IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.phpJA
unknown
http://185.215.113.206//
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phpoIHH
unknown
http://185.215.113.206/c4becf79229cb002.phpfA
unknown
http://185.215.113.206/405117-2476756634-1003u
unknown
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/_
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206/c4becf79229cb002.php5IfH
unknown
http://185.215.113.206
unknown
http://185.215.113.206/c4becf79229cb002.phpt
unknown
http://185.215.113.206/I
unknown
http://185.215.113.206/h
unknown
http://185.215.113.206/YIzH
unknown
There are 5 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3E1000
unkown
page execute and read and write
malicious
118E000
heap
page read and write
malicious
4A90000
direct allocation
page read and write
malicious
4611000
heap
page read and write
FA0000
direct allocation
page read and write
4C10000
direct allocation
page execute and read and write
3ACF000
stack
page read and write
298F000
stack
page read and write
FD4000
heap
page read and write
4611000
heap
page read and write
348F000
stack
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
FA0000
direct allocation
page read and write
FC7000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
2E8E000
stack
page read and write
FD4000
heap
page read and write
62A000
unkown
page write copy
4611000
heap
page read and write
EFF000
stack
page read and write
3E8F000
stack
page read and write
44CF000
stack
page read and write
62A000
unkown
page read and write
324E000
stack
page read and write
F8B000
stack
page read and write
2ACE000
stack
page read and write
4611000
heap
page read and write
1CB5F000
stack
page read and write
398F000
stack
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
450E000
stack
page read and write
1CA5E000
stack
page read and write
3E0000
unkown
page read and write
FD4000
heap
page read and write
4611000
heap
page read and write
4C10000
direct allocation
page execute and read and write
4611000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
3A0000
heap
page read and write
1C91E000
stack
page read and write
1170000
direct allocation
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
428E000
stack
page read and write
48F000
unkown
page execute and read and write
4611000
heap
page read and write
4611000
heap
page read and write
FA0000
direct allocation
page read and write
FA0000
direct allocation
page read and write
8D4000
unkown
page execute and write copy
FD4000
heap
page read and write
8D4000
unkown
page execute and read and write
4C00000
direct allocation
page execute and read and write
3D8E000
stack
page read and write
4C20000
direct allocation
page execute and read and write
4611000
heap
page read and write
FC0000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
3FCF000
stack
page read and write
3C0F000
stack
page read and write
310E000
stack
page read and write
1D06C000
stack
page read and write
4611000
heap
page read and write
4710000
trusted library allocation
page read and write
FD4000
heap
page read and write
11FA000
heap
page read and write
410F000
stack
page read and write
FD4000
heap
page read and write
2F8F000
stack
page read and write
FD4000
heap
page read and write
4ACE000
stack
page read and write
3E0000
unkown
page readonly
414E000
stack
page read and write
FD4000
heap
page read and write
4631000
heap
page read and write
4BE0000
heap
page read and write
4611000
heap
page read and write
11E9000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
15C000
stack
page read and write
3B0E000
stack
page read and write
A73000
unkown
page execute and write copy
43CE000
stack
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
FD4000
heap
page read and write
618000
unkown
page execute and read and write
4611000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
FA0000
direct allocation
page read and write
3ECE000
stack
page read and write
35CF000
stack
page read and write
FD4000
heap
page read and write
1CF2D000
stack
page read and write
FA0000
direct allocation
page read and write
4611000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
4611000
heap
page read and write
4611000
heap
page read and write
ABE000
stack
page read and write
320F000
stack
page read and write
4611000
heap
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
FCB000
heap
page read and write
476000
unkown
page execute and read and write
384F000
stack
page read and write
FA0000
direct allocation
page read and write
4610000
heap
page read and write
4611000
heap
page read and write
334F000
stack
page read and write
438F000
stack
page read and write
25E000
stack
page read and write
F4E000
stack
page read and write
1CC9F000
stack
page read and write
4611000
heap
page read and write
FD4000
heap
page read and write
8C7000
unkown
page execute and read and write
11D2000
heap
page read and write
FD4000
heap
page read and write
1CF6E000
stack
page read and write
370F000
stack
page read and write
4611000
heap
page read and write
FA0000
direct allocation
page read and write
4611000
heap
page read and write
2C0000
heap
page read and write
8D5000
unkown
page execute and write copy
4611000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
255000
stack
page read and write
4611000
heap
page read and write
1170000
direct allocation
page read and write
8BE000
unkown
page execute and read and write
1180000
heap
page read and write
1CA1F000
stack
page read and write
4621000
heap
page read and write
2A8F000
stack
page read and write
A72000
unkown
page execute and read and write
FD4000
heap
page read and write
4611000
heap
page read and write
FD4000
heap
page read and write
388E000
stack
page read and write
FD4000
heap
page read and write
FD0000
heap
page read and write
FD4000
heap
page read and write
F90000
heap
page read and write
1CDEF000
stack
page read and write
3C4E000
stack
page read and write
118A000
heap
page read and write
1CB9E000
stack
page read and write
11FC000
heap
page read and write
FD4000
heap
page read and write
4611000
heap
page read and write
2BCF000
stack
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
7B8000
unkown
page execute and read and write
FA0000
direct allocation
page read and write
FD4000
heap
page read and write
1205000
heap
page read and write
4AC6000
direct allocation
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
338E000
stack
page read and write
2C0E000
stack
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
FA0000
direct allocation
page read and write
34CE000
stack
page read and write
1170000
direct allocation
page read and write
400E000
stack
page read and write
BFE000
stack
page read and write
2D0F000
stack
page read and write
FA0000
direct allocation
page read and write
4611000
heap
page read and write
2D4E000
stack
page read and write
3E1000
unkown
page execute and write copy
4611000
heap
page read and write
424F000
stack
page read and write
FD4000
heap
page read and write
360E000
stack
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
FA0000
direct allocation
page read and write
374E000
stack
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
FD4000
heap
page read and write
4611000
heap
page read and write
417000
unkown
page execute and read and write
4BCF000
stack
page read and write
1CE2D000
stack
page read and write
FA0000
direct allocation
page read and write
FD4000
heap
page read and write
895000
unkown
page execute and read and write
4C40000
direct allocation
page execute and read and write
4611000
heap
page read and write
62C000
unkown
page execute and read and write
4C30000
direct allocation
page execute and read and write
FD4000
heap
page read and write
460F000
stack
page read and write
46E000
unkown
page execute and read and write
2E4F000
stack
page read and write
39CE000
stack
page read and write
1CCEE000
stack
page read and write
2FCE000
stack
page read and write
FA0000
direct allocation
page read and write
4611000
heap
page read and write
3D4F000
stack
page read and write
FD4000
heap
page read and write
FD4000
heap
page read and write
BBE000
stack
page read and write
30CF000
stack
page read and write
4611000
heap
page read and write
There are 222 hidden memdumps, click here to show them.