
45B1000
heap
page read and write
162000
unkown
page execute and read and write
1CDAE000
stack
page read and write
45B1000
heap
page read and write
7AC000
stack
page read and write
45B1000
heap
page read and write
46B0000
trusted library allocation
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
57A000
unkown
page execute and read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
45B1000
heap
page read and write
420E000
stack
page read and write
358E000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
304F000
stack
page read and write
45B1000
heap
page read and write
45D0000
heap
page read and write
380E000
stack
page read and write
BA0000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
45B1000
heap
page read and write
543000
unkown
page execute and read and write
57B000
unkown
page execute and write copy
2830000
direct allocation
page read and write
There are 195 hidden memdumps, click here to show them.