IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/q
unknown
http://185.215.113.206/c4becf79229cb002.php?=
unknown
http://185.215.113.206/c4becf79229cb002.php_=
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phpS=
unknown
http://185.215.113.206/B
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206
unknown
http://185.215.113.206/c4becf79229cb002.phpK=
unknown
http://185.215.113.206/c4becf79229cb002.phps
unknown
http://185.215.113.206qM
unknown
185.215.113.206/c4becf79229cb002.php
There are 3 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
10CD000
heap
page read and write
malicious
5130000
direct allocation
page read and write
malicious
9B1000
unkown
page execute and read and write
malicious
2EEB000
stack
page read and write
940000
heap
page read and write
9B0000
unkown
page readonly
10F5000
heap
page read and write
944000
heap
page read and write
41AE000
stack
page read and write
406E000
stack
page read and write
11E0000
direct allocation
page read and write
1D5AD000
stack
page read and write
10AE000
heap
page read and write
BFA000
unkown
page read and write
944000
heap
page read and write
5166000
direct allocation
page read and write
11E0000
direct allocation
page read and write
4CB1000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
4CB1000
heap
page read and write
1126000
heap
page read and write
4CB1000
heap
page read and write
1D09F000
stack
page read and write
4CB1000
heap
page read and write
4CB1000
heap
page read and write
4CB1000
heap
page read and write
944000
heap
page read and write
4CAF000
stack
page read and write
416F000
stack
page read and write
944000
heap
page read and write
8E5000
stack
page read and write
16CE000
stack
page read and write
4CB1000
heap
page read and write
2EF0000
direct allocation
page read and write
4CB1000
heap
page read and write
47AF000
stack
page read and write
4CB1000
heap
page read and write
37AE000
stack
page read and write
15CE000
stack
page read and write
944000
heap
page read and write
11E0000
direct allocation
page read and write
316E000
stack
page read and write
944000
heap
page read and write
43EF000
stack
page read and write
4CB1000
heap
page read and write
A5F000
unkown
page execute and read and write
442E000
stack
page read and write
BFA000
unkown
page write copy
944000
heap
page read and write
11E0000
direct allocation
page read and write
7EC000
stack
page read and write
4CB1000
heap
page read and write
4A6E000
stack
page read and write
32AE000
stack
page read and write
2EF0000
direct allocation
page read and write
3B2F000
stack
page read and write
11E0000
direct allocation
page read and write
944000
heap
page read and write
A3E000
unkown
page execute and read and write
4CD0000
heap
page read and write
4CB1000
heap
page read and write
4CB1000
heap
page read and write
492E000
stack
page read and write
4CB1000
heap
page read and write
4CB1000
heap
page read and write
E89000
unkown
page execute and read and write
9E7000
unkown
page execute and read and write
4CB1000
heap
page read and write
3DAF000
stack
page read and write
944000
heap
page read and write
E63000
unkown
page execute and read and write
4CB1000
heap
page read and write
42AF000
stack
page read and write
BFC000
unkown
page execute and read and write
1123000
heap
page read and write
452F000
stack
page read and write
4CB1000
heap
page read and write
11E0000
direct allocation
page read and write
944000
heap
page read and write
4CB1000
heap
page read and write
3DEE000
stack
page read and write
466F000
stack
page read and write
34EF000
stack
page read and write
944000
heap
page read and write
A46000
unkown
page execute and read and write
EA1000
unkown
page execute and write copy
52B0000
direct allocation
page execute and read and write
1D31F000
stack
page read and write
11E0000
direct allocation
page read and write
3F2E000
stack
page read and write
BE8000
unkown
page execute and read and write
944000
heap
page read and write
EA0000
unkown
page execute and read and write
1D36E000
stack
page read and write
4CB1000
heap
page read and write
4CB1000
heap
page read and write
4CB1000
heap
page read and write
2F2B000
heap
page read and write
3B6E000
stack
page read and write
4CB1000
heap
page read and write
302F000
stack
page read and write
38EE000
stack
page read and write
4CB1000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
5270000
direct allocation
page execute and read and write
944000
heap
page read and write
4CB1000
heap
page read and write
944000
heap
page read and write
46AE000
stack
page read and write
312F000
stack
page read and write
9B0000
unkown
page read and write
944000
heap
page read and write
3EEF000
stack
page read and write
4CB1000
heap
page read and write
944000
heap
page read and write
1090000
heap
page read and write
5290000
direct allocation
page execute and read and write
944000
heap
page read and write
516C000
stack
page read and write
944000
heap
page read and write
4A2F000
stack
page read and write
4CB1000
heap
page read and write
4CB1000
heap
page read and write
4CB1000
heap
page read and write
362F000
stack
page read and write
960000
heap
page read and write
4CB1000
heap
page read and write
4CB1000
heap
page read and write
1D6EC000
stack
page read and write
2EF0000
direct allocation
page read and write
4CB1000
heap
page read and write
4BAE000
stack
page read and write
4CB6000
heap
page read and write
4CB1000
heap
page read and write
5280000
direct allocation
page execute and read and write
110B000
heap
page read and write
4CB1000
heap
page read and write
1D1DF000
stack
page read and write
38AF000
stack
page read and write
376F000
stack
page read and write
10AA000
heap
page read and write
39EF000
stack
page read and write
4CB1000
heap
page read and write
4CB1000
heap
page read and write
D8A000
unkown
page execute and read and write
4CB1000
heap
page read and write
944000
heap
page read and write
366E000
stack
page read and write
103B000
unkown
page execute and read and write
4CB1000
heap
page read and write
326F000
stack
page read and write
11E0000
direct allocation
page read and write
3A2E000
stack
page read and write
11E0000
direct allocation
page read and write
EA0000
unkown
page execute and write copy
52C0000
direct allocation
page execute and read and write
3C6F000
stack
page read and write
4CC0000
heap
page read and write
5290000
direct allocation
page execute and read and write
2F10000
direct allocation
page execute and read and write
1D21E000
stack
page read and write
944000
heap
page read and write
456E000
stack
page read and write
42ED000
stack
page read and write
11E0000
direct allocation
page read and write
4CB1000
heap
page read and write
2F27000
heap
page read and write
4CB1000
heap
page read and write
33EE000
stack
page read and write
11DE000
stack
page read and write
33AF000
stack
page read and write
4CB1000
heap
page read and write
944000
heap
page read and write
107E000
stack
page read and write
944000
heap
page read and write
944000
heap
page read and write
4CB1000
heap
page read and write
4CB1000
heap
page read and write
1D0DE000
stack
page read and write
2EAE000
stack
page read and write
E91000
unkown
page execute and read and write
8EE000
stack
page read and write
4CB1000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
4CB1000
heap
page read and write
4CB1000
heap
page read and write
944000
heap
page read and write
4B6F000
stack
page read and write
944000
heap
page read and write
970000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
4CB1000
heap
page read and write
9B1000
unkown
page execute and write copy
944000
heap
page read and write
11E0000
direct allocation
page read and write
944000
heap
page read and write
48EF000
stack
page read and write
5270000
heap
page read and write
2F20000
heap
page read and write
352E000
stack
page read and write
4CB1000
heap
page read and write
11E0000
direct allocation
page read and write
944000
heap
page read and write
526F000
stack
page read and write
944000
heap
page read and write
944000
heap
page read and write
1D46F000
stack
page read and write
11E0000
direct allocation
page read and write
3CAE000
stack
page read and write
4CB1000
heap
page read and write
4CB0000
heap
page read and write
944000
heap
page read and write
11E0000
direct allocation
page read and write
52A0000
direct allocation
page execute and read and write
4CB1000
heap
page read and write
103C000
unkown
page execute and write copy
4DB0000
trusted library allocation
page read and write
402F000
stack
page read and write
1D4AE000
stack
page read and write
4CB1000
heap
page read and write
4CB1000
heap
page read and write
47EE000
stack
page read and write
4CB1000
heap
page read and write
944000
heap
page read and write
944000
heap
page read and write
10A0000
heap
page read and write
1CF9E000
stack
page read and write
4CB1000
heap
page read and write
4CB1000
heap
page read and write
1D5ED000
stack
page read and write
944000
heap
page read and write
4CB1000
heap
page read and write
There are 227 hidden memdumps, click here to show them.