IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phpl
unknown
http://185.215.113.206/c4becf79229cb002.php/F
unknown
http://185.215.113.206/c4becf79229cb002.php?
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php0
unknown
http://185.215.113.206/M
unknown
http://185.215.113.206
unknown
http://185.215.113.2062?
unknown
http://185.215.113.206/c4becf79229cb002.phpD
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C71000
unkown
page execute and read and write
malicious
55A0000
direct allocation
page read and write
malicious
179D000
heap
page read and write
malicious
4E9F000
stack
page read and write
13B4000
heap
page read and write
1750000
direct allocation
page read and write
5121000
heap
page read and write
371E000
stack
page read and write
5700000
direct allocation
page execute and read and write
13B4000
heap
page read and write
40DF000
stack
page read and write
449F000
stack
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
13B4000
heap
page read and write
13B4000
heap
page read and write
12D3000
unkown
page execute and read and write
499F000
stack
page read and write
425E000
stack
page read and write
5140000
heap
page read and write
1B3E000
stack
page read and write
1DCC4000
heap
page read and write
5121000
heap
page read and write
4B1E000
stack
page read and write
13B4000
heap
page read and write
4C1F000
stack
page read and write
331E000
stack
page read and write
5121000
heap
page read and write
13B4000
heap
page read and write
1750000
direct allocation
page read and write
1770000
heap
page read and write
56E0000
direct allocation
page execute and read and write
16F5000
stack
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
13B4000
heap
page read and write
1DCBC000
stack
page read and write
55D6000
direct allocation
page read and write
5700000
direct allocation
page execute and read and write
3FDE000
stack
page read and write
1146000
unkown
page execute and read and write
4ADF000
stack
page read and write
13B4000
heap
page read and write
5128000
heap
page read and write
D1F000
unkown
page execute and read and write
1108000
unkown
page execute and read and write
1750000
direct allocation
page read and write
13B4000
heap
page read and write
33D0000
heap
page read and write
1740000
heap
page read and write
5121000
heap
page read and write
1750000
direct allocation
page read and write
1D40E000
stack
page read and write
13B4000
heap
page read and write
45DF000
stack
page read and write
56F0000
direct allocation
page execute and read and write
5121000
heap
page read and write
13B4000
heap
page read and write
56E0000
heap
page read and write
3BDF000
stack
page read and write
5121000
heap
page read and write
1D7DE000
stack
page read and write
5121000
heap
page read and write
3D5E000
stack
page read and write
5730000
direct allocation
page execute and read and write
13B4000
heap
page read and write
C70000
unkown
page read and write
1750000
direct allocation
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
1A3E000
stack
page read and write
13B4000
heap
page read and write
5121000
heap
page read and write
1750000
direct allocation
page read and write
13B4000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
1D64F000
stack
page read and write
511F000
stack
page read and write
339E000
stack
page read and write
5121000
heap
page read and write
13B4000
heap
page read and write
5121000
heap
page read and write
1D54E000
stack
page read and write
EBC000
unkown
page execute and read and write
1D68E000
stack
page read and write
13B4000
heap
page read and write
36DF000
stack
page read and write
1750000
direct allocation
page read and write
1DB5E000
stack
page read and write
5121000
heap
page read and write
1D50F000
stack
page read and write
1750000
direct allocation
page read and write
13B4000
heap
page read and write
13B4000
heap
page read and write
485F000
stack
page read and write
1DA5D000
stack
page read and write
5121000
heap
page read and write
1750000
direct allocation
page read and write
13B4000
heap
page read and write
5121000
heap
page read and write
5720000
direct allocation
page execute and read and write
5121000
heap
page read and write
D06000
unkown
page execute and read and write
5121000
heap
page read and write
5121000
heap
page read and write
13B4000
heap
page read and write
5121000
heap
page read and write
1750000
direct allocation
page read and write
489E000
stack
page read and write
1D8DF000
stack
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
13B4000
heap
page read and write
EBA000
unkown
page write copy
5121000
heap
page read and write
C71000
unkown
page execute and write copy
CA7000
unkown
page execute and read and write
13B4000
heap
page read and write
5121000
heap
page read and write
33D7000
heap
page read and write
5121000
heap
page read and write
411E000
stack
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
1146000
unkown
page execute and write copy
4FDF000
stack
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
1D91D000
stack
page read and write
4EDE000
stack
page read and write
13B4000
heap
page read and write
13B4000
heap
page read and write
395F000
stack
page read and write
1147000
unkown
page execute and write copy
461E000
stack
page read and write
13B4000
heap
page read and write
5121000
heap
page read and write
34DF000
stack
page read and write
13B4000
heap
page read and write
13B4000
heap
page read and write
439E000
stack
page read and write
13B4000
heap
page read and write
3F9F000
stack
page read and write
13B4000
heap
page read and write
17F3000
heap
page read and write
13B4000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
C70000
unkown
page readonly
13B4000
heap
page read and write
13B4000
heap
page read and write
13FE000
stack
page read and write
13B4000
heap
page read and write
1750000
direct allocation
page read and write
33A0000
direct allocation
page read and write
3A9F000
stack
page read and write
3D1F000
stack
page read and write
177E000
heap
page read and write
501E000
stack
page read and write
381F000
stack
page read and write
475E000
stack
page read and write
1360000
heap
page read and write
EA8000
unkown
page execute and read and write
13B4000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
471F000
stack
page read and write
1DCC0000
heap
page read and write
5121000
heap
page read and write
5710000
direct allocation
page execute and read and write
435F000
stack
page read and write
16FD000
stack
page read and write
335C000
stack
page read and write
5121000
heap
page read and write
1750000
direct allocation
page read and write
385E000
stack
page read and write
5121000
heap
page read and write
421F000
stack
page read and write
4D5F000
stack
page read and write
13B4000
heap
page read and write
13B4000
heap
page read and write
1130000
unkown
page execute and read and write
17DA000
heap
page read and write
5120000
heap
page read and write
5130000
heap
page read and write
49DE000
stack
page read and write
4C5E000
stack
page read and write
33A0000
direct allocation
page read and write
13B4000
heap
page read and write
177A000
heap
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
1D78F000
stack
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
13B4000
heap
page read and write
33A0000
direct allocation
page read and write
1DA1E000
stack
page read and write
3ADE000
stack
page read and write
5121000
heap
page read and write
5121000
heap
page read and write
13B0000
heap
page read and write
4D9E000
stack
page read and write
55DB000
stack
page read and write
33C0000
direct allocation
page execute and read and write
1032000
unkown
page execute and read and write
1750000
direct allocation
page read and write
13B4000
heap
page read and write
13B4000
heap
page read and write
3E9E000
stack
page read and write
56DF000
stack
page read and write
5121000
heap
page read and write
17C4000
heap
page read and write
13B4000
heap
page read and write
5220000
trusted library allocation
page read and write
5121000
heap
page read and write
1DBBD000
stack
page read and write
35DF000
stack
page read and write
1750000
direct allocation
page read and write
13B4000
heap
page read and write
3E5F000
stack
page read and write
44DE000
stack
page read and write
CFE000
unkown
page execute and read and write
5121000
heap
page read and write
EBA000
unkown
page read and write
5121000
heap
page read and write
399E000
stack
page read and write
5121000
heap
page read and write
3C1E000
stack
page read and write
12D4000
unkown
page execute and write copy
173E000
stack
page read and write
131C000
stack
page read and write
1350000
heap
page read and write
1137000
unkown
page execute and read and write
13B4000
heap
page read and write
There are 229 hidden memdumps, click here to show them.