IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206/c4becf79229cb002.phpo
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206
unknown
http://185.215.113.206/c4becf79229cb002.php3
unknown
http://185.215.113.2067
unknown

Domains

Name
IP
Malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
7B1000
unkown
page execute and read and write
malicious
143E000
heap
page read and write
malicious
5160000
direct allocation
page read and write
malicious
490F000
stack
page read and write
1394000
heap
page read and write
1394000
heap
page read and write
3F0F000
stack
page read and write
1D4AF000
stack
page read and write
846000
unkown
page execute and read and write
1394000
heap
page read and write
4CD1000
heap
page read and write
E47000
unkown
page execute and write copy
1482000
heap
page read and write
4CD1000
heap
page read and write
FD5000
stack
page read and write
4CD1000
heap
page read and write
390E000
stack
page read and write
B81000
unkown
page execute and read and write
1420000
direct allocation
page read and write
1420000
direct allocation
page read and write
1394000
heap
page read and write
300F000
stack
page read and write
1D7DE000
stack
page read and write
1D12E000
stack
page read and write
C65000
unkown
page execute and read and write
444E000
stack
page read and write
52F0000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
1394000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
368E000
stack
page read and write
46CE000
stack
page read and write
3DCF000
stack
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
52D0000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
5300000
direct allocation
page execute and read and write
1420000
direct allocation
page read and write
364F000
stack
page read and write
1394000
heap
page read and write
5196000
direct allocation
page read and write
408E000
stack
page read and write
350F000
stack
page read and write
4CD1000
heap
page read and write
1394000
heap
page read and write
314F000
stack
page read and write
3C8F000
stack
page read and write
4CD1000
heap
page read and write
4B8F000
stack
page read and write
1487000
heap
page read and write
162E000
stack
page read and write
5160000
direct allocation
page read and write
1D22F000
stack
page read and write
1394000
heap
page read and write
1394000
heap
page read and write
E46000
unkown
page execute and read and write
EDC000
stack
page read and write
4CD1000
heap
page read and write
2F0E000
stack
page read and write
1394000
heap
page read and write
4CD1000
heap
page read and write
378F000
stack
page read and write
1394000
heap
page read and write
1410000
heap
page read and write
1394000
heap
page read and write
328F000
stack
page read and write
1240000
heap
page read and write
1394000
heap
page read and write
440F000
stack
page read and write
1394000
heap
page read and write
1394000
heap
page read and write
1394000
heap
page read and write
7B0000
unkown
page read and write
1420000
direct allocation
page read and write
9FA000
unkown
page write copy
4CD4000
heap
page read and write
4CD1000
heap
page read and write
CA4000
unkown
page execute and read and write
CA5000
unkown
page execute and write copy
468F000
stack
page read and write
1498000
heap
page read and write
1420000
direct allocation
page read and write
4CD1000
heap
page read and write
430E000
stack
page read and write
1394000
heap
page read and write
404F000
stack
page read and write
1420000
direct allocation
page read and write
4CCF000
stack
page read and write
1394000
heap
page read and write
1420000
direct allocation
page read and write
4CD1000
heap
page read and write
1D63D000
stack
page read and write
1420000
direct allocation
page read and write
4A4F000
stack
page read and write
FDD000
stack
page read and write
7B0000
unkown
page readonly
1420000
direct allocation
page read and write
1394000
heap
page read and write
5160000
direct allocation
page read and write
1D5FC000
stack
page read and write
3F4E000
stack
page read and write
52F0000
direct allocation
page execute and read and write
1D8DF000
stack
page read and write
1D73E000
stack
page read and write
13F7000
heap
page read and write
1394000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
1D26E000
stack
page read and write
418F000
stack
page read and write
13DE000
stack
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
47CF000
stack
page read and write
318E000
stack
page read and write
13F0000
heap
page read and write
38CF000
stack
page read and write
480E000
stack
page read and write
1394000
heap
page read and write
4CD1000
heap
page read and write
1394000
heap
page read and write
1394000
heap
page read and write
458E000
stack
page read and write
1D36F000
stack
page read and write
1394000
heap
page read and write
4CD1000
heap
page read and write
1D8E0000
heap
page read and write
32CE000
stack
page read and write
1CFEE000
stack
page read and write
1420000
direct allocation
page read and write
4CD1000
heap
page read and write
4CD0000
heap
page read and write
1420000
direct allocation
page read and write
143A000
heap
page read and write
4CD1000
heap
page read and write
1394000
heap
page read and write
4CF0000
heap
page read and write
1420000
direct allocation
page read and write
454F000
stack
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
41CE000
stack
page read and write
4CD1000
heap
page read and write
13FB000
heap
page read and write
304B000
stack
page read and write
4CD1000
heap
page read and write
1420000
direct allocation
page read and write
1394000
heap
page read and write
37CE000
stack
page read and write
1394000
heap
page read and write
1394000
heap
page read and write
9FA000
unkown
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
33CF000
stack
page read and write
4CD1000
heap
page read and write
3A4E000
stack
page read and write
4CD1000
heap
page read and write
1394000
heap
page read and write
1394000
heap
page read and write
3E0E000
stack
page read and write
4CD1000
heap
page read and write
5310000
direct allocation
page execute and read and write
42CF000
stack
page read and write
1390000
heap
page read and write
3B4F000
stack
page read and write
1394000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
1D3AE000
stack
page read and write
4CD1000
heap
page read and write
1394000
heap
page read and write
340E000
stack
page read and write
7E7000
unkown
page execute and read and write
14B3000
heap
page read and write
4DD0000
trusted library allocation
page read and write
4CD1000
heap
page read and write
4BCE000
stack
page read and write
172E000
stack
page read and write
1420000
direct allocation
page read and write
1D0EF000
stack
page read and write
51AE000
stack
page read and write
4CD1000
heap
page read and write
3B8E000
stack
page read and write
C8E000
unkown
page execute and read and write
5160000
direct allocation
page read and write
1394000
heap
page read and write
52C0000
direct allocation
page execute and read and write
7B1000
unkown
page execute and write copy
1394000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
83E000
unkown
page execute and read and write
1394000
heap
page read and write
3A0F000
stack
page read and write
85F000
unkown
page execute and read and write
1394000
heap
page read and write
9E8000
unkown
page execute and read and write
1394000
heap
page read and write
52AF000
stack
page read and write
4CD1000
heap
page read and write
1394000
heap
page read and write
4CD1000
heap
page read and write
4A8E000
stack
page read and write
494E000
stack
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
C95000
unkown
page execute and read and write
4CD1000
heap
page read and write
1430000
heap
page read and write
138D000
stack
page read and write
1394000
heap
page read and write
4CD1000
heap
page read and write
52C0000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
1320000
heap
page read and write
9FC000
unkown
page execute and read and write
1394000
heap
page read and write
1D4FE000
stack
page read and write
354E000
stack
page read and write
3CCE000
stack
page read and write
CA4000
unkown
page execute and write copy
52E0000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CE0000
heap
page read and write
1394000
heap
page read and write
There are 225 hidden memdumps, click here to show them.