IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phpj
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206/uP
unknown
http://185.215.113.206
unknown
http://185.215.113.206/:
unknown
http://185.215.113.206/c4becf79229cb002.php/P
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.206/c4becf79229cb002.phpr
unknown
185.215.113.206/c4becf79229cb002.php
http://185.215.113.206/c4becf79229cb002.phpV
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4E40000
direct allocation
page read and write
malicious
A7E000
heap
page read and write
malicious
F61000
unkown
page execute and read and write
malicious
F40000
direct allocation
page read and write
1D3EC000
stack
page read and write
2D4E000
stack
page read and write
473F000
stack
page read and write
43BE000
stack
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
100F000
unkown
page execute and read and write
2DFB000
heap
page read and write
3BFF000
stack
page read and write
1CEBF000
stack
page read and write
49C1000
heap
page read and write
11AA000
unkown
page read and write
1456000
unkown
page execute and write copy
4E7E000
stack
page read and write
3E7F000
stack
page read and write
49E0000
heap
page read and write
49C0000
heap
page read and write
36FF000
stack
page read and write
4FBE000
stack
page read and write
4E00000
trusted library allocation
page read and write
915000
heap
page read and write
49C1000
heap
page read and write
413E000
stack
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
F40000
direct allocation
page read and write
3FBF000
stack
page read and write
49C1000
heap
page read and write
11AA000
unkown
page write copy
2FFF000
stack
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
2DD0000
direct allocation
page read and write
8FE000
stack
page read and write
4FB0000
direct allocation
page execute and read and write
5D5000
stack
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
F40000
direct allocation
page read and write
2DCE000
stack
page read and write
49C1000
heap
page read and write
F40000
direct allocation
page read and write
11AC000
unkown
page execute and read and write
3EBE000
stack
page read and write
49C1000
heap
page read and write
A50000
heap
page read and write
F40000
direct allocation
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
1D15F000
stack
page read and write
40FF000
stack
page read and write
3AFE000
stack
page read and write
427E000
stack
page read and write
49C1000
heap
page read and write
1D2AD000
stack
page read and write
1CEFE000
stack
page read and write
49C1000
heap
page read and write
35BF000
stack
page read and write
1448000
unkown
page execute and read and write
2D8E000
stack
page read and write
F40000
direct allocation
page read and write
AC2000
heap
page read and write
49C1000
heap
page read and write
4F90000
direct allocation
page execute and read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
373E000
stack
page read and write
49C1000
heap
page read and write
2DF7000
heap
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
423F000
stack
page read and write
3D7E000
stack
page read and write
1335000
unkown
page execute and read and write
F40000
direct allocation
page read and write
39BE000
stack
page read and write
8BE000
stack
page read and write
49C1000
heap
page read and write
F40000
direct allocation
page read and write
1414000
unkown
page execute and read and write
910000
heap
page read and write
1D05E000
stack
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
387E000
stack
page read and write
AE4000
heap
page read and write
F60000
unkown
page readonly
49BF000
stack
page read and write
4FC0000
direct allocation
page execute and read and write
4F80000
direct allocation
page execute and read and write
3ABF000
stack
page read and write
143E000
unkown
page execute and read and write
347F000
stack
page read and write
F40000
direct allocation
page read and write
49C1000
heap
page read and write
333F000
stack
page read and write
2D0F000
stack
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
A40000
heap
page read and write
2DD0000
direct allocation
page read and write
49C1000
heap
page read and write
4F7F000
stack
page read and write
487F000
stack
page read and write
49C1000
heap
page read and write
30FF000
stack
page read and write
4FE0000
direct allocation
page execute and read and write
2DF0000
heap
page read and write
1455000
unkown
page execute and read and write
49C1000
heap
page read and write
49D4000
heap
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
F61000
unkown
page execute and write copy
49C1000
heap
page read and write
31FF000
stack
page read and write
4FB0000
direct allocation
page execute and read and write
B00000
heap
page read and write
3C3E000
stack
page read and write
AF1000
heap
page read and write
1CFFF000
stack
page read and write
49C1000
heap
page read and write
1455000
unkown
page execute and write copy
49C1000
heap
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
323E000
stack
page read and write
49C1000
heap
page read and write
4DC000
stack
page read and write
49C1000
heap
page read and write
A3E000
stack
page read and write
49C1000
heap
page read and write
1CDBE000
stack
page read and write
F40000
direct allocation
page read and write
463E000
stack
page read and write
F60000
unkown
page read and write
49C1000
heap
page read and write
A70000
heap
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
840000
heap
page read and write
3FFE000
stack
page read and write
397F000
stack
page read and write
4E76000
direct allocation
page read and write
3D3F000
stack
page read and write
1D2ED000
stack
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
F40000
direct allocation
page read and write
383F000
stack
page read and write
15F6000
unkown
page execute and read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
850000
heap
page read and write
5DD000
stack
page read and write
F40000
direct allocation
page read and write
49C1000
heap
page read and write
34BE000
stack
page read and write
AD7000
heap
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
35FE000
stack
page read and write
49C1000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
1D1AD000
stack
page read and write
FF6000
unkown
page execute and read and write
49C1000
heap
page read and write
49D0000
heap
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
45FF000
stack
page read and write
49C1000
heap
page read and write
44FE000
stack
page read and write
1198000
unkown
page execute and read and write
15F7000
unkown
page execute and write copy
49C1000
heap
page read and write
49C1000
heap
page read and write
C6F000
stack
page read and write
A78000
heap
page read and write
AE6000
heap
page read and write
48BE000
stack
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
F40000
direct allocation
page read and write
437F000
stack
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
F40000
direct allocation
page read and write
FEE000
unkown
page execute and read and write
49C1000
heap
page read and write
2DD0000
direct allocation
page read and write
49C1000
heap
page read and write
F3C000
stack
page read and write
F97000
unkown
page execute and read and write
477E000
stack
page read and write
D6E000
stack
page read and write
337E000
stack
page read and write
44BF000
stack
page read and write
2EFF000
stack
page read and write
1CD7F000
stack
page read and write
49C1000
heap
page read and write
49C1000
heap
page read and write
There are 200 hidden memdumps, click here to show them.