IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206-
unknown
http://185.215.113.206/0
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206
unknown
http://185.215.113.206/c4becf79229cb002.phps0_
unknown
http://185.215.113.206/c4becf79229cb002.phpC0o
unknown
http://185.215.113.206/c4becf79229cb002.phpk1G
unknown
185.215.113.206/c4becf79229cb002.php

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1018000
heap
page read and write
malicious
6D1000
unkown
page execute and read and write
malicious
4C80000
direct allocation
page read and write
malicious
3D4000
heap
page read and write
FFE000
heap
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
468F000
stack
page read and write
2C4F000
stack
page read and write
47E1000
heap
page read and write
3D4000
heap
page read and write
BCD000
unkown
page execute and read and write
3C8F000
stack
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
4E10000
direct allocation
page execute and read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
364F000
stack
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
47F0000
heap
page read and write
2C8E000
stack
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
3D4000
heap
page read and write
47E1000
heap
page read and write
430E000
stack
page read and write
47D0000
direct allocation
page read and write
1D00D000
stack
page read and write
3D4000
heap
page read and write
FE0000
heap
page read and write
47D0000
direct allocation
page read and write
3A0F000
stack
page read and write
3D4000
heap
page read and write
3B0000
heap
page read and write
350F000
stack
page read and write
3D4000
heap
page read and write
390E000
stack
page read and write
1013000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
47E1000
heap
page read and write
378F000
stack
page read and write
418F000
stack
page read and write
91C000
unkown
page execute and read and write
37CE000
stack
page read and write
1CC3E000
stack
page read and write
47D0000
direct allocation
page read and write
47D0000
direct allocation
page read and write
3B4F000
stack
page read and write
1D3F0000
heap
page read and write
458E000
stack
page read and write
3D4000
heap
page read and write
47E1000
heap
page read and write
4DBF000
stack
page read and write
E75000
stack
page read and write
4DD0000
direct allocation
page execute and read and write
BCD000
unkown
page execute and write copy
4C70000
direct allocation
page read and write
300F000
stack
page read and write
47D0000
direct allocation
page read and write
47E1000
heap
page read and write
33CF000
stack
page read and write
368E000
stack
page read and write
33C000
stack
page read and write
444E000
stack
page read and write
47E1000
heap
page read and write
1CD3F000
stack
page read and write
3E0D000
stack
page read and write
47E1000
heap
page read and write
47E0000
heap
page read and write
91A000
unkown
page write copy
47E1000
heap
page read and write
3D4000
heap
page read and write
105A000
heap
page read and write
3D4000
heap
page read and write
4800000
heap
page read and write
304E000
stack
page read and write
47D0000
direct allocation
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
1CAFE000
stack
page read and write
3D4000
heap
page read and write
1D3EE000
stack
page read and write
42CF000
stack
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
1D2EE000
stack
page read and write
354E000
stack
page read and write
3D4000
heap
page read and write
3D4000
heap
page read and write
3D4000
heap
page read and write
3D4000
heap
page read and write
3D4000
heap
page read and write
408E000
stack
page read and write
47E1000
heap
page read and write
3D4000
heap
page read and write
1075000
heap
page read and write
47E1000
heap
page read and write
B8C000
unkown
page execute and read and write
3D4000
heap
page read and write
3D4000
heap
page read and write
340E000
stack
page read and write
112D000
stack
page read and write
1043000
heap
page read and write
47E1000
heap
page read and write
1CBFF000
stack
page read and write
2F0E000
stack
page read and write
1CE7E000
stack
page read and write
328F000
stack
page read and write
3D4000
heap
page read and write
32CE000
stack
page read and write
1D14E000
stack
page read and write
4C70000
direct allocation
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
3D4000
heap
page read and write
4E20000
direct allocation
page execute and read and write
6D1000
unkown
page execute and write copy
1CECE000
stack
page read and write
3D4000
heap
page read and write
3DCF000
stack
page read and write
47D0000
direct allocation
page read and write
6D0000
unkown
page read and write
3F4E000
stack
page read and write
FBE000
stack
page read and write
404F000
stack
page read and write
47E1000
heap
page read and write
47CF000
stack
page read and write
3D4000
heap
page read and write
47E7000
heap
page read and write
1CD7E000
stack
page read and write
47E1000
heap
page read and write
BB7000
unkown
page execute and read and write
AAF000
unkown
page execute and read and write
2DCE000
stack
page read and write
318E000
stack
page read and write
BCE000
unkown
page execute and write copy
D70000
unkown
page execute and write copy
D6F000
unkown
page execute and read and write
47E1000
heap
page read and write
3D4000
heap
page read and write
FEB000
heap
page read and write
4E00000
direct allocation
page execute and read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
3A0000
heap
page read and write
122E000
stack
page read and write
BBE000
unkown
page execute and read and write
3A4E000
stack
page read and write
3D4000
heap
page read and write
3D4000
heap
page read and write
2B0F000
stack
page read and write
3D4000
heap
page read and write
3D4000
heap
page read and write
FFA000
heap
page read and write
75E000
unkown
page execute and read and write
46CE000
stack
page read and write
3B8E000
stack
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
3F0E000
stack
page read and write
91A000
unkown
page read and write
3D0000
heap
page read and write
3D4000
heap
page read and write
EBE000
stack
page read and write
47E1000
heap
page read and write
707000
unkown
page execute and read and write
38CF000
stack
page read and write
3D4000
heap
page read and write
47D0000
direct allocation
page read and write
47D0000
direct allocation
page read and write
1045000
heap
page read and write
47E1000
heap
page read and write
47D0000
direct allocation
page read and write
2ECF000
stack
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
47D0000
direct allocation
page read and write
3D4000
heap
page read and write
3CCE000
stack
page read and write
3D4000
heap
page read and write
47E1000
heap
page read and write
41CE000
stack
page read and write
314F000
stack
page read and write
4DD0000
heap
page read and write
47E1000
heap
page read and write
48E0000
trusted library allocation
page read and write
47E1000
heap
page read and write
FF0000
heap
page read and write
47E1000
heap
page read and write
1041000
heap
page read and write
6D0000
unkown
page readonly
47E1000
heap
page read and write
3D4000
heap
page read and write
2B4B000
stack
page read and write
3D4000
heap
page read and write
47E1000
heap
page read and write
4E00000
direct allocation
page execute and read and write
3D4000
heap
page read and write
47D0000
direct allocation
page read and write
1D24E000
stack
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
3D4000
heap
page read and write
3D4000
heap
page read and write
47D0000
direct allocation
page read and write
1D10C000
stack
page read and write
47E1000
heap
page read and write
FE7000
heap
page read and write
FD0000
heap
page read and write
2D8F000
stack
page read and write
77F000
unkown
page execute and read and write
3D4000
heap
page read and write
47E1000
heap
page read and write
440F000
stack
page read and write
47E1000
heap
page read and write
1CFCF000
stack
page read and write
3D4000
heap
page read and write
47D0000
direct allocation
page read and write
4C70000
direct allocation
page read and write
4DE0000
direct allocation
page execute and read and write
E7E000
stack
page read and write
47E1000
heap
page read and write
3D4000
heap
page read and write
908000
unkown
page execute and read and write
3D4000
heap
page read and write
47E1000
heap
page read and write
454F000
stack
page read and write
4CBB000
stack
page read and write
1039000
heap
page read and write
47E1000
heap
page read and write
3D4000
heap
page read and write
766000
unkown
page execute and read and write
47E1000
heap
page read and write
4CB6000
direct allocation
page read and write
3D4000
heap
page read and write
47E1000
heap
page read and write
2A0E000
stack
page read and write
3D4000
heap
page read and write
There are 232 hidden memdumps, click here to show them.