IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php9
unknown
http://185.215.113.206/p
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206tD
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206
unknown
http://185.215.113.206/c4becf79229cb002.phpI9
unknown
http://185.215.113.206/c4becf79229cb002.phpy9
unknown
http://185.215.113.206/c4becf79229cb002.phpu9
unknown

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
ax-0001.ax-msedge.net
150.171.28.10

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4D1000
unkown
page execute and read and write
malicious
CDE000
heap
page read and write
malicious
4B00000
direct allocation
page read and write
malicious
D52000
heap
page read and write
CAE000
stack
page read and write
708000
unkown
page execute and read and write
440000
heap
page read and write
1D17E000
stack
page read and write
3F3E000
stack
page read and write
4681000
heap
page read and write
29C0000
direct allocation
page read and write
464000
heap
page read and write
313F000
stack
page read and write
464000
heap
page read and write
38BF000
stack
page read and write
1CFDD000
stack
page read and write
1CE4F000
stack
page read and write
1D0DE000
stack
page read and write
464000
heap
page read and write
29F0000
heap
page read and write
D25000
heap
page read and write
377F000
stack
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
1CF9D000
stack
page read and write
4681000
heap
page read and write
29C0000
direct allocation
page read and write
29C0000
direct allocation
page read and write
29E0000
direct allocation
page read and write
1CD0F000
stack
page read and write
3B7E000
stack
page read and write
4C90000
direct allocation
page execute and read and write
3DFE000
stack
page read and write
1D280000
heap
page read and write
2DBE000
stack
page read and write
B6B000
unkown
page execute and read and write
363F000
stack
page read and write
29C0000
direct allocation
page read and write
2C7E000
stack
page read and write
4681000
heap
page read and write
464000
heap
page read and write
4BE000
stack
page read and write
4681000
heap
page read and write
46A0000
heap
page read and write
4681000
heap
page read and write
9BA000
unkown
page execute and read and write
464000
heap
page read and write
464000
heap
page read and write
2D7F000
stack
page read and write
9C8000
unkown
page execute and write copy
464000
heap
page read and write
4681000
heap
page read and write
464000
heap
page read and write
1CBCE000
stack
page read and write
4681000
heap
page read and write
4C70000
direct allocation
page execute and read and write
29E0000
direct allocation
page read and write
3B3F000
stack
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
464000
heap
page read and write
4681000
heap
page read and write
29C0000
direct allocation
page read and write
464000
heap
page read and write
4C80000
direct allocation
page execute and read and write
464000
heap
page read and write
407E000
stack
page read and write
4B36000
direct allocation
page read and write
4681000
heap
page read and write
B6C000
unkown
page execute and write copy
464000
heap
page read and write
3CBE000
stack
page read and write
29F7000
heap
page read and write
4681000
heap
page read and write
29C0000
direct allocation
page read and write
453F000
stack
page read and write
29BB000
stack
page read and write
29C0000
direct allocation
page read and write
464000
heap
page read and write
C6E000
stack
page read and write
D23000
heap
page read and write
507000
unkown
page execute and read and write
9C8000
unkown
page execute and read and write
29C0000
direct allocation
page read and write
4B3B000
stack
page read and write
464000
heap
page read and write
F9F000
stack
page read and write
1CC0E000
stack
page read and write
4690000
heap
page read and write
29C0000
direct allocation
page read and write
464000
heap
page read and write
4C50000
heap
page read and write
4681000
heap
page read and write
57F000
unkown
page execute and read and write
303E000
stack
page read and write
4681000
heap
page read and write
2EBF000
stack
page read and write
4681000
heap
page read and write
464000
heap
page read and write
29E0000
direct allocation
page read and write
4CB0000
direct allocation
page execute and read and write
4681000
heap
page read and write
2C3F000
stack
page read and write
464000
heap
page read and write
4C3F000
stack
page read and write
29C0000
direct allocation
page read and write
32BE000
stack
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
1CC000
stack
page read and write
4681000
heap
page read and write
43FF000
stack
page read and write
71C000
unkown
page execute and read and write
4681000
heap
page read and write
4681000
heap
page read and write
1CE9D000
stack
page read and write
37BE000
stack
page read and write
464000
heap
page read and write
4681000
heap
page read and write
297F000
stack
page read and write
464000
heap
page read and write
38FE000
stack
page read and write
4D0000
unkown
page read and write
4681000
heap
page read and write
464000
heap
page read and write
4681000
heap
page read and write
3A3E000
stack
page read and write
34FF000
stack
page read and write
2AFF000
stack
page read and write
4780000
trusted library allocation
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
4D1000
unkown
page execute and write copy
317E000
stack
page read and write
1CD4E000
stack
page read and write
430000
heap
page read and write
55E000
unkown
page execute and read and write
4681000
heap
page read and write
2B3E000
stack
page read and write
4681000
heap
page read and write
566000
unkown
page execute and read and write
D36000
heap
page read and write
4681000
heap
page read and write
42FE000
stack
page read and write
457E000
stack
page read and write
464000
heap
page read and write
464000
heap
page read and write
4681000
heap
page read and write
464000
heap
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
1CA8F000
stack
page read and write
3C7F000
stack
page read and write
71A000
unkown
page read and write
29C0000
direct allocation
page read and write
464000
heap
page read and write
4681000
heap
page read and write
464000
heap
page read and write
467F000
stack
page read and write
464000
heap
page read and write
4D0000
unkown
page readonly
1C98E000
stack
page read and write
4681000
heap
page read and write
29C0000
direct allocation
page read and write
464000
heap
page read and write
4C80000
direct allocation
page execute and read and write
403F000
stack
page read and write
CDA000
heap
page read and write
367E000
stack
page read and write
3EFF000
stack
page read and write
1CACE000
stack
page read and write
464000
heap
page read and write
9C9000
unkown
page execute and write copy
464000
heap
page read and write
29FB000
heap
page read and write
8B1000
unkown
page execute and read and write
29C0000
direct allocation
page read and write
4681000
heap
page read and write
71A000
unkown
page write copy
417F000
stack
page read and write
464000
heap
page read and write
4680000
heap
page read and write
460000
heap
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
464000
heap
page read and write
464000
heap
page read and write
464000
heap
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
464000
heap
page read and write
3DBE000
stack
page read and write
42BF000
stack
page read and write
109F000
stack
page read and write
9B2000
unkown
page execute and read and write
4681000
heap
page read and write
4C50000
direct allocation
page execute and read and write
CD0000
heap
page read and write
C65000
stack
page read and write
1D27E000
stack
page read and write
4681000
heap
page read and write
287E000
stack
page read and write
464000
heap
page read and write
2EFE000
stack
page read and write
464000
heap
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
464000
heap
page read and write
4681000
heap
page read and write
41BE000
stack
page read and write
4681000
heap
page read and write
464000
heap
page read and write
2FFF000
stack
page read and write
464000
heap
page read and write
4681000
heap
page read and write
CC0000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
464000
heap
page read and write
4681000
heap
page read and write
989000
unkown
page execute and read and write
353E000
stack
page read and write
327F000
stack
page read and write
29C0000
direct allocation
page read and write
4681000
heap
page read and write
4681000
heap
page read and write
464000
heap
page read and write
4C60000
direct allocation
page execute and read and write
4685000
heap
page read and write
39FF000
stack
page read and write
4681000
heap
page read and write
33FE000
stack
page read and write
33BF000
stack
page read and write
443E000
stack
page read and write
There are 226 hidden memdumps, click here to show them.