IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/
185.215.113.206
http://185.215.113.206
unknown
http://185.215.113.206/c4becf79229cb002.php/Q
unknown
http://185.215.113.206/c4becf79229cb002.php6E
unknown
http://185.215.113.206/c4becf79229cb002.phpfE
unknown
http://185.215.113.206/V
unknown
http://185.215.113.206/f
unknown
http://185.215.113.206/c4becf79229cb002.phpBE
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
101E000
heap
page read and write
malicious
4F1000
unkown
page execute and read and write
malicious
4EC0000
direct allocation
page read and write
malicious
4A41000
heap
page read and write
FF4000
heap
page read and write
4A41000
heap
page read and write
4A41000
heap
page read and write
48FF000
stack
page read and write
FF4000
heap
page read and write
FF4000
heap
page read and write
3A3E000
stack
page read and write
FF4000
heap
page read and write
4F0000
unkown
page read and write
4A41000
heap
page read and write
4A41000
heap
page read and write
4A41000
heap
page read and write
FF4000
heap
page read and write
4A41000
heap
page read and write
2C20000
direct allocation
page read and write
FF4000
heap
page read and write
1D38D000
stack
page read and write
FF4000
heap
page read and write
3B7E000
stack
page read and write
1D20F000
stack
page read and write
4A41000
heap
page read and write
FF4000
heap
page read and write
2C00000
direct allocation
page read and write
FF4000
heap
page read and write
4A41000
heap
page read and write
2C00000
direct allocation
page read and write
59F000
unkown
page execute and read and write
9E9000
unkown
page execute and read and write
FF4000
heap
page read and write
4A41000
heap
page read and write
9DB000
unkown
page execute and read and write
303E000
stack
page read and write
4A41000
heap
page read and write
1096000
heap
page read and write
1064000
heap
page read and write
FF4000
heap
page read and write
2C00000
direct allocation
page read and write
FF4000
heap
page read and write
4A50000
heap
page read and write
5040000
direct allocation
page execute and read and write
FF4000
heap
page read and write
9E9000
unkown
page execute and write copy
4EFC000
stack
page read and write
1D632000
heap
page read and write
4EF6000
direct allocation
page read and write
3DBF000
stack
page read and write
135E000
stack
page read and write
FF4000
heap
page read and write
443E000
stack
page read and write
3CBE000
stack
page read and write
FF4000
heap
page read and write
2C20000
direct allocation
page read and write
1CD3E000
stack
page read and write
FF4000
heap
page read and write
2D7F000
stack
page read and write
4A41000
heap
page read and write
313F000
stack
page read and write
4A41000
heap
page read and write
3C7F000
stack
page read and write
3B3F000
stack
page read and write
FF4000
heap
page read and write
4A41000
heap
page read and write
2EBF000
stack
page read and write
1D0BF000
stack
page read and write
2C00000
direct allocation
page read and write
FF4000
heap
page read and write
FF4000
heap
page read and write
3DFE000
stack
page read and write
457E000
stack
page read and write
F35000
stack
page read and write
B8F000
unkown
page execute and read and write
317E000
stack
page read and write
4A41000
heap
page read and write
FF4000
heap
page read and write
4A41000
heap
page read and write
FF4000
heap
page read and write
2C00000
direct allocation
page read and write
2C00000
direct allocation
page read and write
4F0000
unkown
page readonly
4A41000
heap
page read and write
37BE000
stack
page read and write
FF4000
heap
page read and write
4A41000
heap
page read and write
4A41000
heap
page read and write
42FE000
stack
page read and write
73C000
unkown
page execute and read and write
1D48C000
stack
page read and write
38FE000
stack
page read and write
1D10E000
stack
page read and write
377F000
stack
page read and write
38BF000
stack
page read and write
47FE000
stack
page read and write
4F1000
unkown
page execute and write copy
FF4000
heap
page read and write
32BE000
stack
page read and write
4A3F000
stack
page read and write
2DBB000
stack
page read and write
73A000
unkown
page read and write
4A41000
heap
page read and write
527000
unkown
page execute and read and write
4A41000
heap
page read and write
1000000
heap
page read and write
4A41000
heap
page read and write
327F000
stack
page read and write
FF4000
heap
page read and write
FF4000
heap
page read and write
9EA000
unkown
page execute and write copy
FF4000
heap
page read and write
4A41000
heap
page read and write
4A41000
heap
page read and write
4A41000
heap
page read and write
4A41000
heap
page read and write
FF4000
heap
page read and write
4FFF000
stack
page read and write
1010000
heap
page read and write
493E000
stack
page read and write
1CE3F000
stack
page read and write
2C00000
direct allocation
page read and write
41BE000
stack
page read and write
FF4000
heap
page read and write
4A41000
heap
page read and write
4A41000
heap
page read and write
4A41000
heap
page read and write
FF0000
heap
page read and write
453F000
stack
page read and write
F90000
heap
page read and write
FF4000
heap
page read and write
4A41000
heap
page read and write
46BE000
stack
page read and write
145E000
stack
page read and write
33FE000
stack
page read and write
FF4000
heap
page read and write
1CF7F000
stack
page read and write
728000
unkown
page execute and read and write
4A41000
heap
page read and write
5010000
heap
page read and write
FF4000
heap
page read and write
4A41000
heap
page read and write
3F3E000
stack
page read and write
131E000
stack
page read and write
2C00000
direct allocation
page read and write
4A41000
heap
page read and write
9AC000
unkown
page execute and read and write
4A41000
heap
page read and write
2C30000
heap
page read and write
4A41000
heap
page read and write
FA0000
heap
page read and write
467F000
stack
page read and write
101A000
heap
page read and write
FF4000
heap
page read and write
5030000
direct allocation
page execute and read and write
2C00000
direct allocation
page read and write
2C3B000
heap
page read and write
FF4000
heap
page read and write
33BF000
stack
page read and write
E3C000
stack
page read and write
B90000
unkown
page execute and write copy
4A41000
heap
page read and write
4A41000
heap
page read and write
57E000
unkown
page execute and read and write
1D62E000
stack
page read and write
4A41000
heap
page read and write
4A41000
heap
page read and write
1D52E000
stack
page read and write
4A41000
heap
page read and write
2C00000
direct allocation
page read and write
4A41000
heap
page read and write
47BF000
stack
page read and write
FF4000
heap
page read and write
5020000
direct allocation
page execute and read and write
4A44000
heap
page read and write
4A41000
heap
page read and write
1D24E000
stack
page read and write
4A41000
heap
page read and write
FF4000
heap
page read and write
3EFF000
stack
page read and write
1D630000
heap
page read and write
4A41000
heap
page read and write
4A41000
heap
page read and write
407E000
stack
page read and write
4A41000
heap
page read and write
363F000
stack
page read and write
5040000
direct allocation
page execute and read and write
9D3000
unkown
page execute and read and write
4A41000
heap
page read and write
1CFBE000
stack
page read and write
403F000
stack
page read and write
F3E000
stack
page read and write
4A41000
heap
page read and write
2C00000
direct allocation
page read and write
1079000
heap
page read and write
4A60000
heap
page read and write
FF4000
heap
page read and write
FF4000
heap
page read and write
2EFE000
stack
page read and write
2C00000
direct allocation
page read and write
417F000
stack
page read and write
5010000
direct allocation
page execute and read and write
FF4000
heap
page read and write
4A41000
heap
page read and write
4A41000
heap
page read and write
2C37000
heap
page read and write
5050000
direct allocation
page execute and read and write
121E000
stack
page read and write
FF4000
heap
page read and write
FF4000
heap
page read and write
4A41000
heap
page read and write
586000
unkown
page execute and read and write
5060000
direct allocation
page execute and read and write
39FF000
stack
page read and write
1CE7E000
stack
page read and write
367E000
stack
page read and write
FF4000
heap
page read and write
43FF000
stack
page read and write
2C00000
direct allocation
page read and write
4A41000
heap
page read and write
8C6000
unkown
page execute and read and write
42BF000
stack
page read and write
4A41000
heap
page read and write
FF4000
heap
page read and write
FF4000
heap
page read and write
353E000
stack
page read and write
2C20000
direct allocation
page read and write
2FFF000
stack
page read and write
4A41000
heap
page read and write
2C00000
direct allocation
page read and write
1D34E000
stack
page read and write
2C7E000
stack
page read and write
4A40000
heap
page read and write
34FF000
stack
page read and write
73A000
unkown
page write copy
4A41000
heap
page read and write
4E80000
trusted library allocation
page read and write
There are 227 hidden memdumps, click here to show them.