IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php/i
unknown
http://185.215.113.206k
unknown
http://185.215.113.206/c4becf79229cb002.php/G
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206
unknown
http://185.215.113.206/c4becf79229cb002.phpy;
unknown
http://185.215.113.206/5zm$
unknown
185.215.113.206/c4becf79229cb002.php

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
441000
unkown
page execute and read and write
malicious
156E000
heap
page read and write
malicious
5180000
direct allocation
page read and write
malicious
4D01000
heap
page read and write
1510000
direct allocation
page read and write
407F000
stack
page read and write
1404000
heap
page read and write
1404000
heap
page read and write
4D01000
heap
page read and write
1404000
heap
page read and write
1D12E000
stack
page read and write
1D22F000
stack
page read and write
1D8A4000
heap
page read and write
52C0000
heap
page read and write
393E000
stack
page read and write
353F000
stack
page read and write
1404000
heap
page read and write
4D01000
heap
page read and write
1568000
heap
page read and write
1404000
heap
page read and write
1404000
heap
page read and write
4D01000
heap
page read and write
1404000
heap
page read and write
4D01000
heap
page read and write
1404000
heap
page read and write
497E000
stack
page read and write
357E000
stack
page read and write
1510000
direct allocation
page read and write
1404000
heap
page read and write
343E000
stack
page read and write
3BBE000
stack
page read and write
4D01000
heap
page read and write
4D01000
heap
page read and write
4ABE000
stack
page read and write
1560000
heap
page read and write
4D01000
heap
page read and write
1510000
direct allocation
page read and write
1404000
heap
page read and write
4D01000
heap
page read and write
1404000
heap
page read and write
303F000
stack
page read and write
4D01000
heap
page read and write
4D01000
heap
page read and write
51BE000
stack
page read and write
5310000
direct allocation
page execute and read and write
68A000
unkown
page read and write
15B2000
heap
page read and write
38FF000
stack
page read and write
4D01000
heap
page read and write
13CE000
stack
page read and write
3F7E000
stack
page read and write
1540000
heap
page read and write
3E3E000
stack
page read and write
1404000
heap
page read and write
4D01000
heap
page read and write
1404000
heap
page read and write
3CFE000
stack
page read and write
1510000
direct allocation
page read and write
4EF000
unkown
page execute and read and write
926000
unkown
page execute and read and write
52BF000
stack
page read and write
4D01000
heap
page read and write
1404000
heap
page read and write
1510000
direct allocation
page read and write
4D01000
heap
page read and write
1530000
direct allocation
page read and write
4D01000
heap
page read and write
4BBF000
stack
page read and write
678000
unkown
page execute and read and write
4D01000
heap
page read and write
1D5FC000
stack
page read and write
4D01000
heap
page read and write
3DFF000
stack
page read and write
3A3F000
stack
page read and write
1510000
direct allocation
page read and write
1D3AE000
stack
page read and write
13F0000
heap
page read and write
1404000
heap
page read and write
4D01000
heap
page read and write
4D01000
heap
page read and write
46FE000
stack
page read and write
1404000
heap
page read and write
1D63E000
stack
page read and write
1404000
heap
page read and write
440000
unkown
page readonly
1404000
heap
page read and write
4D01000
heap
page read and write
4D01000
heap
page read and write
1240000
heap
page read and write
37BE000
stack
page read and write
4D01000
heap
page read and write
1510000
direct allocation
page read and write
441000
unkown
page execute and write copy
2F3E000
stack
page read and write
4D20000
heap
page read and write
8F8000
unkown
page execute and read and write
4D01000
heap
page read and write
EDC000
stack
page read and write
1404000
heap
page read and write
4D01000
heap
page read and write
31BE000
stack
page read and write
4D01000
heap
page read and write
1D89F000
stack
page read and write
150F000
stack
page read and write
1CFEE000
stack
page read and write
1D36E000
stack
page read and write
1404000
heap
page read and write
1404000
heap
page read and write
1404000
heap
page read and write
4D01000
heap
page read and write
4D17000
heap
page read and write
4D01000
heap
page read and write
32BF000
stack
page read and write
935000
unkown
page execute and read and write
440000
unkown
page read and write
1D73E000
stack
page read and write
1404000
heap
page read and write
4D01000
heap
page read and write
47FF000
stack
page read and write
1510000
direct allocation
page read and write
935000
unkown
page execute and write copy
1510000
direct allocation
page read and write
1404000
heap
page read and write
1400000
heap
page read and write
3B7F000
stack
page read and write
4D01000
heap
page read and write
443E000
stack
page read and write
4D01000
heap
page read and write
40BE000
stack
page read and write
4D01000
heap
page read and write
4D01000
heap
page read and write
4BFE000
stack
page read and write
52C0000
direct allocation
page execute and read and write
1D4AF000
stack
page read and write
1D0EF000
stack
page read and write
4D01000
heap
page read and write
1404000
heap
page read and write
1404000
heap
page read and write
68C000
unkown
page execute and read and write
1D79E000
stack
page read and write
41FE000
stack
page read and write
1404000
heap
page read and write
4D01000
heap
page read and write
4D01000
heap
page read and write
1547000
heap
page read and write
4D01000
heap
page read and write
1404000
heap
page read and write
1404000
heap
page read and write
46BF000
stack
page read and write
936000
unkown
page execute and write copy
4D00000
heap
page read and write
52F0000
direct allocation
page execute and read and write
41BF000
stack
page read and write
477000
unkown
page execute and read and write
4D01000
heap
page read and write
32FE000
stack
page read and write
493F000
stack
page read and write
1404000
heap
page read and write
457E000
stack
page read and write
15B4000
heap
page read and write
3A7E000
stack
page read and write
AD3000
unkown
page execute and read and write
4A7F000
stack
page read and write
4D01000
heap
page read and write
447E000
stack
page read and write
367F000
stack
page read and write
4D01000
heap
page read and write
52F0000
direct allocation
page execute and read and write
3CBF000
stack
page read and write
5300000
direct allocation
page execute and read and write
33FF000
stack
page read and write
4CFF000
stack
page read and write
4D01000
heap
page read and write
1510000
direct allocation
page read and write
1404000
heap
page read and write
4D01000
heap
page read and write
36BE000
stack
page read and write
15E9000
heap
page read and write
68A000
unkown
page write copy
4D01000
heap
page read and write
483E000
stack
page read and write
4D01000
heap
page read and write
4D01000
heap
page read and write
1530000
direct allocation
page read and write
FDE000
stack
page read and write
52E0000
direct allocation
page execute and read and write
1404000
heap
page read and write
1530000
direct allocation
page read and write
4D6000
unkown
page execute and read and write
1D8A0000
heap
page read and write
4D01000
heap
page read and write
15B0000
heap
page read and write
4E00000
trusted library allocation
page read and write
FD5000
stack
page read and write
1D26E000
stack
page read and write
816000
unkown
page execute and read and write
52D0000
direct allocation
page execute and read and write
15E2000
heap
page read and write
4D01000
heap
page read and write
45BE000
stack
page read and write
4D01000
heap
page read and write
4D01000
heap
page read and write
433E000
stack
page read and write
1404000
heap
page read and write
1404000
heap
page read and write
91F000
unkown
page execute and read and write
1D4FD000
stack
page read and write
4D01000
heap
page read and write
37FE000
stack
page read and write
1320000
heap
page read and write
4D01000
heap
page read and write
1510000
direct allocation
page read and write
1404000
heap
page read and write
1510000
direct allocation
page read and write
4CE000
unkown
page execute and read and write
4D01000
heap
page read and write
51B6000
direct allocation
page read and write
138E000
stack
page read and write
317F000
stack
page read and write
4D01000
heap
page read and write
42FF000
stack
page read and write
1404000
heap
page read and write
1510000
direct allocation
page read and write
175F000
stack
page read and write
4D01000
heap
page read and write
15C7000
heap
page read and write
3F3F000
stack
page read and write
1404000
heap
page read and write
1404000
heap
page read and write
4D10000
heap
page read and write
4D01000
heap
page read and write
307C000
stack
page read and write
1404000
heap
page read and write
1404000
heap
page read and write
1510000
direct allocation
page read and write
1404000
heap
page read and write
AD4000
unkown
page execute and write copy
There are 227 hidden memdumps, click here to show them.