IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phpbZ
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206/~
unknown
http://185.215.113.206/c4becf79229cb002.php7S
unknown
http://185.215.113.206
unknown
http://185.215.113.206/J
unknown
http://185.215.113.206/9
unknown
http://185.215.113.206/c4becf79229cb002.phpJZ
unknown
http://185.215.113.206/c4becf79229cb002.php%
unknown
185.215.113.206/c4becf79229cb002.php
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s-part-0035.t-0009.t-msedge.net
13.107.246.63

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
341000
unkown
page execute and read and write
malicious
4C00000
direct allocation
page read and write
malicious
FAC000
heap
page read and write
malicious
4761000
heap
page read and write
341000
unkown
page execute and write copy
295E000
stack
page read and write
FD3000
heap
page read and write
830000
unkown
page execute and write copy
2A20000
direct allocation
page read and write
39BE000
stack
page read and write
4761000
heap
page read and write
830000
unkown
page execute and read and write
4761000
heap
page read and write
4761000
heap
page read and write
100C000
heap
page read and write
3D6000
unkown
page execute and read and write
817000
unkown
page execute and read and write
4761000
heap
page read and write
347F000
stack
page read and write
35BF000
stack
page read and write
377000
unkown
page execute and read and write
4761000
heap
page read and write
373E000
stack
page read and write
299C000
stack
page read and write
4761000
heap
page read and write
3ABF000
stack
page read and write
831000
unkown
page execute and write copy
4761000
heap
page read and write
2A20000
direct allocation
page read and write
2A3B000
heap
page read and write
2A20000
direct allocation
page read and write
4761000
heap
page read and write
2A20000
direct allocation
page read and write
2E7E000
stack
page read and write
4761000
heap
page read and write
F5E000
stack
page read and write
718000
unkown
page execute and read and write
4C00000
direct allocation
page read and write
3D3F000
stack
page read and write
CFD000
stack
page read and write
4D90000
direct allocation
page execute and read and write
4761000
heap
page read and write
4761000
heap
page read and write
4D4F000
stack
page read and write
4C00000
direct allocation
page read and write
333F000
stack
page read and write
29DE000
stack
page read and write
DD0000
heap
page read and write
578000
unkown
page execute and read and write
4761000
heap
page read and write
4761000
heap
page read and write
397F000
stack
page read and write
473F000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
30FE000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
4761000
heap
page read and write
4761000
heap
page read and write
2CC000
stack
page read and write
1CB9E000
stack
page read and write
2A1E000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
427E000
stack
page read and write
383F000
stack
page read and write
4D70000
direct allocation
page execute and read and write
58A000
unkown
page read and write
2FBE000
stack
page read and write
4761000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
4761000
heap
page read and write
2A20000
direct allocation
page read and write
4761000
heap
page read and write
F1E000
stack
page read and write
4761000
heap
page read and write
9D0000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
1CCDE000
stack
page read and write
36FF000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
30BF000
stack
page read and write
4761000
heap
page read and write
44BF000
stack
page read and write
4761000
heap
page read and write
1008000
heap
page read and write
2E3F000
stack
page read and write
117E000
stack
page read and write
4740000
heap
page read and write
4761000
heap
page read and write
1CDDF000
stack
page read and write
1CC9F000
stack
page read and write
DD5000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
1D1CE000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
F8E000
heap
page read and write
4860000
trusted library allocation
page read and write
1CB5F000
stack
page read and write
463E000
stack
page read and write
1CE4E000
stack
page read and write
4761000
heap
page read and write
330000
heap
page read and write
2A20000
direct allocation
page read and write
423F000
stack
page read and write
3D7D000
stack
page read and write
3C3E000
stack
page read and write
4761000
heap
page read and write
2F7F000
stack
page read and write
E1D000
stack
page read and write
4761000
heap
page read and write
4C00000
direct allocation
page read and write
31FF000
stack
page read and write
35FE000
stack
page read and write
2D3F000
stack
page read and write
323E000
stack
page read and write
4761000
heap
page read and write
413E000
stack
page read and write
45FF000
stack
page read and write
4761000
heap
page read and write
2A20000
direct allocation
page read and write
43BE000
stack
page read and write
4761000
heap
page read and write
4C36000
direct allocation
page read and write
4761000
heap
page read and write
4D60000
direct allocation
page execute and read and write
4761000
heap
page read and write
2A20000
direct allocation
page read and write
4761000
heap
page read and write
337E000
stack
page read and write
2A20000
direct allocation
page read and write
1D0CD000
stack
page read and write
4761000
heap
page read and write
3EBE000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
2A20000
direct allocation
page read and write
1CF4F000
stack
page read and write
4761000
heap
page read and write
3FBF000
stack
page read and write
4DB0000
direct allocation
page execute and read and write
4761000
heap
page read and write
4C4C000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
FF8000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
CF5000
stack
page read and write
4777000
heap
page read and write
4D9E000
stack
page read and write
1D08C000
stack
page read and write
437F000
stack
page read and write
44FE000
stack
page read and write
4761000
heap
page read and write
2A37000
heap
page read and write
4780000
heap
page read and write
3AFE000
stack
page read and write
2A20000
direct allocation
page read and write
4761000
heap
page read and write
3CE000
unkown
page execute and read and write
2A20000
direct allocation
page read and write
2B3F000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
34BE000
stack
page read and write
3EF000
unkown
page execute and read and write
340000
unkown
page readonly
58C000
unkown
page execute and read and write
4761000
heap
page read and write
4761000
heap
page read and write
4860000
heap
page read and write
7F0000
unkown
page execute and read and write
4761000
heap
page read and write
822000
unkown
page execute and read and write
2C3F000
stack
page read and write
F80000
heap
page read and write
2A20000
direct allocation
page read and write
4761000
heap
page read and write
9CB000
unkown
page execute and read and write
4761000
heap
page read and write
4761000
heap
page read and write
F8A000
heap
page read and write
4761000
heap
page read and write
4D80000
direct allocation
page execute and read and write
2A30000
heap
page read and write
58A000
unkown
page write copy
3FFE000
stack
page read and write
4D90000
direct allocation
page execute and read and write
4761000
heap
page read and write
4761000
heap
page read and write
2A20000
direct allocation
page read and write
40FF000
stack
page read and write
3E7F000
stack
page read and write
4761000
heap
page read and write
3BFF000
stack
page read and write
1CF8E000
stack
page read and write
387E000
stack
page read and write
FE9000
heap
page read and write
4761000
heap
page read and write
340000
unkown
page read and write
9CC000
unkown
page execute and write copy
4760000
heap
page read and write
There are 202 hidden memdumps, click here to show them.