IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phpel
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php/Ct
unknown
http://185.215.113.206
unknown
http://185.215.113.206/c4becf79229cb002.phpql
unknown
http://185.215.113.206/c4becf79229cb002.phpDt
unknown
http://185.215.113.206/Vt
unknown
http://185.215.113.206/1t
unknown
http://185.215.113.206/5
unknown
185.215.113.206/c4becf79229cb002.php
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4E20000
direct allocation
page read and write
malicious
10BE000
heap
page read and write
malicious
701000
unkown
page execute and read and write
malicious
49A1000
heap
page read and write
DF0000
direct allocation
page read and write
654000
heap
page read and write
49A1000
heap
page read and write
107B000
stack
page read and write
78E000
unkown
page execute and read and write
654000
heap
page read and write
449F000
stack
page read and write
AD5000
unkown
page execute and read and write
49A1000
heap
page read and write
103E000
stack
page read and write
371E000
stack
page read and write
701000
unkown
page execute and write copy
700000
unkown
page readonly
49A1000
heap
page read and write
49A1000
heap
page read and write
359F000
stack
page read and write
2D1F000
stack
page read and write
DF0000
direct allocation
page read and write
1090000
direct allocation
page execute and read and write
3BDF000
stack
page read and write
1CFEF000
stack
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
4E00000
heap
page read and write
425E000
stack
page read and write
1CEEE000
stack
page read and write
654000
heap
page read and write
45DF000
stack
page read and write
BF5000
unkown
page execute and read and write
630000
heap
page read and write
3E5F000
stack
page read and write
49A1000
heap
page read and write
654000
heap
page read and write
DC0000
direct allocation
page read and write
1D2BD000
stack
page read and write
2E5E000
stack
page read and write
DDB000
heap
page read and write
DC0000
direct allocation
page read and write
49A1000
heap
page read and write
4F90000
direct allocation
page execute and read and write
DC0000
direct allocation
page read and write
654000
heap
page read and write
654000
heap
page read and write
654000
heap
page read and write
1D3BE000
stack
page read and write
654000
heap
page read and write
654000
heap
page read and write
1D17D000
stack
page read and write
1CDAD000
stack
page read and write
49A0000
heap
page read and write
49B0000
heap
page read and write
654000
heap
page read and write
49A1000
heap
page read and write
1102000
heap
page read and write
10A0000
direct allocation
page execute and read and write
BB2000
unkown
page execute and read and write
49A1000
heap
page read and write
4F70000
direct allocation
page execute and read and write
DC0000
direct allocation
page read and write
49A1000
heap
page read and write
2E1F000
stack
page read and write
654000
heap
page read and write
7AF000
unkown
page execute and read and write
5BD000
stack
page read and write
1136000
heap
page read and write
35DE000
stack
page read and write
654000
heap
page read and write
DC0000
direct allocation
page read and write
654000
heap
page read and write
700000
unkown
page read and write
DC0000
direct allocation
page read and write
49A1000
heap
page read and write
DD0000
heap
page read and write
654000
heap
page read and write
411E000
stack
page read and write
1CD6F000
stack
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
6EE000
stack
page read and write
49A1000
heap
page read and write
737000
unkown
page execute and read and write
654000
heap
page read and write
49A1000
heap
page read and write
3FDE000
stack
page read and write
654000
heap
page read and write
3F9F000
stack
page read and write
654000
heap
page read and write
485F000
stack
page read and write
796000
unkown
page execute and read and write
49A1000
heap
page read and write
DC0000
direct allocation
page read and write
31DF000
stack
page read and write
654000
heap
page read and write
D97000
unkown
page execute and write copy
49A1000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
DC0000
direct allocation
page read and write
DC0000
direct allocation
page read and write
DC0000
direct allocation
page read and write
44DE000
stack
page read and write
1D02E000
stack
page read and write
499F000
stack
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
147F000
stack
page read and write
4E56000
direct allocation
page read and write
2F5F000
stack
page read and write
395F000
stack
page read and write
3A9F000
stack
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
461E000
stack
page read and write
654000
heap
page read and write
654000
heap
page read and write
49A1000
heap
page read and write
DF0000
direct allocation
page read and write
654000
heap
page read and write
654000
heap
page read and write
36DF000
stack
page read and write
DB0000
heap
page read and write
654000
heap
page read and write
309F000
stack
page read and write
654000
heap
page read and write
BF5000
unkown
page execute and write copy
49A1000
heap
page read and write
10B0000
heap
page read and write
654000
heap
page read and write
1106000
heap
page read and write
654000
heap
page read and write
654000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
3D5E000
stack
page read and write
4F60000
direct allocation
page execute and read and write
4AA0000
trusted library allocation
page read and write
6AE000
stack
page read and write
4F70000
direct allocation
page execute and read and write
BF6000
unkown
page execute and write copy
DC0000
direct allocation
page read and write
381F000
stack
page read and write
BE8000
unkown
page execute and read and write
4F5F000
stack
page read and write
49A1000
heap
page read and write
439E000
stack
page read and write
DC0000
direct allocation
page read and write
654000
heap
page read and write
49A1000
heap
page read and write
654000
heap
page read and write
475E000
stack
page read and write
3ADE000
stack
page read and write
1D12F000
stack
page read and write
654000
heap
page read and write
49A1000
heap
page read and write
1D55F000
stack
page read and write
49A1000
heap
page read and write
421F000
stack
page read and write
1D27C000
stack
page read and write
4F80000
direct allocation
page execute and read and write
399E000
stack
page read and write
654000
heap
page read and write
94C000
unkown
page execute and read and write
620000
heap
page read and write
654000
heap
page read and write
49A1000
heap
page read and write
DD7000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
3E9E000
stack
page read and write
471F000
stack
page read and write
3C1E000
stack
page read and write
1D45E000
stack
page read and write
BDE000
unkown
page execute and read and write
D96000
unkown
page execute and read and write
49A5000
heap
page read and write
137E000
stack
page read and write
30DE000
stack
page read and write
654000
heap
page read and write
654000
heap
page read and write
49A1000
heap
page read and write
4E5E000
stack
page read and write
654000
heap
page read and write
1CEAE000
stack
page read and write
49C0000
heap
page read and write
49A1000
heap
page read and write
650000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
331F000
stack
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
385E000
stack
page read and write
435F000
stack
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
654000
heap
page read and write
654000
heap
page read and write
345F000
stack
page read and write
489E000
stack
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
5B5000
stack
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
1CC6E000
stack
page read and write
321E000
stack
page read and write
654000
heap
page read and write
49A1000
heap
page read and write
DC0000
direct allocation
page read and write
10BA000
heap
page read and write
4BC000
stack
page read and write
1D560000
heap
page read and write
335E000
stack
page read and write
3D1F000
stack
page read and write
654000
heap
page read and write
49A1000
heap
page read and write
654000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
654000
heap
page read and write
94A000
unkown
page read and write
DC0000
direct allocation
page read and write
349E000
stack
page read and write
94A000
unkown
page write copy
938000
unkown
page execute and read and write
49A1000
heap
page read and write
40DF000
stack
page read and write
1119000
heap
page read and write
49A1000
heap
page read and write
2F9E000
stack
page read and write
There are 225 hidden memdumps, click here to show them.