IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/e2b1563c6670f193.php
185.215.113.206
malicious
http://185.215.113.206/e2b1563c6670f193.php~
unknown
http://185.215.113.206/e2b1563c6670f193.php/
unknown
http://185.215.113.206/lC
unknown
http://185.215.113.206/e2b1563c6670f193.phpP
unknown
http://185.215.113.206/e2b1563c6670f193.phpZ
unknown
http://185.215.113.206/e2b1563c6670f193.phpF
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.206/DCBF360B3297E19BA487R
unknown
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4AF0000
direct allocation
page read and write
malicious
69E000
heap
page read and write
malicious
911000
unkown
page execute and read and write
malicious
911000
unkown
page execute and write copy
4671000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
1CABE000
stack
page read and write
614000
heap
page read and write
33AF000
stack
page read and write
614000
heap
page read and write
2EAF000
stack
page read and write
2B2E000
stack
page read and write
910000
unkown
page readonly
1CD3E000
stack
page read and write
FC3000
unkown
page execute and write copy
4C40000
direct allocation
page execute and read and write
4AD0000
heap
page read and write
614000
heap
page read and write
4671000
heap
page read and write
DDB000
unkown
page execute and read and write
88E000
stack
page read and write
8F0000
direct allocation
page read and write
3EEE000
stack
page read and write
312F000
stack
page read and write
3CAE000
stack
page read and write
4671000
heap
page read and write
1BC000
stack
page read and write
4671000
heap
page read and write
614000
heap
page read and write
4671000
heap
page read and write
614000
heap
page read and write
32AE000
stack
page read and write
8F0000
direct allocation
page read and write
614000
heap
page read and write
614000
heap
page read and write
614000
heap
page read and write
4671000
heap
page read and write
614000
heap
page read and write
402F000
stack
page read and write
4671000
heap
page read and write
39EF000
stack
page read and write
4690000
heap
page read and write
E03000
unkown
page execute and read and write
687000
heap
page read and write
4671000
heap
page read and write
466F000
stack
page read and write
9C1000
unkown
page execute and read and write
4AF0000
direct allocation
page read and write
4671000
heap
page read and write
614000
heap
page read and write
376F000
stack
page read and write
614000
heap
page read and write
4B2E000
stack
page read and write
4671000
heap
page read and write
FC2000
unkown
page execute and read and write
29AF000
stack
page read and write
3B2F000
stack
page read and write
352E000
stack
page read and write
406E000
stack
page read and write
8F0000
direct allocation
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
614000
heap
page read and write
4671000
heap
page read and write
4770000
trusted library allocation
page read and write
614000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
4671000
heap
page read and write
4671000
heap
page read and write
8F0000
direct allocation
page read and write
614000
heap
page read and write
8F0000
direct allocation
page read and write
4671000
heap
page read and write
452F000
stack
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
1CA7F000
stack
page read and write
8F0000
direct allocation
page read and write
698000
heap
page read and write
1CE3F000
stack
page read and write
4C60000
direct allocation
page execute and read and write
E1A000
unkown
page execute and write copy
2DAE000
stack
page read and write
E0A000
unkown
page execute and read and write
68B000
heap
page read and write
37AE000
stack
page read and write
1CCFF000
stack
page read and write
4F5000
stack
page read and write
326F000
stack
page read and write
614000
heap
page read and write
4671000
heap
page read and write
316E000
stack
page read and write
4671000
heap
page read and write
8F0000
direct allocation
page read and write
E19000
unkown
page execute and write copy
8E0000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
29EB000
stack
page read and write
B6E000
unkown
page execute and read and write
910000
unkown
page read and write
8CD000
stack
page read and write
CFB000
unkown
page execute and read and write
4671000
heap
page read and write
2EEE000
stack
page read and write
38EE000
stack
page read and write
4671000
heap
page read and write
28AE000
stack
page read and write
366E000
stack
page read and write
8F0000
direct allocation
page read and write
614000
heap
page read and write
680000
heap
page read and write
6F8000
heap
page read and write
4671000
heap
page read and write
3F2E000
stack
page read and write
416F000
stack
page read and write
34EF000
stack
page read and write
8F0000
direct allocation
page read and write
362F000
stack
page read and write
510000
heap
page read and write
3DEE000
stack
page read and write
1CFCE000
stack
page read and write
41AE000
stack
page read and write
4671000
heap
page read and write
3DAF000
stack
page read and write
614000
heap
page read and write
4C50000
direct allocation
page execute and read and write
4C70000
direct allocation
page execute and read and write
614000
heap
page read and write
9F2000
unkown
page execute and read and write
B5A000
unkown
page execute and read and write
4C2F000
stack
page read and write
42EE000
stack
page read and write
610000
heap
page read and write
4671000
heap
page read and write
6E2000
heap
page read and write
2D6F000
stack
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
614000
heap
page read and write
712000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
4670000
heap
page read and write
1CBBF000
stack
page read and write
2C6E000
stack
page read and write
8F0000
direct allocation
page read and write
690000
heap
page read and write
43EF000
stack
page read and write
614000
heap
page read and write
614000
heap
page read and write
E19000
unkown
page execute and read and write
456E000
stack
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
614000
heap
page read and write
614000
heap
page read and write
614000
heap
page read and write
4C80000
direct allocation
page execute and read and write
4671000
heap
page read and write
66E000
stack
page read and write
614000
heap
page read and write
3C6F000
stack
page read and write
614000
heap
page read and write
614000
heap
page read and write
38AF000
stack
page read and write
614000
heap
page read and write
614000
heap
page read and write
614000
heap
page read and write
442E000
stack
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
8F0000
direct allocation
page read and write
1CBFE000
stack
page read and write
8F0000
direct allocation
page read and write
10CE000
stack
page read and write
4FE000
stack
page read and write
4671000
heap
page read and write
4AF0000
direct allocation
page read and write
4687000
heap
page read and write
4671000
heap
page read and write
1D0CC000
stack
page read and write
4C90000
direct allocation
page execute and read and write
614000
heap
page read and write
302E000
stack
page read and write
6E6000
heap
page read and write
4671000
heap
page read and write
3B6E000
stack
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
1C97E000
stack
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
5F0000
heap
page read and write
4671000
heap
page read and write
614000
heap
page read and write
2AEF000
stack
page read and write
2FEF000
stack
page read and write
4671000
heap
page read and write
42AF000
stack
page read and write
9CD000
unkown
page execute and read and write
4671000
heap
page read and write
2C2F000
stack
page read and write
4671000
heap
page read and write
1CF8D000
stack
page read and write
614000
heap
page read and write
4671000
heap
page read and write
4C70000
direct allocation
page execute and read and write
4671000
heap
page read and write
8F0000
direct allocation
page read and write
3A2E000
stack
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
614000
heap
page read and write
1CE8D000
stack
page read and write
614000
heap
page read and write
4671000
heap
page read and write
614000
heap
page read and write
8F0000
direct allocation
page read and write
614000
heap
page read and write
33EE000
stack
page read and write
There are 218 hidden memdumps, click here to show them.