IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php/=
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206/ctionSettingsLMEM80
unknown
http://185.215.113.206/n
unknown
http://185.215.113.206/c4becf79229cb002.php.j
unknown
http://185.215.113.206/c4becf79229cb002.phpM
unknown
http://185.215.113.206
unknown
http://185.215.113.206/tVersion
unknown
http://185.215.113.206/c4becf79229cb002.php/3
unknown
185.215.113.206/c4becf79229cb002.php
http://185.215.113.206/c4becf79229cb002.php/r
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4DF0000
direct allocation
page read and write
malicious
F9E000
heap
page read and write
malicious
401000
unkown
page execute and read and write
malicious
4971000
heap
page read and write
1D00E000
stack
page read and write
41EF000
stack
page read and write
4971000
heap
page read and write
10C4000
heap
page read and write
4971000
heap
page read and write
10C4000
heap
page read and write
392F000
stack
page read and write
1CC3E000
stack
page read and write
2E2F000
stack
page read and write
2BBB000
stack
page read and write
10C4000
heap
page read and write
10C4000
heap
page read and write
1013000
heap
page read and write
4971000
heap
page read and write
40AF000
stack
page read and write
332E000
stack
page read and write
10C4000
heap
page read and write
2C00000
direct allocation
page execute and read and write
45EE000
stack
page read and write
4971000
heap
page read and write
346E000
stack
page read and write
432F000
stack
page read and write
F70000
direct allocation
page read and write
1CFBF000
stack
page read and write
10C4000
heap
page read and write
F3E000
stack
page read and write
4971000
heap
page read and write
1090000
direct allocation
page read and write
4971000
heap
page read and write
F70000
direct allocation
page read and write
4971000
heap
page read and write
4E26000
direct allocation
page read and write
10C4000
heap
page read and write
1CEBE000
stack
page read and write
1CE7E000
stack
page read and write
30AE000
stack
page read and write
10C4000
heap
page read and write
4971000
heap
page read and write
10C4000
heap
page read and write
10C4000
heap
page read and write
1D530000
heap
page read and write
400000
unkown
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
10C4000
heap
page read and write
422E000
stack
page read and write
8E1000
unkown
page execute and read and write
10C4000
heap
page read and write
8EF000
unkown
page execute and write copy
4971000
heap
page read and write
2C10000
direct allocation
page execute and read and write
4971000
heap
page read and write
4971000
heap
page read and write
10C4000
heap
page read and write
4971000
heap
page read and write
4F30000
direct allocation
page execute and read and write
4970000
heap
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
44AE000
stack
page read and write
10C4000
heap
page read and write
FD7000
heap
page read and write
400000
unkown
page readonly
10C4000
heap
page read and write
10C4000
heap
page read and write
4971000
heap
page read and write
10C4000
heap
page read and write
4971000
heap
page read and write
1CD3F000
stack
page read and write
4971000
heap
page read and write
10C4000
heap
page read and write
4F40000
direct allocation
page execute and read and write
101C000
heap
page read and write
3F6F000
stack
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
2C2B000
heap
page read and write
2D2F000
stack
page read and write
F70000
direct allocation
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
3AAE000
stack
page read and write
31EE000
stack
page read and write
F70000
direct allocation
page read and write
10C4000
heap
page read and write
4972000
heap
page read and write
129F000
stack
page read and write
10C4000
heap
page read and write
FF9000
heap
page read and write
1CD7E000
stack
page read and write
436E000
stack
page read and write
4971000
heap
page read and write
10C4000
heap
page read and write
4980000
heap
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
10C4000
heap
page read and write
4F50000
direct allocation
page execute and read and write
4971000
heap
page read and write
8B1000
unkown
page execute and read and write
4F30000
direct allocation
page execute and read and write
10C0000
heap
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
2C27000
heap
page read and write
4971000
heap
page read and write
F60000
heap
page read and write
4971000
heap
page read and write
64A000
unkown
page write copy
A8B000
unkown
page execute and read and write
4971000
heap
page read and write
396E000
stack
page read and write
4971000
heap
page read and write
1D14D000
stack
page read and write
F70000
direct allocation
page read and write
4971000
heap
page read and write
F9A000
heap
page read and write
10C4000
heap
page read and write
2BFE000
stack
page read and write
4971000
heap
page read and write
B80000
heap
page read and write
10C4000
heap
page read and write
10C4000
heap
page read and write
10C4000
heap
page read and write
4971000
heap
page read and write
482F000
stack
page read and write
10C4000
heap
page read and write
35AE000
stack
page read and write
4A70000
trusted library allocation
page read and write
10C4000
heap
page read and write
F70000
direct allocation
page read and write
4971000
heap
page read and write
10B0000
direct allocation
page execute and read and write
2B7E000
stack
page read and write
4971000
heap
page read and write
10C4000
heap
page read and write
4971000
heap
page read and write
64C000
unkown
page execute and read and write
A8C000
unkown
page execute and write copy
8D9000
unkown
page execute and read and write
4F60000
direct allocation
page execute and read and write
4971000
heap
page read and write
48E000
unkown
page execute and read and write
45AF000
stack
page read and write
4F2F000
stack
page read and write
356F000
stack
page read and write
4971000
heap
page read and write
F70000
direct allocation
page read and write
1090000
direct allocation
page read and write
3CEF000
stack
page read and write
10C4000
heap
page read and write
382E000
stack
page read and write
10C4000
heap
page read and write
F70000
direct allocation
page read and write
8F0000
unkown
page execute and write copy
F70000
direct allocation
page read and write
3A6F000
stack
page read and write
4971000
heap
page read and write
437000
unkown
page execute and read and write
401000
unkown
page execute and write copy
B1C000
stack
page read and write
F70000
direct allocation
page read and write
10C4000
heap
page read and write
342F000
stack
page read and write
4971000
heap
page read and write
10C4000
heap
page read and write
3E6E000
stack
page read and write
1090000
direct allocation
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
10C4000
heap
page read and write
472E000
stack
page read and write
1D24E000
stack
page read and write
306F000
stack
page read and write
1D38C000
stack
page read and write
10C4000
heap
page read and write
4971000
heap
page read and write
638000
unkown
page execute and read and write
10C4000
heap
page read and write
F70000
direct allocation
page read and write
31AF000
stack
page read and write
EF5000
stack
page read and write
40EE000
stack
page read and write
10C4000
heap
page read and write
36EE000
stack
page read and write
4AF000
unkown
page execute and read and write
4971000
heap
page read and write
4971000
heap
page read and write
1D28D000
stack
page read and write
2C20000
heap
page read and write
F90000
heap
page read and write
64A000
unkown
page read and write
37EF000
stack
page read and write
4E2E000
stack
page read and write
10C4000
heap
page read and write
46EF000
stack
page read and write
4DC0000
heap
page read and write
BFE000
stack
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
3BEE000
stack
page read and write
2F2F000
stack
page read and write
4971000
heap
page read and write
496F000
stack
page read and write
1D10F000
stack
page read and write
446F000
stack
page read and write
F70000
direct allocation
page read and write
8EF000
unkown
page execute and read and write
4971000
heap
page read and write
3BAF000
stack
page read and write
10C4000
heap
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
3FAE000
stack
page read and write
10C4000
heap
page read and write
486E000
stack
page read and write
4990000
heap
page read and write
1D42E000
stack
page read and write
32EF000
stack
page read and write
4971000
heap
page read and write
1D52F000
stack
page read and write
36AF000
stack
page read and write
3D2E000
stack
page read and write
F70000
direct allocation
page read and write
10C4000
heap
page read and write
496000
unkown
page execute and read and write
10C4000
heap
page read and write
EFD000
stack
page read and write
7D7000
unkown
page execute and read and write
B90000
heap
page read and write
FE3000
heap
page read and write
139E000
stack
page read and write
2F6E000
stack
page read and write
F70000
direct allocation
page read and write
3E2F000
stack
page read and write
10C4000
heap
page read and write
There are 230 hidden memdumps, click here to show them.