IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phpj
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206
unknown
http://185.215.113.206/c4becf79229cb002.phpf
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
13DE000
heap
page read and write
malicious
121000
unkown
page execute and read and write
malicious
52A0000
direct allocation
page read and write
malicious
171E000
stack
page read and write
4E01000
heap
page read and write
60B000
unkown
page execute and read and write
1394000
heap
page read and write
1394000
heap
page read and write
1394000
heap
page read and write
5400000
direct allocation
page execute and read and write
4E01000
heap
page read and write
4DF0000
direct allocation
page read and write
4DF0000
direct allocation
page read and write
4E01000
heap
page read and write
4DEF000
stack
page read and write
3F1E000
stack
page read and write
4E01000
heap
page read and write
1394000
heap
page read and write
4E01000
heap
page read and write
47A0000
heap
page read and write
1394000
heap
page read and write
4E20000
heap
page read and write
13DA000
heap
page read and write
1394000
heap
page read and write
42DE000
stack
page read and write
4E08000
heap
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
5240000
trusted library allocation
page read and write
309B000
heap
page read and write
1AE000
unkown
page execute and read and write
300E000
stack
page read and write
4E01000
heap
page read and write
1394000
heap
page read and write
1394000
heap
page read and write
52D6000
direct allocation
page read and write
1335000
stack
page read and write
319F000
stack
page read and write
133D000
stack
page read and write
1394000
heap
page read and write
469E000
stack
page read and write
4E01000
heap
page read and write
1D3AE000
stack
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
4DF0000
direct allocation
page read and write
1D73D000
stack
page read and write
5420000
direct allocation
page execute and read and write
4BAE000
stack
page read and write
1394000
heap
page read and write
141F000
heap
page read and write
365E000
stack
page read and write
1D22F000
stack
page read and write
5450000
direct allocation
page execute and read and write
39DF000
stack
page read and write
120000
unkown
page readonly
53DF000
stack
page read and write
4FB000
unkown
page execute and read and write
4E01000
heap
page read and write
429F000
stack
page read and write
1394000
heap
page read and write
3C9E000
stack
page read and write
7CA000
unkown
page execute and write copy
121000
unkown
page execute and write copy
3097000
heap
page read and write
455E000
stack
page read and write
3A1E000
stack
page read and write
1428000
heap
page read and write
48EF000
stack
page read and write
181F000
stack
page read and write
419E000
stack
page read and write
1D63D000
stack
page read and write
405E000
stack
page read and write
4E01000
heap
page read and write
15DE000
stack
page read and write
1394000
heap
page read and write
1CF000
unkown
page execute and read and write
621000
unkown
page execute and read and write
4E01000
heap
page read and write
415F000
stack
page read and write
4E10000
heap
page read and write
36C000
unkown
page execute and read and write
47EE000
stack
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
1D5EF000
stack
page read and write
4E01000
heap
page read and write
1D77E000
stack
page read and write
1423000
heap
page read and write
4E01000
heap
page read and write
611000
unkown
page execute and read and write
1394000
heap
page read and write
465F000
stack
page read and write
3DDE000
stack
page read and write
4CEE000
stack
page read and write
1394000
heap
page read and write
1394000
heap
page read and write
5440000
direct allocation
page execute and read and write
38DE000
stack
page read and write
53F0000
heap
page read and write
361F000
stack
page read and write
36A000
unkown
page read and write
1394000
heap
page read and write
4DF0000
direct allocation
page read and write
1394000
heap
page read and write
4E01000
heap
page read and write
1456000
heap
page read and write
3B5E000
stack
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
4A6E000
stack
page read and write
53F0000
direct allocation
page execute and read and write
36A000
unkown
page write copy
1394000
heap
page read and write
16DE000
stack
page read and write
4E01000
heap
page read and write
1DA1F000
stack
page read and write
4E01000
heap
page read and write
358000
unkown
page execute and read and write
1370000
heap
page read and write
13D0000
heap
page read and write
1394000
heap
page read and write
4DF0000
direct allocation
page read and write
4A2F000
stack
page read and write
4E01000
heap
page read and write
3C5F000
stack
page read and write
1394000
heap
page read and write
1394000
heap
page read and write
5290000
direct allocation
page read and write
4E01000
heap
page read and write
1394000
heap
page read and write
4E01000
heap
page read and write
1394000
heap
page read and write
143A000
heap
page read and write
4DF0000
direct allocation
page read and write
5DE000
unkown
page execute and read and write
1D91E000
stack
page read and write
4DF0000
direct allocation
page read and write
479F000
stack
page read and write
339F000
stack
page read and write
451F000
stack
page read and write
4E01000
heap
page read and write
1380000
heap
page read and write
375F000
stack
page read and write
4E01000
heap
page read and write
622000
unkown
page execute and write copy
3D9F000
stack
page read and write
4E01000
heap
page read and write
5430000
direct allocation
page execute and read and write
4DF0000
direct allocation
page read and write
1394000
heap
page read and write
4E01000
heap
page read and write
1D87D000
stack
page read and write
4E01000
heap
page read and write
123C000
stack
page read and write
304C000
stack
page read and write
621000
unkown
page execute and write copy
1394000
heap
page read and write
379E000
stack
page read and write
4E01000
heap
page read and write
1394000
heap
page read and write
1394000
heap
page read and write
4DF0000
direct allocation
page read and write
33DE000
stack
page read and write
1394000
heap
page read and write
1394000
heap
page read and write
4DF0000
direct allocation
page read and write
4E01000
heap
page read and write
4DF0000
direct allocation
page read and write
1390000
heap
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
329F000
stack
page read and write
4E01000
heap
page read and write
1394000
heap
page read and write
4E01000
heap
page read and write
1D12E000
stack
page read and write
1394000
heap
page read and write
4E01000
heap
page read and write
43DF000
stack
page read and write
4E01000
heap
page read and write
1394000
heap
page read and write
4E01000
heap
page read and write
5410000
direct allocation
page execute and read and write
4E01000
heap
page read and write
351E000
stack
page read and write
4E01000
heap
page read and write
3EDF000
stack
page read and write
1394000
heap
page read and write
1D4AF000
stack
page read and write
1D26E000
stack
page read and write
4E01000
heap
page read and write
1394000
heap
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
4DF0000
direct allocation
page read and write
52DE000
stack
page read and write
1B6000
unkown
page execute and read and write
4E01000
heap
page read and write
4B6F000
stack
page read and write
1394000
heap
page read and write
5290000
direct allocation
page read and write
5290000
direct allocation
page read and write
401F000
stack
page read and write
4E01000
heap
page read and write
120000
unkown
page read and write
4DF0000
direct allocation
page read and write
389F000
stack
page read and write
1DA20000
heap
page read and write
4DF0000
direct allocation
page read and write
7C9000
unkown
page execute and read and write
441D000
stack
page read and write
1D36E000
stack
page read and write
3090000
heap
page read and write
1394000
heap
page read and write
1394000
heap
page read and write
4E00000
heap
page read and write
1394000
heap
page read and write
4E01000
heap
page read and write
4E01000
heap
page read and write
4CAF000
stack
page read and write
492E000
stack
page read and write
308E000
stack
page read and write
3B1F000
stack
page read and write
4E01000
heap
page read and write
157000
unkown
page execute and read and write
4E01000
heap
page read and write
1394000
heap
page read and write
1394000
heap
page read and write
5420000
direct allocation
page execute and read and write
1394000
heap
page read and write
1D4EE000
stack
page read and write
34DF000
stack
page read and write
4E01000
heap
page read and write
There are 226 hidden memdumps, click here to show them.