IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/3
unknown
http://185.215.113.206/c4becf79229cb002.phpUN
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php-
unknown
http://185.215.113.206
unknown
http://185.215.113.206/J
unknown
http://185.215.113.206/c4becf79229cb002.phpQ
unknown
185.215.113.206/c4becf79229cb002.php

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
11AE000
heap
page read and write
malicious
4FF0000
direct allocation
page read and write
malicious
2B1000
unkown
page execute and read and write
malicious
4B61000
heap
page read and write
4B61000
heap
page read and write
4B50000
direct allocation
page read and write
346000
unkown
page execute and read and write
4B50000
direct allocation
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
2DA0000
heap
page read and write
30EF000
stack
page read and write
4B61000
heap
page read and write
3EEE000
stack
page read and write
322F000
stack
page read and write
426E000
stack
page read and write
DB0000
heap
page read and write
4B61000
heap
page read and write
48EE000
stack
page read and write
1D47D000
stack
page read and write
4B61000
heap
page read and write
2B0000
unkown
page read and write
4B61000
heap
page read and write
4FA000
unkown
page write copy
1D1CE000
stack
page read and write
43AF000
stack
page read and write
4B80000
heap
page read and write
2D90000
heap
page read and write
4B50000
direct allocation
page read and write
5160000
direct allocation
page execute and read and write
4B70000
heap
page read and write
681000
unkown
page execute and read and write
1D32F000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4B60000
heap
page read and write
4B61000
heap
page read and write
33E000
unkown
page execute and read and write
4B61000
heap
page read and write
DE0000
heap
page read and write
4B61000
heap
page read and write
476F000
stack
page read and write
4B50000
direct allocation
page read and write
4B61000
heap
page read and write
117D000
stack
page read and write
4B50000
direct allocation
page read and write
4B50000
direct allocation
page read and write
4B61000
heap
page read and write
372F000
stack
page read and write
4B50000
direct allocation
page read and write
39AF000
stack
page read and write
4B61000
heap
page read and write
2FEE000
stack
page read and write
4B61000
heap
page read and write
49EF000
stack
page read and write
3C6E000
stack
page read and write
513F000
stack
page read and write
92E000
unkown
page execute and read and write
11F5000
heap
page read and write
1D37E000
stack
page read and write
1CF8E000
stack
page read and write
4B61000
heap
page read and write
39EE000
stack
page read and write
4B61000
heap
page read and write
79A000
unkown
page execute and write copy
362E000
stack
page read and write
4B61000
heap
page read and write
3DAE000
stack
page read and write
3AEF000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
326E000
stack
page read and write
44EF000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
5180000
direct allocation
page execute and read and write
4B61000
heap
page read and write
47AE000
stack
page read and write
D4C000
stack
page read and write
5026000
direct allocation
page read and write
336F000
stack
page read and write
4B50000
direct allocation
page read and write
5150000
direct allocation
page execute and read and write
4B61000
heap
page read and write
1206000
heap
page read and write
5170000
direct allocation
page execute and read and write
5190000
direct allocation
page execute and read and write
113E000
stack
page read and write
4B61000
heap
page read and write
10F5000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
3EAF000
stack
page read and write
4B61000
heap
page read and write
156F000
stack
page read and write
11F2000
heap
page read and write
4B50000
direct allocation
page read and write
4B61000
heap
page read and write
51A0000
direct allocation
page execute and read and write
4B2F000
stack
page read and write
2DA7000
heap
page read and write
4B61000
heap
page read and write
35EF000
stack
page read and write
4B61000
heap
page read and write
2B0000
unkown
page readonly
4B50000
direct allocation
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
462F000
stack
page read and write
1D4BD000
stack
page read and write
4FF0000
direct allocation
page read and write
4B61000
heap
page read and write
2D4E000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
2DAB000
heap
page read and write
4B61000
heap
page read and write
783000
unkown
page execute and read and write
312E000
stack
page read and write
43EE000
stack
page read and write
4B61000
heap
page read and write
3FEF000
stack
page read and write
799000
unkown
page execute and read and write
1223000
heap
page read and write
42AE000
stack
page read and write
1D5BE000
stack
page read and write
4B61000
heap
page read and write
DE5000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4E8000
unkown
page execute and read and write
386F000
stack
page read and write
78B000
unkown
page execute and read and write
3B2E000
stack
page read and write
4B61000
heap
page read and write
2EAF000
stack
page read and write
4B50000
direct allocation
page read and write
2D8B000
stack
page read and write
4FF0000
direct allocation
page read and write
4B61000
heap
page read and write
34AF000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
38AE000
stack
page read and write
1D0CE000
stack
page read and write
10FE000
stack
page read and write
4B61000
heap
page read and write
1D08F000
stack
page read and write
4B61000
heap
page read and write
4FF0000
direct allocation
page read and write
4B50000
direct allocation
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
146E000
stack
page read and write
11A8000
heap
page read and write
4B61000
heap
page read and write
3C2F000
stack
page read and write
92F000
unkown
page execute and write copy
2B1000
unkown
page execute and write copy
4B61000
heap
page read and write
5180000
direct allocation
page execute and read and write
503E000
stack
page read and write
4B61000
heap
page read and write
4B50000
direct allocation
page read and write
4B50000
direct allocation
page read and write
75C000
unkown
page execute and read and write
1D22E000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
3D6F000
stack
page read and write
466E000
stack
page read and write
4B61000
heap
page read and write
2FAF000
stack
page read and write
2E7000
unkown
page execute and read and write
33AE000
stack
page read and write
4B61000
heap
page read and write
416E000
stack
page read and write
4FC000
unkown
page execute and read and write
1CF4F000
stack
page read and write
DC0000
heap
page read and write
518E000
stack
page read and write
11A0000
heap
page read and write
4FA0000
trusted library allocation
page read and write
4B61000
heap
page read and write
4A2E000
stack
page read and write
4B61000
heap
page read and write
799000
unkown
page execute and write copy
376E000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
412F000
stack
page read and write
48AF000
stack
page read and write
4B61000
heap
page read and write
402E000
stack
page read and write
4FA000
unkown
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
452E000
stack
page read and write
35F000
unkown
page execute and read and write
4B30000
heap
page read and write
4B61000
heap
page read and write
51B0000
direct allocation
page execute and read and write
34EE000
stack
page read and write
There are 197 hidden memdumps, click here to show them.