IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/
185.215.113.206
http://185.215.113.206b
unknown
http://185.215.113.206
unknown
http://185.215.113.206/K
unknown
http://185.215.113.206/ws
unknown
185.215.113.206/c4becf79229cb002.php

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4E50000
direct allocation
page read and write
malicious
BDE000
heap
page read and write
malicious
D61000
unkown
page execute and read and write
malicious
346F000
stack
page read and write
49B0000
direct allocation
page read and write
44AF000
stack
page read and write
B37000
heap
page read and write
B1E000
stack
page read and write
5FE000
stack
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
1D2EE000
stack
page read and write
D0E000
stack
page read and write
49B0000
direct allocation
page read and write
49C1000
heap
page read and write
49C0000
heap
page read and write
F98000
unkown
page execute and read and write
4FB0000
direct allocation
page execute and read and write
49C1000
heap
page read and write
124F000
unkown
page execute and read and write
B3B000
heap
page read and write
1407000
unkown
page execute and write copy
49C1000
heap
page read and write
1D19F000
stack
page read and write
49B0000
direct allocation
page read and write
3D2F000
stack
page read and write
113C000
unkown
page execute and read and write
AD4000
heap
page read and write
49B0000
direct allocation
page read and write
49B0000
direct allocation
page read and write
1D42C000
stack
page read and write
3D6E000
stack
page read and write
49C1000
heap
page read and write
AD4000
heap
page read and write
AD4000
heap
page read and write
34AE000
stack
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
D50000
heap
page read and write
4E50000
direct allocation
page read and write
AD4000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
AD4000
heap
page read and write
49C1000
heap
page read and write
51C000
stack
page read and write
49C1000
heap
page read and write
AD4000
heap
page read and write
AD4000
heap
page read and write
AD4000
heap
page read and write
AD4000
heap
page read and write
1CE1E000
stack
page read and write
49C1000
heap
page read and write
35AF000
stack
page read and write
49C1000
heap
page read and write
49B0000
direct allocation
page read and write
3FAF000
stack
page read and write
8FE000
stack
page read and write
AD4000
heap
page read and write
382F000
stack
page read and write
49C4000
heap
page read and write
1CF5E000
stack
page read and write
B30000
heap
page read and write
AD4000
heap
page read and write
31EF000
stack
page read and write
E0F000
unkown
page execute and read and write
AD4000
heap
page read and write
1CDDF000
stack
page read and write
125F000
unkown
page execute and write copy
DEE000
unkown
page execute and read and write
49C1000
heap
page read and write
49E0000
heap
page read and write
2EAF000
stack
page read and write
AD0000
heap
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
43AE000
stack
page read and write
4FB0000
heap
page read and write
FAC000
unkown
page execute and read and write
2DAF000
stack
page read and write
332F000
stack
page read and write
AD4000
heap
page read and write
322E000
stack
page read and write
AD4000
heap
page read and write
5000000
direct allocation
page execute and read and write
49B0000
direct allocation
page read and write
49B0000
direct allocation
page read and write
BD8000
heap
page read and write
49C1000
heap
page read and write
AD4000
heap
page read and write
8F5000
stack
page read and write
49C1000
heap
page read and write
372E000
stack
page read and write
4FC0000
direct allocation
page execute and read and write
150E000
stack
page read and write
422F000
stack
page read and write
30EE000
stack
page read and write
3BEF000
stack
page read and write
1D05E000
stack
page read and write
4E50000
direct allocation
page read and write
49C1000
heap
page read and write
C53000
heap
page read and write
FAA000
unkown
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
462E000
stack
page read and write
AD4000
heap
page read and write
4E86000
direct allocation
page read and write
49B0000
direct allocation
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
FAA000
unkown
page write copy
30AF000
stack
page read and write
49C1000
heap
page read and write
BCC000
stack
page read and write
49C1000
heap
page read and write
3EAE000
stack
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
D4E000
stack
page read and write
3C2E000
stack
page read and write
35EE000
stack
page read and write
49C1000
heap
page read and write
C63000
heap
page read and write
49C1000
heap
page read and write
AD4000
heap
page read and write
49C1000
heap
page read and write
590000
heap
page read and write
C40000
heap
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
3E6F000
stack
page read and write
49B0000
direct allocation
page read and write
4FF0000
direct allocation
page execute and read and write
396F000
stack
page read and write
49C1000
heap
page read and write
49B0000
direct allocation
page read and write
AD4000
heap
page read and write
AD4000
heap
page read and write
AD4000
heap
page read and write
C37000
heap
page read and write
49C1000
heap
page read and write
476E000
stack
page read and write
49C1000
heap
page read and write
D60000
unkown
page read and write
3AAF000
stack
page read and write
49C1000
heap
page read and write
AD4000
heap
page read and write
49C1000
heap
page read and write
3AEE000
stack
page read and write
49C1000
heap
page read and write
1D09E000
stack
page read and write
36EF000
stack
page read and write
4E9C000
stack
page read and write
C24000
heap
page read and write
426E000
stack
page read and write
AD4000
heap
page read and write
39AE000
stack
page read and write
AD4000
heap
page read and write
2FAF000
stack
page read and write
AD4000
heap
page read and write
49C1000
heap
page read and write
D61000
unkown
page execute and write copy
125E000
unkown
page execute and read and write
49C1000
heap
page read and write
AD4000
heap
page read and write
1CCDE000
stack
page read and write
1406000
unkown
page execute and read and write
AD4000
heap
page read and write
3FEE000
stack
page read and write
1247000
unkown
page execute and read and write
472F000
stack
page read and write
AD4000
heap
page read and write
49B0000
direct allocation
page read and write
AD4000
heap
page read and write
BD0000
heap
page read and write
412E000
stack
page read and write
49C1000
heap
page read and write
45EF000
stack
page read and write
48AE000
stack
page read and write
49C1000
heap
page read and write
580000
heap
page read and write
1CF1F000
stack
page read and write
ACE000
stack
page read and write
40EF000
stack
page read and write
1D1EE000
stack
page read and write
AD4000
heap
page read and write
4E50000
direct allocation
page read and write
1D32D000
stack
page read and write
4E00000
trusted library allocation
page read and write
49C1000
heap
page read and write
386E000
stack
page read and write
DF6000
unkown
page execute and read and write
49C1000
heap
page read and write
49B0000
direct allocation
page read and write
49B0000
direct allocation
page read and write
AD4000
heap
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
AD4000
heap
page read and write
AD4000
heap
page read and write
AD4000
heap
page read and write
49C1000
heap
page read and write
AD4000
heap
page read and write
C5A000
heap
page read and write
AD4000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
49C1000
heap
page read and write
AD4000
heap
page read and write
B8E000
stack
page read and write
486F000
stack
page read and write
44EE000
stack
page read and write
436F000
stack
page read and write
AD4000
heap
page read and write
D97000
unkown
page execute and read and write
336E000
stack
page read and write
AD4000
heap
page read and write
49AF000
stack
page read and write
49C1000
heap
page read and write
4F9F000
stack
page read and write
AD4000
heap
page read and write
49C1000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
49C1000
heap
page read and write
49D0000
heap
page read and write
D60000
unkown
page readonly
125E000
unkown
page execute and write copy
49C1000
heap
page read and write
AD4000
heap
page read and write
121D000
unkown
page execute and read and write
AD4000
heap
page read and write
49C1000
heap
page read and write
There are 223 hidden memdumps, click here to show them.