IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/e2b1563c6670f193.php
185.215.113.206
malicious
http://185.215.113.206/e2b1563c6670f193.php/
unknown
http://185.215.113.206/e2b1563c6670f193.phpJ
unknown
http://185.215.113.206/3C;
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
9E1000
unkown
page execute and read and write
malicious
4F40000
direct allocation
page read and write
malicious
139E000
heap
page read and write
malicious
4AB1000
heap
page read and write
1210000
direct allocation
page read and write
346E000
stack
page read and write
4AB1000
heap
page read and write
9E0000
unkown
page readonly
4F40000
direct allocation
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
1D16E000
stack
page read and write
4F40000
direct allocation
page read and write
432F000
stack
page read and write
1220000
heap
page read and write
11B7000
heap
page read and write
4AB1000
heap
page read and write
1D3FE000
stack
page read and write
EE3000
unkown
page execute and write copy
486E000
stack
page read and write
1200000
heap
page read and write
50E0000
direct allocation
page execute and read and write
37EF000
stack
page read and write
1D26F000
stack
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
3FAE000
stack
page read and write
396E000
stack
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
1D4FE000
stack
page read and write
507F000
stack
page read and write
40AF000
stack
page read and write
4AB1000
heap
page read and write
1D00E000
stack
page read and write
1084000
unkown
page execute and read and write
472E000
stack
page read and write
41EF000
stack
page read and write
3E2F000
stack
page read and write
4AB1000
heap
page read and write
A91000
unkown
page execute and read and write
DCD000
unkown
page execute and read and write
1210000
direct allocation
page read and write
4AB1000
heap
page read and write
50F0000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
50A0000
direct allocation
page execute and read and write
2E2F000
stack
page read and write
4AB1000
heap
page read and write
119E000
stack
page read and write
1D10F000
stack
page read and write
4AB1000
heap
page read and write
1225000
heap
page read and write
30AE000
stack
page read and write
5FC000
stack
page read and write
8FF000
stack
page read and write
332E000
stack
page read and write
132E000
stack
page read and write
4AB1000
heap
page read and write
4BB0000
trusted library allocation
page read and write
4AB1000
heap
page read and write
382E000
stack
page read and write
158E000
stack
page read and write
31EE000
stack
page read and write
4AAF000
stack
page read and write
4AB1000
heap
page read and write
49AE000
stack
page read and write
482F000
stack
page read and write
4AB1000
heap
page read and write
392F000
stack
page read and write
4AB1000
heap
page read and write
50B0000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
9E1000
unkown
page execute and write copy
4AB1000
heap
page read and write
4AB1000
heap
page read and write
4AD0000
heap
page read and write
356F000
stack
page read and write
4AB1000
heap
page read and write
ED3000
unkown
page execute and read and write
36EE000
stack
page read and write
4AB1000
heap
page read and write
1210000
direct allocation
page read and write
1210000
direct allocation
page read and write
4AB1000
heap
page read and write
4AB0000
heap
page read and write
46EF000
stack
page read and write
1CFCF000
stack
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
50CE000
stack
page read and write
C3E000
unkown
page execute and read and write
4AB1000
heap
page read and write
342F000
stack
page read and write
4AB1000
heap
page read and write
2F2F000
stack
page read and write
EE2000
unkown
page execute and write copy
4AB1000
heap
page read and write
11BB000
heap
page read and write
9E0000
unkown
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
ECB000
unkown
page execute and read and write
1D3BD000
stack
page read and write
1411000
heap
page read and write
4AB1000
heap
page read and write
3D2E000
stack
page read and write
1D2BE000
stack
page read and write
3BAF000
stack
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
1210000
direct allocation
page read and write
13F8000
heap
page read and write
4AB1000
heap
page read and write
1CE8F000
stack
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
11B0000
heap
page read and write
436E000
stack
page read and write
1370000
heap
page read and write
4AB1000
heap
page read and write
422E000
stack
page read and write
1D6A0000
heap
page read and write
3AAE000
stack
page read and write
4AB1000
heap
page read and write
C2A000
unkown
page execute and read and write
4AB1000
heap
page read and write
9CD000
stack
page read and write
1390000
heap
page read and write
50D0000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
1210000
direct allocation
page read and write
3A6F000
stack
page read and write
32EF000
stack
page read and write
50C0000
direct allocation
page execute and read and write
950000
heap
page read and write
3E6E000
stack
page read and write
13E2000
heap
page read and write
4AB1000
heap
page read and write
446F000
stack
page read and write
4AC0000
heap
page read and write
45EE000
stack
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
1085000
unkown
page execute and write copy
1210000
direct allocation
page read and write
5090000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
44AE000
stack
page read and write
36AF000
stack
page read and write
11FE000
stack
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
1D59E000
stack
page read and write
1210000
direct allocation
page read and write
4AC5000
heap
page read and write
139A000
heap
page read and write
35AE000
stack
page read and write
1210000
direct allocation
page read and write
31AF000
stack
page read and write
496F000
stack
page read and write
3BEE000
stack
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
EE2000
unkown
page execute and read and write
4AB1000
heap
page read and write
AC2000
unkown
page execute and read and write
4AB1000
heap
page read and write
1210000
direct allocation
page read and write
2F6E000
stack
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
1D69E000
stack
page read and write
136C000
stack
page read and write
EA7000
unkown
page execute and read and write
4AB1000
heap
page read and write
1210000
direct allocation
page read and write
3F6F000
stack
page read and write
960000
heap
page read and write
4AB1000
heap
page read and write
4F7E000
stack
page read and write
4AB1000
heap
page read and write
45AF000
stack
page read and write
50C0000
direct allocation
page execute and read and write
3CEF000
stack
page read and write
1210000
direct allocation
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
1210000
direct allocation
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
40EE000
stack
page read and write
4AB1000
heap
page read and write
1210000
direct allocation
page read and write
4AB1000
heap
page read and write
A9D000
unkown
page execute and read and write
8F5000
stack
page read and write
306F000
stack
page read and write
1CECE000
stack
page read and write
There are 195 hidden memdumps, click here to show them.