IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206/c4becf79229cb002.php?
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php/K
unknown
http://185.215.113.206
unknown
http://185.215.113.206Z
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
511000
unkown
page execute and read and write
malicious
118E000
heap
page read and write
malicious
4EE0000
direct allocation
page read and write
malicious
10C4000
heap
page read and write
41CE000
stack
page read and write
FB0000
heap
page read and write
E5C000
stack
page read and write
4A51000
heap
page read and write
5060000
direct allocation
page execute and read and write
10C4000
heap
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
11D2000
heap
page read and write
4A51000
heap
page read and write
4E90000
trusted library allocation
page read and write
10C4000
heap
page read and write
10C4000
heap
page read and write
2C5E000
stack
page read and write
304E000
stack
page read and write
4A51000
heap
page read and write
1CEAE000
stack
page read and write
11BB000
heap
page read and write
4F16000
direct allocation
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
5050000
direct allocation
page execute and read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
10C4000
heap
page read and write
38CF000
stack
page read and write
4A51000
heap
page read and write
458E000
stack
page read and write
1D37D000
stack
page read and write
1D0EE000
stack
page read and write
4A51000
heap
page read and write
10C4000
heap
page read and write
A06000
unkown
page execute and write copy
3A4E000
stack
page read and write
4A51000
heap
page read and write
494E000
stack
page read and write
4A51000
heap
page read and write
A05000
unkown
page execute and write copy
3A0F000
stack
page read and write
10C4000
heap
page read and write
390E000
stack
page read and write
4A51000
heap
page read and write
10C4000
heap
page read and write
10C4000
heap
page read and write
9ED000
unkown
page execute and read and write
4A51000
heap
page read and write
10C4000
heap
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
4ED0000
direct allocation
page read and write
1D660000
heap
page read and write
1090000
heap
page read and write
2C60000
direct allocation
page read and write
2C60000
direct allocation
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
2C60000
direct allocation
page read and write
4A51000
heap
page read and write
3B4F000
stack
page read and write
10C4000
heap
page read and write
9F7000
unkown
page execute and read and write
10C4000
heap
page read and write
2DCB000
stack
page read and write
10C4000
heap
page read and write
5070000
direct allocation
page execute and read and write
1CFEE000
stack
page read and write
4A51000
heap
page read and write
511000
unkown
page execute and write copy
5040000
direct allocation
page execute and read and write
4A51000
heap
page read and write
BA3000
unkown
page execute and read and write
4A51000
heap
page read and write
10C4000
heap
page read and write
547000
unkown
page execute and read and write
4A51000
heap
page read and write
2C60000
direct allocation
page read and write
1D55E000
stack
page read and write
10C4000
heap
page read and write
3C8F000
stack
page read and write
10C4000
heap
page read and write
510000
unkown
page read and write
4A51000
heap
page read and write
59E000
unkown
page execute and read and write
10C4000
heap
page read and write
4A51000
heap
page read and write
46CE000
stack
page read and write
4A51000
heap
page read and write
468F000
stack
page read and write
350F000
stack
page read and write
4A51000
heap
page read and write
3CCE000
stack
page read and write
4A51000
heap
page read and write
3E0E000
stack
page read and write
110E000
stack
page read and write
118A000
heap
page read and write
5030000
heap
page read and write
2C60000
direct allocation
page read and write
4A51000
heap
page read and write
408D000
stack
page read and write
1180000
heap
page read and write
444E000
stack
page read and write
2ECF000
stack
page read and write
2D8F000
stack
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
368E000
stack
page read and write
4A51000
heap
page read and write
137E000
stack
page read and write
328F000
stack
page read and write
2C80000
heap
page read and write
2C8B000
heap
page read and write
4A51000
heap
page read and write
1202000
heap
page read and write
490F000
stack
page read and write
4A51000
heap
page read and write
42CF000
stack
page read and write
1D3BD000
stack
page read and write
364F000
stack
page read and write
1D12E000
stack
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
1D22F000
stack
page read and write
10C4000
heap
page read and write
2F0E000
stack
page read and write
33CF000
stack
page read and write
10C4000
heap
page read and write
1CD6E000
stack
page read and write
1CE6F000
stack
page read and write
404F000
stack
page read and write
11D4000
heap
page read and write
5030000
direct allocation
page execute and read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
5BF000
unkown
page execute and read and write
10C4000
heap
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
114E000
stack
page read and write
47CF000
stack
page read and write
10C4000
heap
page read and write
480E000
stack
page read and write
501F000
stack
page read and write
440F000
stack
page read and write
10C4000
heap
page read and write
510000
unkown
page readonly
10C4000
heap
page read and write
4A51000
heap
page read and write
37CE000
stack
page read and write
5060000
direct allocation
page execute and read and write
10C4000
heap
page read and write
3DCF000
stack
page read and write
4A50000
heap
page read and write
10C4000
heap
page read and write
2C60000
direct allocation
page read and write
147E000
stack
page read and write
10C4000
heap
page read and write
1CFAF000
stack
page read and write
2C60000
direct allocation
page read and write
354E000
stack
page read and write
1170000
heap
page read and write
378F000
stack
page read and write
1D27D000
stack
page read and write
4A51000
heap
page read and write
300F000
stack
page read and write
5080000
direct allocation
page execute and read and write
10C4000
heap
page read and write
3F0F000
stack
page read and write
10C4000
heap
page read and write
8E6000
unkown
page execute and read and write
418F000
stack
page read and write
4F1E000
stack
page read and write
1D65E000
stack
page read and write
75A000
unkown
page write copy
4A4F000
stack
page read and write
5090000
direct allocation
page execute and read and write
1D4BE000
stack
page read and write
3F4E000
stack
page read and write
748000
unkown
page execute and read and write
10C4000
heap
page read and write
4A60000
heap
page read and write
2C60000
direct allocation
page read and write
4ED0000
direct allocation
page read and write
4A70000
heap
page read and write
4A62000
heap
page read and write
10C4000
heap
page read and write
454F000
stack
page read and write
F5E000
stack
page read and write
10C4000
heap
page read and write
10C4000
heap
page read and write
2C60000
direct allocation
page read and write
32CE000
stack
page read and write
4A51000
heap
page read and write
4ED0000
direct allocation
page read and write
2C60000
direct allocation
page read and write
340E000
stack
page read and write
2C60000
direct allocation
page read and write
4A51000
heap
page read and write
2C60000
direct allocation
page read and write
9C6000
unkown
page execute and read and write
10C0000
heap
page read and write
4A51000
heap
page read and write
5A6000
unkown
page execute and read and write
10C4000
heap
page read and write
10C4000
heap
page read and write
2C60000
direct allocation
page read and write
4A51000
heap
page read and write
75C000
unkown
page execute and read and write
4A51000
heap
page read and write
10C4000
heap
page read and write
11E7000
heap
page read and write
3B8E000
stack
page read and write
318E000
stack
page read and write
A05000
unkown
page execute and read and write
10C4000
heap
page read and write
10C4000
heap
page read and write
75A000
unkown
page read and write
430E000
stack
page read and write
F55000
stack
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
10C4000
heap
page read and write
2C60000
direct allocation
page read and write
10C4000
heap
page read and write
10C4000
heap
page read and write
10C4000
heap
page read and write
2C87000
heap
page read and write
314F000
stack
page read and write
There are 225 hidden memdumps, click here to show them.