IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php/y
unknown
http://185.215.113.206/1
unknown
http://185.215.113.206/c4becf79229cb002.php_
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206
unknown
http://185.215.113.206/L
unknown
http://185.215.113.206/k
unknown
http://185.215.113.206/c4becf79229cb002.phpt
unknown
http://185.215.113.206/w
unknown
185.215.113.206/c4becf79229cb002.php
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4A00000
direct allocation
page read and write
malicious
536000
heap
page read and write
malicious
8C1000
unkown
page execute and read and write
malicious
4B90000
direct allocation
page execute and read and write
4561000
heap
page read and write
4B4000
heap
page read and write
454F000
stack
page read and write
2B4F000
stack
page read and write
3F0F000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
49B0000
heap
page read and write
4561000
heap
page read and write
4B70000
direct allocation
page execute and read and write
4B4000
heap
page read and write
49F0000
direct allocation
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
364F000
stack
page read and write
1C5000
stack
page read and write
576000
heap
page read and write
49F0000
direct allocation
page read and write
4550000
direct allocation
page read and write
B0A000
unkown
page read and write
4B4000
heap
page read and write
42CF000
stack
page read and write
DA3000
unkown
page execute and read and write
4550000
direct allocation
page read and write
318E000
stack
page read and write
4561000
heap
page read and write
3B8E000
stack
page read and write
F50000
unkown
page execute and read and write
4B4000
heap
page read and write
444E000
stack
page read and write
2C8E000
stack
page read and write
4550000
direct allocation
page read and write
2F0E000
stack
page read and write
510000
heap
page read and write
4B4000
heap
page read and write
4561000
heap
page read and write
4B4000
heap
page read and write
340E000
stack
page read and write
294B000
heap
page read and write
314F000
stack
page read and write
86C000
stack
page read and write
33CF000
stack
page read and write
55F000
heap
page read and write
37CE000
stack
page read and write
AF8000
unkown
page execute and read and write
4550000
direct allocation
page read and write
521E000
stack
page read and write
8B0000
heap
page read and write
49F0000
direct allocation
page read and write
4B4000
heap
page read and write
51E000
heap
page read and write
2D8F000
stack
page read and write
CC000
stack
page read and write
4561000
heap
page read and write
4B4000
heap
page read and write
4561000
heap
page read and write
4B4000
heap
page read and write
4B4000
heap
page read and write
4B3F000
stack
page read and write
4561000
heap
page read and write
4E2E000
stack
page read and write
304E000
stack
page read and write
4B4000
heap
page read and write
2ECF000
stack
page read and write
408E000
stack
page read and write
4574000
heap
page read and write
94E000
unkown
page execute and read and write
4561000
heap
page read and write
4A3E000
stack
page read and write
4561000
heap
page read and write
508F000
stack
page read and write
4550000
direct allocation
page read and write
4B4000
heap
page read and write
3C8E000
stack
page read and write
518000
heap
page read and write
4B4000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
105F000
stack
page read and write
4561000
heap
page read and write
293E000
stack
page read and write
4560000
heap
page read and write
41CE000
stack
page read and write
4550000
direct allocation
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
3B4F000
stack
page read and write
51DD000
stack
page read and write
3CCE000
stack
page read and write
28FF000
stack
page read and write
4561000
heap
page read and write
4B4000
heap
page read and write
4561000
heap
page read and write
4F2F000
stack
page read and write
4B4000
heap
page read and write
4B4000
heap
page read and write
4B4000
heap
page read and write
DB3000
unkown
page execute and write copy
4550000
direct allocation
page read and write
4561000
heap
page read and write
350F000
stack
page read and write
390E000
stack
page read and write
3A4E000
stack
page read and write
430000
heap
page read and write
4B80000
direct allocation
page execute and read and write
4B4000
heap
page read and write
4B50000
direct allocation
page execute and read and write
531E000
stack
page read and write
4550000
direct allocation
page read and write
2A4F000
stack
page read and write
4550000
direct allocation
page read and write
4561000
heap
page read and write
4B4000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
440000
heap
page read and write
32CE000
stack
page read and write
4561000
heap
page read and write
4B8E000
stack
page read and write
5A1000
heap
page read and write
4B4000
heap
page read and write
4550000
direct allocation
page read and write
4561000
heap
page read and write
4B4000
heap
page read and write
4F8E000
stack
page read and write
328F000
stack
page read and write
561000
heap
page read and write
8C1000
unkown
page execute and write copy
38CF000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
368E000
stack
page read and write
404F000
stack
page read and write
4561000
heap
page read and write
50DD000
stack
page read and write
3DCF000
stack
page read and write
4580000
heap
page read and write
4561000
heap
page read and write
593000
heap
page read and write
4561000
heap
page read and write
4B4000
heap
page read and write
4561000
heap
page read and write
4B4000
heap
page read and write
418F000
stack
page read and write
956000
unkown
page execute and read and write
4561000
heap
page read and write
4561000
heap
page read and write
4550000
direct allocation
page read and write
4561000
heap
page read and write
DB2000
unkown
page execute and read and write
4B80000
direct allocation
page execute and read and write
8AE000
stack
page read and write
4550000
direct allocation
page read and write
4561000
heap
page read and write
4B4000
heap
page read and write
4561000
heap
page read and write
4B4000
heap
page read and write
354E000
stack
page read and write
C91000
unkown
page execute and read and write
4B60000
direct allocation
page execute and read and write
4B4000
heap
page read and write
4550000
direct allocation
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
4B4000
heap
page read and write
3E0E000
stack
page read and write
4CAF000
stack
page read and write
2DCE000
stack
page read and write
4561000
heap
page read and write
4FE000
stack
page read and write
4561000
heap
page read and write
300F000
stack
page read and write
B0A000
unkown
page write copy
4561000
heap
page read and write
4561000
heap
page read and write
4B4000
heap
page read and write
2C4F000
stack
page read and write
96F000
unkown
page execute and read and write
430E000
stack
page read and write
4B4000
heap
page read and write
4561000
heap
page read and write
49A0000
trusted library allocation
page read and write
4561000
heap
page read and write
2940000
heap
page read and write
4B4000
heap
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
4B4000
heap
page read and write
4561000
heap
page read and write
8C0000
unkown
page readonly
3F4E000
stack
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
4561000
heap
page read and write
4B4000
heap
page read and write
4561000
heap
page read and write
4B4000
heap
page read and write
4B4000
heap
page read and write
4B4000
heap
page read and write
4CEE000
stack
page read and write
4B4000
heap
page read and write
D70000
unkown
page execute and read and write
4561000
heap
page read and write
4B0000
heap
page read and write
4561000
heap
page read and write
B0C000
unkown
page execute and read and write
7DE000
stack
page read and write
4570000
heap
page read and write
440F000
stack
page read and write
378F000
stack
page read and write
4B4000
heap
page read and write
4550000
direct allocation
page read and write
2947000
heap
page read and write
4561000
heap
page read and write
3A0F000
stack
page read and write
59E000
heap
page read and write
1CE000
stack
page read and write
D9C000
unkown
page execute and read and write
8C0000
unkown
page read and write
4DEF000
stack
page read and write
82E000
stack
page read and write
4561000
heap
page read and write
4AD000
stack
page read and write
DB2000
unkown
page execute and write copy
There are 222 hidden memdumps, click here to show them.