IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php?
unknown
http://185.215.113.206/c4becf79229cb002.phpft
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206
unknown
http://185.215.113.206/;
unknown
http://185.215.113.206/c4becf79229cb002.phpc
unknown
http://185.215.113.206/X
unknown
http://185.215.113.206/c4becf79229cb002.phpw
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
FF1000
unkown
page execute and read and write
malicious
5210000
direct allocation
page read and write
malicious
D6D000
heap
page read and write
malicious
4D91000
heap
page read and write
EAE000
stack
page read and write
43CE000
stack
page read and write
C54000
heap
page read and write
4D91000
heap
page read and write
1228000
unkown
page execute and read and write
310C000
stack
page read and write
4D91000
heap
page read and write
C54000
heap
page read and write
C54000
heap
page read and write
1D30E000
stack
page read and write
3C4E000
stack
page read and write
4D91000
heap
page read and write
1D982000
heap
page read and write
1672000
unkown
page execute and write copy
4D91000
heap
page read and write
2F70000
direct allocation
page read and write
C54000
heap
page read and write
2E5E000
stack
page read and write
C54000
heap
page read and write
C54000
heap
page read and write
FF0000
unkown
page readonly
1D45E000
stack
page read and write
5360000
heap
page read and write
4D98000
heap
page read and write
424F000
stack
page read and write
1027000
unkown
page execute and read and write
438F000
stack
page read and write
9EE000
stack
page read and write
410F000
stack
page read and write
4D91000
heap
page read and write
5380000
direct allocation
page execute and read and write
39CE000
stack
page read and write
8EC000
stack
page read and write
53B0000
direct allocation
page execute and read and write
51D0000
trusted library allocation
page read and write
4D91000
heap
page read and write
2F5E000
stack
page read and write
C54000
heap
page read and write
53A0000
direct allocation
page execute and read and write
4D91000
heap
page read and write
14D9000
unkown
page execute and write copy
C54000
heap
page read and write
FE0000
direct allocation
page read and write
123A000
unkown
page write copy
5246000
direct allocation
page read and write
464E000
stack
page read and write
FE0000
direct allocation
page read and write
C54000
heap
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
C54000
heap
page read and write
149D000
unkown
page execute and read and write
C54000
heap
page read and write
C54000
heap
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
C54000
heap
page read and write
1D87E000
stack
page read and write
4D91000
heap
page read and write
3ECE000
stack
page read and write
4D91000
heap
page read and write
D40000
heap
page read and write
334F000
stack
page read and write
C54000
heap
page read and write
30CF000
stack
page read and write
FD0000
heap
page read and write
360E000
stack
page read and write
C54000
heap
page read and write
4B0F000
stack
page read and write
3FCF000
stack
page read and write
4C4F000
stack
page read and write
4D91000
heap
page read and write
1D6DE000
stack
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
C54000
heap
page read and write
C54000
heap
page read and write
C54000
heap
page read and write
4D91000
heap
page read and write
FE0000
direct allocation
page read and write
2FCE000
stack
page read and write
478E000
stack
page read and write
D91000
heap
page read and write
14D9000
unkown
page execute and read and write
C54000
heap
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
4DB0000
heap
page read and write
4D90000
heap
page read and write
C54000
heap
page read and write
C50000
heap
page read and write
C54000
heap
page read and write
FE0000
direct allocation
page read and write
C54000
heap
page read and write
4D91000
heap
page read and write
C54000
heap
page read and write
DC4000
heap
page read and write
48CE000
stack
page read and write
D4A000
heap
page read and write
FE0000
direct allocation
page read and write
C54000
heap
page read and write
4D91000
heap
page read and write
DA9000
heap
page read and write
4D91000
heap
page read and write
FAF000
stack
page read and write
4C8E000
stack
page read and write
3D4F000
stack
page read and write
C54000
heap
page read and write
534F000
stack
page read and write
1D69E000
stack
page read and write
4D91000
heap
page read and write
3D8E000
stack
page read and write
FE0000
direct allocation
page read and write
4D91000
heap
page read and write
14CA000
unkown
page execute and read and write
4D91000
heap
page read and write
C54000
heap
page read and write
1D2CF000
stack
page read and write
428E000
stack
page read and write
4D91000
heap
page read and write
C54000
heap
page read and write
374E000
stack
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
1D7DC000
stack
page read and write
C60000
heap
page read and write
2F8B000
heap
page read and write
2F70000
direct allocation
page read and write
44CF000
stack
page read and write
488F000
stack
page read and write
C54000
heap
page read and write
400E000
stack
page read and write
5390000
direct allocation
page execute and read and write
2F87000
heap
page read and write
4D91000
heap
page read and write
398E000
stack
page read and write
414E000
stack
page read and write
C54000
heap
page read and write
FE0000
direct allocation
page read and write
123A000
unkown
page read and write
C54000
heap
page read and write
4D8F000
stack
page read and write
5360000
direct allocation
page execute and read and write
1086000
unkown
page execute and read and write
474F000
stack
page read and write
C54000
heap
page read and write
C54000
heap
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
FE0000
direct allocation
page read and write
4D91000
heap
page read and write
4DA0000
heap
page read and write
4D91000
heap
page read and write
3B0E000
stack
page read and write
49CF000
stack
page read and write
1D1CE000
stack
page read and write
FE0000
direct allocation
page read and write
FE0000
direct allocation
page read and write
C54000
heap
page read and write
384F000
stack
page read and write
4D91000
heap
page read and write
C54000
heap
page read and write
4D91000
heap
page read and write
C54000
heap
page read and write
4D91000
heap
page read and write
FF0000
unkown
page read and write
C54000
heap
page read and write
C54000
heap
page read and write
14C3000
unkown
page execute and read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
C54000
heap
page read and write
4D91000
heap
page read and write
1D08E000
stack
page read and write
4A0E000
stack
page read and write
338E000
stack
page read and write
1D40F000
stack
page read and write
34CE000
stack
page read and write
35CF000
stack
page read and write
FF1000
unkown
page execute and write copy
14DA000
unkown
page execute and write copy
1D18F000
stack
page read and write
4D91000
heap
page read and write
3E8F000
stack
page read and write
1D97E000
stack
page read and write
4D91000
heap
page read and write
5390000
direct allocation
page execute and read and write
FE0000
direct allocation
page read and write
1671000
unkown
page execute and read and write
C54000
heap
page read and write
4D91000
heap
page read and write
370F000
stack
page read and write
4D91000
heap
page read and write
460F000
stack
page read and write
1D59D000
stack
page read and write
5370000
direct allocation
page execute and read and write
4D91000
heap
page read and write
9E5000
stack
page read and write
3C0F000
stack
page read and write
D95000
heap
page read and write
4D91000
heap
page read and write
FE0000
direct allocation
page read and write
324E000
stack
page read and write
123C000
unkown
page execute and read and write
1D980000
heap
page read and write
C54000
heap
page read and write
4D91000
heap
page read and write
3ACF000
stack
page read and write
107E000
unkown
page execute and read and write
4D91000
heap
page read and write
450E000
stack
page read and write
109F000
unkown
page execute and read and write
4D91000
heap
page read and write
2F70000
direct allocation
page read and write
C54000
heap
page read and write
13BD000
unkown
page execute and read and write
C54000
heap
page read and write
E40000
heap
page read and write
FE0000
direct allocation
page read and write
4B4E000
stack
page read and write
4D91000
heap
page read and write
1D55F000
stack
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
FE0000
direct allocation
page read and write
524C000
stack
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
D4E000
heap
page read and write
C54000
heap
page read and write
4D91000
heap
page read and write
2F80000
heap
page read and write
388E000
stack
page read and write
348F000
stack
page read and write
320F000
stack
page read and write
There are 229 hidden memdumps, click here to show them.