IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phpK
unknown
http://185.215.113.206/c4becf79229cb002.php)
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206
unknown
http://185.215.113.206/c4becf79229cb002.phpD
unknown
http://185.215.113.206/c4becf79229cb002.phpg
unknown
185.215.113.206/c4becf79229cb002.php

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4ED0000
direct allocation
page read and write
malicious
301000
unkown
page execute and read and write
malicious
100E000
heap
page read and write
malicious
4A31000
heap
page read and write
300000
unkown
page read and write
467E000
stack
page read and write
1D23E000
stack
page read and write
3C3F000
stack
page read and write
4A31000
heap
page read and write
3EBF000
stack
page read and write
43FE000
stack
page read and write
4A31000
heap
page read and write
7F4000
unkown
page execute and read and write
1066000
heap
page read and write
4A31000
heap
page read and write
F90000
heap
page read and write
4A20000
direct allocation
page read and write
54C000
unkown
page execute and read and write
33BE000
stack
page read and write
993000
unkown
page execute and write copy
4A31000
heap
page read and write
337000
unkown
page execute and read and write
4A31000
heap
page read and write
35FF000
stack
page read and write
5030000
direct allocation
page execute and read and write
4A20000
direct allocation
page read and write
2FFE000
stack
page read and write
1D5DD000
stack
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
34FE000
stack
page read and write
427F000
stack
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
130F000
stack
page read and write
4A00000
heap
page read and write
54A000
unkown
page write copy
4A20000
direct allocation
page read and write
1081000
heap
page read and write
300000
unkown
page readonly
413F000
stack
page read and write
4A31000
heap
page read and write
4A20000
direct allocation
page read and write
538000
unkown
page execute and read and write
387F000
stack
page read and write
7F5000
unkown
page execute and write copy
4A20000
direct allocation
page read and write
1D47E000
stack
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
363E000
stack
page read and write
4A31000
heap
page read and write
42BE000
stack
page read and write
4A31000
heap
page read and write
3AFF000
stack
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
4EC0000
direct allocation
page read and write
4A31000
heap
page read and write
5060000
direct allocation
page execute and read and write
4A31000
heap
page read and write
5020000
direct allocation
page execute and read and write
4A31000
heap
page read and write
144F000
stack
page read and write
4A31000
heap
page read and write
7B5000
unkown
page execute and read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
4A20000
direct allocation
page read and write
4A31000
heap
page read and write
1CE0F000
stack
page read and write
4A31000
heap
page read and write
1000000
heap
page read and write
4A31000
heap
page read and write
323F000
stack
page read and write
FF0000
heap
page read and write
4A31000
heap
page read and write
3B3E000
stack
page read and write
4A31000
heap
page read and write
4EC0000
direct allocation
page read and write
7DC000
unkown
page execute and read and write
4A31000
heap
page read and write
1D08F000
stack
page read and write
39BF000
stack
page read and write
4A20000
direct allocation
page read and write
4A31000
heap
page read and write
4EC0000
direct allocation
page read and write
4A31000
heap
page read and write
301000
unkown
page execute and write copy
4A31000
heap
page read and write
54A000
unkown
page read and write
4A31000
heap
page read and write
2EBE000
stack
page read and write
4A31000
heap
page read and write
3AF000
unkown
page execute and read and write
100A000
heap
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
4A20000
direct allocation
page read and write
120E000
stack
page read and write
49FF000
stack
page read and write
477F000
stack
page read and write
43BF000
stack
page read and write
4F06000
direct allocation
page read and write
38E000
unkown
page execute and read and write
FA0000
heap
page read and write
2FBF000
stack
page read and write
1CF8E000
stack
page read and write
4A31000
heap
page read and write
1053000
heap
page read and write
44FF000
stack
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
4F0E000
stack
page read and write
4A31000
heap
page read and write
4A40000
heap
page read and write
403D000
stack
page read and write
2E7F000
stack
page read and write
4A31000
heap
page read and write
2C30000
heap
page read and write
313E000
stack
page read and write
5050000
direct allocation
page execute and read and write
1D5E4000
heap
page read and write
4A31000
heap
page read and write
34BF000
stack
page read and write
4A31000
heap
page read and write
4A30000
heap
page read and write
E3C000
stack
page read and write
1D0EE000
stack
page read and write
F70000
heap
page read and write
453E000
stack
page read and write
39FE000
stack
page read and write
4A20000
direct allocation
page read and write
4A20000
direct allocation
page read and write
4A31000
heap
page read and write
4A20000
direct allocation
page read and write
47BE000
stack
page read and write
48BF000
stack
page read and write
3DBE000
stack
page read and write
48FE000
stack
page read and write
4A31000
heap
page read and write
1CE4E000
stack
page read and write
F3D000
stack
page read and write
3D7F000
stack
page read and write
2C37000
heap
page read and write
4A31000
heap
page read and write
5070000
direct allocation
page execute and read and write
505E000
stack
page read and write
F35000
stack
page read and write
417E000
stack
page read and write
7E6000
unkown
page execute and read and write
4A31000
heap
page read and write
4A20000
direct allocation
page read and write
4A31000
heap
page read and write
38BE000
stack
page read and write
463F000
stack
page read and write
500F000
stack
page read and write
4A20000
direct allocation
page read and write
3FFF000
stack
page read and write
4A31000
heap
page read and write
992000
unkown
page execute and read and write
377E000
stack
page read and write
4A31000
heap
page read and write
134E000
stack
page read and write
5050000
direct allocation
page execute and read and write
6D6000
unkown
page execute and read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
1D4DD000
stack
page read and write
F75000
heap
page read and write
7F4000
unkown
page execute and write copy
5040000
direct allocation
page execute and read and write
1D37D000
stack
page read and write
3EFE000
stack
page read and write
1D33E000
stack
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
2C2E000
stack
page read and write
4A31000
heap
page read and write
373F000
stack
page read and write
4A31000
heap
page read and write
106F000
heap
page read and write
4A31000
heap
page read and write
3C7E000
stack
page read and write
4A31000
heap
page read and write
396000
unkown
page execute and read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
1CF4F000
stack
page read and write
4E70000
trusted library allocation
page read and write
2D3F000
stack
page read and write
337F000
stack
page read and write
1D5E0000
heap
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
4A31000
heap
page read and write
1D1EF000
stack
page read and write
4A31000
heap
page read and write
327E000
stack
page read and write
4A31000
heap
page read and write
2D7B000
stack
page read and write
4A31000
heap
page read and write
4A20000
direct allocation
page read and write
30FF000
stack
page read and write
There are 198 hidden memdumps, click here to show them.