IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phpK
unknown
http://185.215.113.206/B
unknown
http://185.215.113.206~
unknown
http://185.215.113.206/p
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206
unknown
http://185.215.113.206/c4becf79229cb002.php#
unknown

Domains

Name
IP
Malicious
s-part-0035.t-0009.t-msedge.net
13.107.246.63

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
391000
unkown
page execute and read and write
malicious
4D50000
direct allocation
page read and write
malicious
F78000
heap
page read and write
malicious
882000
unkown
page execute and read and write
F00000
heap
page read and write
F04000
heap
page read and write
428E000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
F04000
heap
page read and write
4D40000
direct allocation
page read and write
384F000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
F04000
heap
page read and write
48B1000
heap
page read and write
44D0000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
3B0E000
stack
page read and write
F04000
heap
page read and write
475F000
stack
page read and write
F04000
heap
page read and write
F04000
heap
page read and write
F04000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
F04000
heap
page read and write
48A0000
direct allocation
page read and write
310E000
stack
page read and write
A1F000
unkown
page execute and read and write
2D0F000
stack
page read and write
4EC0000
direct allocation
page execute and read and write
ABC000
stack
page read and write
461F000
stack
page read and write
3E8F000
stack
page read and write
320F000
stack
page read and write
48B1000
heap
page read and write
F04000
heap
page read and write
48B1000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
5C8000
unkown
page execute and read and write
374E000
stack
page read and write
FD6000
heap
page read and write
1D32E000
stack
page read and write
F04000
heap
page read and write
5DA000
unkown
page read and write
48B1000
heap
page read and write
F04000
heap
page read and write
108E000
stack
page read and write
48A0000
direct allocation
page read and write
48B1000
heap
page read and write
12CE000
stack
page read and write
2FCE000
stack
page read and write
48A0000
direct allocation
page read and write
F04000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
1CE5E000
stack
page read and write
43F000
unkown
page execute and read and write
391000
unkown
page execute and write copy
1CD1E000
stack
page read and write
48B1000
heap
page read and write
48A0000
direct allocation
page read and write
1CBDE000
stack
page read and write
F04000
heap
page read and write
48B1000
heap
page read and write
390000
unkown
page readonly
48C0000
heap
page read and write
48B1000
heap
page read and write
BBE000
stack
page read and write
F04000
heap
page read and write
48A0000
direct allocation
page read and write
48A0000
direct allocation
page read and write
4D40000
direct allocation
page read and write
334F000
stack
page read and write
2E8E000
stack
page read and write
F04000
heap
page read and write
48B1000
heap
page read and write
2B07000
heap
page read and write
2B0B000
heap
page read and write
390000
unkown
page read and write
F04000
heap
page read and write
48B1000
heap
page read and write
F04000
heap
page read and write
348F000
stack
page read and write
48A0000
direct allocation
page read and write
F04000
heap
page read and write
F10000
heap
page read and write
F04000
heap
page read and write
48B1000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
1D22E000
stack
page read and write
48B1000
heap
page read and write
E20000
heap
page read and write
426000
unkown
page execute and read and write
883000
unkown
page execute and write copy
3ACF000
stack
page read and write
F04000
heap
page read and write
400E000
stack
page read and write
F04000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
3C0F000
stack
page read and write
48B1000
heap
page read and write
840000
unkown
page execute and read and write
3C7000
unkown
page execute and read and write
48B1000
heap
page read and write
F04000
heap
page read and write
F04000
heap
page read and write
F5E000
heap
page read and write
39CE000
stack
page read and write
4F00000
direct allocation
page execute and read and write
F04000
heap
page read and write
1D0ED000
stack
page read and write
2E4F000
stack
page read and write
48B1000
heap
page read and write
48A0000
direct allocation
page read and write
48B1000
heap
page read and write
370F000
stack
page read and write
75C000
unkown
page execute and read and write
1CF5F000
stack
page read and write
118E000
stack
page read and write
FB8000
heap
page read and write
F04000
heap
page read and write
86A000
unkown
page execute and read and write
F73000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
35CF000
stack
page read and write
F04000
heap
page read and write
43CE000
stack
page read and write
48B1000
heap
page read and write
41E000
unkown
page execute and read and write
1D1EC000
stack
page read and write
48A0000
direct allocation
page read and write
A20000
unkown
page execute and write copy
1D0AF000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
F04000
heap
page read and write
48B1000
heap
page read and write
F04000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
360E000
stack
page read and write
30CF000
stack
page read and write
F04000
heap
page read and write
48B1000
heap
page read and write
2B00000
heap
page read and write
F04000
heap
page read and write
3D4F000
stack
page read and write
48B0000
heap
page read and write
2AFB000
stack
page read and write
BB5000
stack
page read and write
4EA0000
direct allocation
page execute and read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
49B0000
trusted library allocation
page read and write
398F000
stack
page read and write
F04000
heap
page read and write
F04000
heap
page read and write
4EA0000
heap
page read and write
2F8F000
stack
page read and write
48D0000
heap
page read and write
F04000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
F04000
heap
page read and write
48B1000
heap
page read and write
324E000
stack
page read and write
1CCDF000
stack
page read and write
F50000
heap
page read and write
48B1000
heap
page read and write
2ABE000
stack
page read and write
5DA000
unkown
page write copy
FC2000
heap
page read and write
48A0000
direct allocation
page read and write
2D4E000
stack
page read and write
4D86000
direct allocation
page read and write
489F000
stack
page read and write
3C4E000
stack
page read and write
1CE1F000
stack
page read and write
3FCF000
stack
page read and write
48B1000
heap
page read and write
424F000
stack
page read and write
F04000
heap
page read and write
414E000
stack
page read and write
FA5000
heap
page read and write
F04000
heap
page read and write
882000
unkown
page execute and write copy
F04000
heap
page read and write
3D8E000
stack
page read and write
410F000
stack
page read and write
F5A000
heap
page read and write
3ECE000
stack
page read and write
48B1000
heap
page read and write
465E000
stack
page read and write
48B1000
heap
page read and write
F04000
heap
page read and write
F04000
heap
page read and write
48A0000
direct allocation
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
5DC000
unkown
page execute and read and write
F04000
heap
page read and write
48B1000
heap
page read and write
338E000
stack
page read and write
48B1000
heap
page read and write
11CE000
stack
page read and write
388E000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
438F000
stack
page read and write
48B1000
heap
page read and write
F04000
heap
page read and write
48A0000
direct allocation
page read and write
48B1000
heap
page read and write
4E8F000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
4D40000
direct allocation
page read and write
451E000
stack
page read and write
F04000
heap
page read and write
4D8B000
stack
page read and write
479E000
stack
page read and write
2C0F000
stack
page read and write
44CF000
stack
page read and write
872000
unkown
page execute and read and write
48A0000
direct allocation
page read and write
F04000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
48A0000
direct allocation
page read and write
34CE000
stack
page read and write
1CFAE000
stack
page read and write
There are 227 hidden memdumps, click here to show them.