IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phpl
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206
unknown
http://185.215.113.206/;
unknown
http://185.215.113.206/c4becf79229cb002.phpT
unknown
http://185.215.113.206/)
unknown
http://185.215.113.206/c4becf79229cb002.phpv
unknown

Domains

Name
IP
Malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
E4E000
heap
page read and write
malicious
A1000
unkown
page execute and read and write
malicious
4A60000
direct allocation
page read and write
malicious
3D1F000
stack
page read and write
A0000
unkown
page readonly
D7000
unkown
page execute and read and write
A0000
unkown
page read and write
45E1000
heap
page read and write
742000
unkown
page execute and write copy
45E1000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
45E1000
heap
page read and write
45E8000
heap
page read and write
AF5000
stack
page read and write
C44000
heap
page read and write
E40000
heap
page read and write
2EA000
unkown
page read and write
3ADE000
stack
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
28B0000
direct allocation
page read and write
4BC0000
heap
page read and write
45E1000
heap
page read and write
285E000
stack
page read and write
45E1000
heap
page read and write
29DF000
stack
page read and write
C44000
heap
page read and write
321E000
stack
page read and write
45E1000
heap
page read and write
C44000
heap
page read and write
309F000
stack
page read and write
C44000
heap
page read and write
2EA000
unkown
page write copy
4AAB000
stack
page read and write
28B0000
direct allocation
page read and write
3FDE000
stack
page read and write
3E5E000
stack
page read and write
45E1000
heap
page read and write
C44000
heap
page read and write
45E1000
heap
page read and write
C44000
heap
page read and write
C44000
heap
page read and write
28B0000
direct allocation
page read and write
46E0000
trusted library allocation
page read and write
59E000
unkown
page execute and read and write
1D0EE000
stack
page read and write
1CDBF000
stack
page read and write
3D5E000
stack
page read and write
28DB000
heap
page read and write
2F9E000
stack
page read and write
2ADF000
stack
page read and write
28B0000
direct allocation
page read and write
1CE0D000
stack
page read and write
AFE000
stack
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
B40000
heap
page read and write
28D7000
heap
page read and write
C44000
heap
page read and write
C44000
heap
page read and write
399E000
stack
page read and write
45E1000
heap
page read and write
C20000
heap
page read and write
1CB7E000
stack
page read and write
45E1000
heap
page read and write
7DC000
stack
page read and write
1CB3F000
stack
page read and write
45E1000
heap
page read and write
35DE000
stack
page read and write
1C9FF000
stack
page read and write
28B0000
direct allocation
page read and write
59F000
unkown
page execute and write copy
1CCBE000
stack
page read and write
4A60000
direct allocation
page read and write
C44000
heap
page read and write
45E1000
heap
page read and write
381F000
stack
page read and write
12E000
unkown
page execute and read and write
C44000
heap
page read and write
439E000
stack
page read and write
28B0000
direct allocation
page read and write
2EC000
unkown
page execute and read and write
45E1000
heap
page read and write
C44000
heap
page read and write
C44000
heap
page read and write
C44000
heap
page read and write
2BDF000
stack
page read and write
4C20000
direct allocation
page execute and read and write
36DF000
stack
page read and write
45E1000
heap
page read and write
1CC7F000
stack
page read and write
30DE000
stack
page read and write
1C8FE000
stack
page read and write
335E000
stack
page read and write
E4A000
heap
page read and write
395F000
stack
page read and write
C44000
heap
page read and write
DDE000
stack
page read and write
4A60000
direct allocation
page read and write
1D1EE000
stack
page read and write
A1000
unkown
page execute and write copy
C44000
heap
page read and write
2E5E000
stack
page read and write
4A96000
direct allocation
page read and write
411E000
stack
page read and write
741000
unkown
page execute and read and write
45E1000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
2D1E000
stack
page read and write
45E1000
heap
page read and write
C44000
heap
page read and write
4BAF000
stack
page read and write
45E1000
heap
page read and write
31DF000
stack
page read and write
28A0000
heap
page read and write
C44000
heap
page read and write
421F000
stack
page read and write
45E1000
heap
page read and write
3C1E000
stack
page read and write
45E1000
heap
page read and write
588000
unkown
page execute and read and write
28B0000
direct allocation
page read and write
45E1000
heap
page read and write
58F000
unkown
page execute and read and write
435F000
stack
page read and write
C44000
heap
page read and write
45E1000
heap
page read and write
44DE000
stack
page read and write
C44000
heap
page read and write
C44000
heap
page read and write
C44000
heap
page read and write
3E9E000
stack
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
1D1F0000
heap
page read and write
C44000
heap
page read and write
45E1000
heap
page read and write
289E000
stack
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
C44000
heap
page read and write
3F9F000
stack
page read and write
45E1000
heap
page read and write
EA8000
heap
page read and write
55E000
unkown
page execute and read and write
371E000
stack
page read and write
28B0000
direct allocation
page read and write
359F000
stack
page read and write
2CDF000
stack
page read and write
45DF000
stack
page read and write
2F5F000
stack
page read and write
40DF000
stack
page read and write
345F000
stack
page read and write
45E1000
heap
page read and write
425E000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
28B0000
direct allocation
page read and write
C44000
heap
page read and write
281C000
stack
page read and write
C44000
heap
page read and write
45E1000
heap
page read and write
4A60000
direct allocation
page read and write
45E1000
heap
page read and write
2D8000
unkown
page execute and read and write
385E000
stack
page read and write
331F000
stack
page read and write
45E1000
heap
page read and write
C44000
heap
page read and write
E3E000
stack
page read and write
28D0000
heap
page read and write
1CF4D000
stack
page read and write
C44000
heap
page read and write
2E1F000
stack
page read and write
28B0000
direct allocation
page read and write
C44000
heap
page read and write
45F0000
heap
page read and write
4601000
heap
page read and write
45E1000
heap
page read and write
28B0000
direct allocation
page read and write
C40000
heap
page read and write
28B0000
direct allocation
page read and write
3BDF000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
349E000
stack
page read and write
45E1000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
1CF0D000
stack
page read and write
45E1000
heap
page read and write
C44000
heap
page read and write
1D04C000
stack
page read and write
C44000
heap
page read and write
136000
unkown
page execute and read and write
45E1000
heap
page read and write
449F000
stack
page read and write
45E1000
heap
page read and write
3A9F000
stack
page read and write
103E000
stack
page read and write
C44000
heap
page read and write
1CA3E000
stack
page read and write
C44000
heap
page read and write
C44000
heap
page read and write
C44000
heap
page read and write
59E000
unkown
page execute and write copy
EC3000
heap
page read and write
C44000
heap
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
C9E000
stack
page read and write
45E1000
heap
page read and write
C44000
heap
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
14F000
unkown
page execute and read and write
E92000
heap
page read and write
C44000
heap
page read and write
45E1000
heap
page read and write
476000
unkown
page execute and read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
C44000
heap
page read and write
28B0000
direct allocation
page read and write
45E1000
heap
page read and write
C44000
heap
page read and write
45E1000
heap
page read and write
C44000
heap
page read and write
4C00000
direct allocation
page execute and read and write
45E1000
heap
page read and write
D9E000
stack
page read and write
45E1000
heap
page read and write
28B0000
direct allocation
page read and write
4C10000
direct allocation
page execute and read and write
45E1000
heap
page read and write
45E0000
heap
page read and write
There are 225 hidden memdumps, click here to show them.