IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206//oY=
unknown
http://185.215.113.206/ToN=
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.206%
unknown
http://185.215.113.206/c4becf79229cb002.phph
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4E10000
direct allocation
page read and write
malicious
431000
unkown
page execute and read and write
malicious
FDE000
heap
page read and write
malicious
480F000
stack
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
FDA000
heap
page read and write
1CE9F000
stack
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
3BCE000
stack
page read and write
4E46000
direct allocation
page read and write
EFE000
stack
page read and write
2D0F000
stack
page read and write
4970000
direct allocation
page read and write
4970000
direct allocation
page read and write
67A000
unkown
page write copy
4981000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
3F8D000
stack
page read and write
4981000
heap
page read and write
1D570000
heap
page read and write
3E0F000
stack
page read and write
4FAE000
stack
page read and write
4981000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
4981000
heap
page read and write
1020000
heap
page read and write
4981000
heap
page read and write
368F000
stack
page read and write
4981000
heap
page read and write
37CF000
stack
page read and write
1053000
heap
page read and write
4981000
heap
page read and write
40CE000
stack
page read and write
4950000
heap
page read and write
4A80000
trusted library allocation
page read and write
458F000
stack
page read and write
4981000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
81B000
unkown
page execute and read and write
4970000
direct allocation
page read and write
4F90000
direct allocation
page execute and read and write
1D2CE000
stack
page read and write
45CE000
stack
page read and write
1D28C000
stack
page read and write
4981000
heap
page read and write
4DF000
unkown
page execute and read and write
32CF000
stack
page read and write
4E10000
direct allocation
page read and write
4981000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
1061000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
304F000
stack
page read and write
BF0000
heap
page read and write
4981000
heap
page read and write
BB0000
heap
page read and write
4970000
direct allocation
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
1CFDF000
stack
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
8F0000
unkown
page execute and read and write
3A4F000
stack
page read and write
4E10000
direct allocation
page read and write
470E000
stack
page read and write
2BAB000
stack
page read and write
4981000
heap
page read and write
1024000
heap
page read and write
3CCF000
stack
page read and write
4995000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
ADA000
unkown
page execute and write copy
4E10000
direct allocation
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
112E000
stack
page read and write
354F000
stack
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
4970000
direct allocation
page read and write
4981000
heap
page read and write
2C07000
heap
page read and write
4981000
heap
page read and write
2BF0000
heap
page read and write
4981000
heap
page read and write
B6C000
stack
page read and write
4981000
heap
page read and write
308E000
stack
page read and write
4981000
heap
page read and write
1CEDE000
stack
page read and write
4981000
heap
page read and write
157E000
stack
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
1CD9E000
stack
page read and write
431000
unkown
page execute and write copy
122E000
stack
page read and write
4981000
heap
page read and write
4970000
direct allocation
page read and write
3D0E000
stack
page read and write
330E000
stack
page read and write
FD0000
heap
page read and write
925000
unkown
page execute and read and write
448E000
stack
page read and write
2C00000
heap
page read and write
67C000
unkown
page execute and read and write
467000
unkown
page execute and read and write
4E5E000
stack
page read and write
4981000
heap
page read and write
934000
unkown
page execute and write copy
4970000
direct allocation
page read and write
318F000
stack
page read and write
105D000
heap
page read and write
4BE000
unkown
page execute and read and write
430000
unkown
page read and write
4970000
direct allocation
page read and write
2BEE000
stack
page read and write
3A8E000
stack
page read and write
4980000
heap
page read and write
AD9000
unkown
page execute and read and write
484E000
stack
page read and write
BE0000
heap
page read and write
4981000
heap
page read and write
1D3CE000
stack
page read and write
4970000
direct allocation
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
EF5000
stack
page read and write
4981000
heap
page read and write
344E000
stack
page read and write
4970000
direct allocation
page read and write
390F000
stack
page read and write
4981000
heap
page read and write
49A0000
heap
page read and write
67A000
unkown
page read and write
934000
unkown
page execute and read and write
420E000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
408E000
stack
page read and write
1CD5F000
stack
page read and write
4981000
heap
page read and write
BB5000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
430F000
stack
page read and write
4981000
heap
page read and write
3F4F000
stack
page read and write
4981000
heap
page read and write
3E4E000
stack
page read and write
4981000
heap
page read and write
1D13F000
stack
page read and write
2E0F000
stack
page read and write
1D46E000
stack
page read and write
4970000
direct allocation
page read and write
31CE000
stack
page read and write
4970000
direct allocation
page read and write
2F4E000
stack
page read and write
41CF000
stack
page read and write
4981000
heap
page read and write
4F70000
direct allocation
page execute and read and write
46CF000
stack
page read and write
1038000
heap
page read and write
430000
unkown
page readonly
4970000
direct allocation
page read and write
2B6E000
stack
page read and write
380E000
stack
page read and write
4981000
heap
page read and write
1D56F000
stack
page read and write
935000
unkown
page execute and write copy
2C0B000
heap
page read and write
2F0F000
stack
page read and write
4981000
heap
page read and write
668000
unkown
page execute and read and write
394E000
stack
page read and write
4F5F000
stack
page read and write
494F000
stack
page read and write
4981000
heap
page read and write
147E000
stack
page read and write
1D03E000
stack
page read and write
358E000
stack
page read and write
4981000
heap
page read and write
444F000
stack
page read and write
4981000
heap
page read and write
4970000
direct allocation
page read and write
4981000
heap
page read and write
36CE000
stack
page read and write
91B000
unkown
page execute and read and write
4981000
heap
page read and write
1D18D000
stack
page read and write
4C6000
unkown
page execute and read and write
3B8F000
stack
page read and write
4981000
heap
page read and write
434E000
stack
page read and write
1044000
heap
page read and write
340F000
stack
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
4F80000
direct allocation
page execute and read and write
4981000
heap
page read and write
There are 202 hidden memdumps, click here to show them.