IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phpp7
unknown
http://185.215.113.206/c4becf79229cb002.phpz
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206/c4becf79229cb002.phpy~C4
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.2065
unknown
http://185.215.113.206/c4becf79229cb002.phpez
unknown
http://185.215.113.206/c4becf79229cb002.php47
unknown
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
591000
unkown
page execute and read and write
malicious
15EE000
heap
page read and write
malicious
52F0000
direct allocation
page read and write
malicious
A76000
unkown
page execute and read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
3E2F000
stack
page read and write
14B4000
heap
page read and write
40AF000
stack
page read and write
4E71000
heap
page read and write
3BAF000
stack
page read and write
A76000
unkown
page execute and write copy
31E7000
heap
page read and write
14B4000
heap
page read and write
590000
unkown
page read and write
31C0000
direct allocation
page read and write
4E71000
heap
page read and write
14B4000
heap
page read and write
597F000
stack
page read and write
4E71000
heap
page read and write
14B4000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
3E6E000
stack
page read and write
14B4000
heap
page read and write
14B4000
heap
page read and write
37EF000
stack
page read and write
5C0E000
stack
page read and write
4E71000
heap
page read and write
15C0000
direct allocation
page read and write
15C0000
direct allocation
page read and write
4E71000
heap
page read and write
14B4000
heap
page read and write
4E71000
heap
page read and write
14B4000
heap
page read and write
14B4000
heap
page read and write
C0E000
unkown
page execute and write copy
59CE000
stack
page read and write
31E0000
heap
page read and write
4E71000
heap
page read and write
15C0000
direct allocation
page read and write
422E000
stack
page read and write
4E71000
heap
page read and write
14B4000
heap
page read and write
4E71000
heap
page read and write
482F000
stack
page read and write
546E000
stack
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4C2E000
stack
page read and write
15C0000
direct allocation
page read and write
13B0000
heap
page read and write
4E71000
heap
page read and write
52B0000
heap
page read and write
4E71000
heap
page read and write
4AAF000
stack
page read and write
46EF000
stack
page read and write
61E000
unkown
page execute and read and write
4E71000
heap
page read and write
15C0000
direct allocation
page read and write
5B0D000
stack
page read and write
40EE000
stack
page read and write
31C0000
direct allocation
page read and write
4E71000
heap
page read and write
31EB000
heap
page read and write
36AF000
stack
page read and write
162E000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
14B4000
heap
page read and write
1651000
heap
page read and write
4E71000
heap
page read and write
3F6F000
stack
page read and write
4E70000
heap
page read and write
18DF000
stack
page read and write
5470000
direct allocation
page execute and read and write
4E71000
heap
page read and write
14B4000
heap
page read and write
154E000
stack
page read and write
5430000
direct allocation
page execute and read and write
1646000
heap
page read and write
4E71000
heap
page read and write
A60000
unkown
page execute and read and write
15C0000
direct allocation
page read and write
332E000
stack
page read and write
14B4000
heap
page read and write
446F000
stack
page read and write
542F000
stack
page read and write
7C8000
unkown
page execute and read and write
4E71000
heap
page read and write
14B4000
heap
page read and write
4E71000
heap
page read and write
A77000
unkown
page execute and write copy
4E71000
heap
page read and write
14B4000
heap
page read and write
14B4000
heap
page read and write
14B4000
heap
page read and write
5460000
direct allocation
page execute and read and write
590000
unkown
page readonly
14B4000
heap
page read and write
346E000
stack
page read and write
5450000
direct allocation
page execute and read and write
4E71000
heap
page read and write
56DF000
stack
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
317F000
stack
page read and write
1490000
heap
page read and write
14B4000
heap
page read and write
4E71000
heap
page read and write
14B0000
heap
page read and write
14B4000
heap
page read and write
4D6E000
stack
page read and write
3D2E000
stack
page read and write
4E71000
heap
page read and write
14B4000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
559F000
stack
page read and write
356F000
stack
page read and write
587E000
stack
page read and write
392F000
stack
page read and write
14B4000
heap
page read and write
32EF000
stack
page read and write
15C0000
direct allocation
page read and write
3FAE000
stack
page read and write
45AF000
stack
page read and write
55DE000
stack
page read and write
14B4000
heap
page read and write
1664000
heap
page read and write
14B4000
heap
page read and write
4E71000
heap
page read and write
486E000
stack
page read and write
15E8000
heap
page read and write
14B4000
heap
page read and write
5460000
direct allocation
page execute and read and write
31C0000
direct allocation
page read and write
4E71000
heap
page read and write
15E0000
heap
page read and write
5480000
direct allocation
page execute and read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
5ACD000
stack
page read and write
3CEF000
stack
page read and write
14B4000
heap
page read and write
15AE000
stack
page read and write
C0D000
unkown
page execute and read and write
15C0000
direct allocation
page read and write
150D000
stack
page read and write
41EF000
stack
page read and write
14B4000
heap
page read and write
496F000
stack
page read and write
14B4000
heap
page read and write
532C000
stack
page read and write
4E71000
heap
page read and write
36EE000
stack
page read and write
4E71000
heap
page read and write
5490000
direct allocation
page execute and read and write
125C000
stack
page read and write
571E000
stack
page read and write
14B4000
heap
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4E81000
heap
page read and write
31BC000
stack
page read and write
4E71000
heap
page read and write
14B4000
heap
page read and write
581F000
stack
page read and write
49AE000
stack
page read and write
4E6F000
stack
page read and write
A37000
unkown
page execute and read and write
45EE000
stack
page read and write
4F70000
trusted library allocation
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
3A6F000
stack
page read and write
7DA000
unkown
page write copy
4E90000
heap
page read and write
15C0000
direct allocation
page read and write
15C0000
direct allocation
page read and write
17DE000
stack
page read and write
135E000
stack
page read and write
4E71000
heap
page read and write
1355000
stack
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
4AEE000
stack
page read and write
4E71000
heap
page read and write
342F000
stack
page read and write
44AE000
stack
page read and write
14B4000
heap
page read and write
A68000
unkown
page execute and read and write
15C0000
direct allocation
page read and write
5440000
direct allocation
page execute and read and write
4E71000
heap
page read and write
436E000
stack
page read and write
63F000
unkown
page execute and read and write
472E000
stack
page read and write
4E71000
heap
page read and write
14B4000
heap
page read and write
15C0000
direct allocation
page read and write
396E000
stack
page read and write
7DC000
unkown
page execute and read and write
4E71000
heap
page read and write
14B4000
heap
page read and write
4E71000
heap
page read and write
1634000
heap
page read and write
166C000
heap
page read and write
35AE000
stack
page read and write
626000
unkown
page execute and read and write
15C0000
direct allocation
page read and write
4E71000
heap
page read and write
3AAE000
stack
page read and write
15B0000
heap
page read and write
4E71000
heap
page read and write
432F000
stack
page read and write
7DA000
unkown
page read and write
4E71000
heap
page read and write
4E71000
heap
page read and write
14B4000
heap
page read and write
4D2F000
stack
page read and write
962000
unkown
page execute and read and write
4E71000
heap
page read and write
382E000
stack
page read and write
15C0000
direct allocation
page read and write
14B4000
heap
page read and write
4BEF000
stack
page read and write
3BEE000
stack
page read and write
591000
unkown
page execute and write copy
14B4000
heap
page read and write
4E71000
heap
page read and write
14B4000
heap
page read and write
There are 223 hidden memdumps, click here to show them.