IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php6/E
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php2.Y
unknown
http://185.215.113.206/c4becf79229cb002.phpR.
unknown
http://185.215.113.206
unknown
http://185.215.113.206/:
unknown
http://185.215.113.206/9
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
12DE000
heap
page read and write
malicious
4F70000
direct allocation
page read and write
malicious
8E1000
unkown
page execute and read and write
malicious
12DA000
heap
page read and write
5100000
direct allocation
page execute and read and write
4AE6000
heap
page read and write
50FE000
stack
page read and write
50D0000
direct allocation
page execute and read and write
4AE1000
heap
page read and write
50F0000
direct allocation
page execute and read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
472E000
stack
page read and write
11F0000
heap
page read and write
4AE1000
heap
page read and write
382E000
stack
page read and write
496F000
stack
page read and write
30AE000
stack
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
83C000
stack
page read and write
4AAF000
stack
page read and write
11D7000
heap
page read and write
3D2E000
stack
page read and write
DD2000
unkown
page execute and write copy
11D0000
heap
page read and write
11DB000
heap
page read and write
4AE1000
heap
page read and write
1D03E000
stack
page read and write
96E000
unkown
page execute and read and write
446F000
stack
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
31AF000
stack
page read and write
128B000
stack
page read and write
4AE1000
heap
page read and write
F6C000
unkown
page execute and read and write
DC2000
unkown
page execute and read and write
D92000
unkown
page execute and read and write
4AE1000
heap
page read and write
5110000
direct allocation
page execute and read and write
4AE1000
heap
page read and write
106D000
stack
page read and write
1CFFF000
stack
page read and write
35AE000
stack
page read and write
4AE1000
heap
page read and write
3BAF000
stack
page read and write
306F000
stack
page read and write
396E000
stack
page read and write
3BEE000
stack
page read and write
1D3EC000
stack
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
3A6F000
stack
page read and write
50AF000
stack
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
392F000
stack
page read and write
342F000
stack
page read and write
DD1000
unkown
page execute and write copy
4AD0000
direct allocation
page read and write
1349000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
45EE000
stack
page read and write
4AE1000
heap
page read and write
4AF0000
heap
page read and write
4AE1000
heap
page read and write
4AD0000
direct allocation
page read and write
14CE000
stack
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4FA6000
direct allocation
page read and write
50E0000
direct allocation
page execute and read and write
4AD0000
direct allocation
page read and write
41EF000
stack
page read and write
4AE1000
heap
page read and write
1CEBF000
stack
page read and write
4AE1000
heap
page read and write
4AD0000
direct allocation
page read and write
4AE1000
heap
page read and write
1D42D000
stack
page read and write
1200000
heap
page read and write
1356000
heap
page read and write
F6D000
unkown
page execute and write copy
4AE1000
heap
page read and write
8E0000
unkown
page read and write
4AE1000
heap
page read and write
4AB0000
heap
page read and write
45AF000
stack
page read and write
4AD0000
direct allocation
page read and write
1324000
heap
page read and write
4AE1000
heap
page read and write
36EE000
stack
page read and write
B2A000
unkown
page write copy
4AE1000
heap
page read and write
4AE0000
heap
page read and write
124E000
stack
page read and write
40AF000
stack
page read and write
B18000
unkown
page execute and read and write
50F0000
direct allocation
page execute and read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
3FAE000
stack
page read and write
CB3000
unkown
page execute and read and write
482F000
stack
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
1D13F000
stack
page read and write
4AE1000
heap
page read and write
F6C000
unkown
page execute and write copy
356F000
stack
page read and write
12D0000
heap
page read and write
4AE1000
heap
page read and write
36AF000
stack
page read and write
1D2EE000
stack
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4AD0000
direct allocation
page read and write
4AE1000
heap
page read and write
332E000
stack
page read and write
346E000
stack
page read and write
3CEF000
stack
page read and write
8A0000
heap
page read and write
4AD0000
direct allocation
page read and write
4F20000
trusted library allocation
page read and write
4AE1000
heap
page read and write
3E2F000
stack
page read and write
4AD0000
direct allocation
page read and write
15CE000
stack
page read and write
40EE000
stack
page read and write
4AD0000
direct allocation
page read and write
32EF000
stack
page read and write
432F000
stack
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
2F6F000
stack
page read and write
4AE1000
heap
page read and write
4FAC000
stack
page read and write
50C0000
direct allocation
page execute and read and write
436E000
stack
page read and write
4AD0000
direct allocation
page read and write
5120000
direct allocation
page execute and read and write
49AE000
stack
page read and write
8E1000
unkown
page execute and write copy
44AE000
stack
page read and write
8B0000
heap
page read and write
1D52E000
stack
page read and write
98F000
unkown
page execute and read and write
DBB000
unkown
page execute and read and write
DD1000
unkown
page execute and read and write
1D1AE000
stack
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
8E0000
unkown
page readonly
46EF000
stack
page read and write
12CE000
stack
page read and write
1CEFE000
stack
page read and write
4AE1000
heap
page read and write
976000
unkown
page execute and read and write
B2A000
unkown
page write copy
917000
unkown
page execute and read and write
4AE1000
heap
page read and write
11BE000
stack
page read and write
4AE1000
heap
page read and write
3AAE000
stack
page read and write
31EE000
stack
page read and write
1D2AF000
stack
page read and write
37EF000
stack
page read and write
1205000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
3F6F000
stack
page read and write
131E000
heap
page read and write
422E000
stack
page read and write
4AD0000
direct allocation
page read and write
4B00000
heap
page read and write
1064000
stack
page read and write
3E6E000
stack
page read and write
4AE1000
heap
page read and write
4AD0000
direct allocation
page read and write
4AD0000
direct allocation
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
1338000
heap
page read and write
4AD0000
direct allocation
page read and write
2E6F000
stack
page read and write
4F70000
direct allocation
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4F70000
direct allocation
page read and write
486E000
stack
page read and write
117E000
stack
page read and write
4AE1000
heap
page read and write
B2C000
unkown
page execute and read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
There are 201 hidden memdumps, click here to show them.