IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phpK
unknown
http://185.215.113.206/c4becf79229cb002.php9
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206/&~
unknown
http://185.215.113.206
unknown
http://185.215.113.206/c4becf79229cb002.php#
unknown
http://185.215.113.206/c4becf79229cb002.php2
unknown
http://185.215.113.206/c4becf79229cb002.phpw
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
131E000
heap
page read and write
malicious
6A1000
unkown
page execute and read and write
malicious
5050000
direct allocation
page read and write
malicious
1D3BF000
stack
page read and write
4BC1000
heap
page read and write
51C0000
direct allocation
page execute and read and write
3F2F000
stack
page read and write
4BC1000
heap
page read and write
1307000
heap
page read and write
3B6F000
stack
page read and write
1254000
heap
page read and write
4BC8000
heap
page read and write
160F000
stack
page read and write
130B000
heap
page read and write
1254000
heap
page read and write
1254000
heap
page read and write
4BC1000
heap
page read and write
1254000
heap
page read and write
4BB0000
direct allocation
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
1D63E000
stack
page read and write
1250000
heap
page read and write
4BC1000
heap
page read and write
519F000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
40AE000
stack
page read and write
4BC1000
heap
page read and write
1310000
heap
page read and write
4BC1000
heap
page read and write
1254000
heap
page read and write
37AF000
stack
page read and write
4BE0000
heap
page read and write
342E000
stack
page read and write
4BC1000
heap
page read and write
1254000
heap
page read and write
B96000
unkown
page execute and read and write
1254000
heap
page read and write
4BC1000
heap
page read and write
3A6E000
stack
page read and write
4BC1000
heap
page read and write
4BB0000
direct allocation
page read and write
36AE000
stack
page read and write
1254000
heap
page read and write
432E000
stack
page read and write
4BC1000
heap
page read and write
1254000
heap
page read and write
4BC1000
heap
page read and write
4BB0000
direct allocation
page read and write
46AF000
stack
page read and write
D38000
unkown
page execute and write copy
1D16E000
stack
page read and write
72E000
unkown
page execute and read and write
31AE000
stack
page read and write
356E000
stack
page read and write
51B0000
direct allocation
page execute and read and write
4BC1000
heap
page read and write
4BB0000
direct allocation
page read and write
6A1000
unkown
page execute and write copy
4BC1000
heap
page read and write
1D7DF000
stack
page read and write
302F000
stack
page read and write
509C000
stack
page read and write
736000
unkown
page execute and read and write
4BC1000
heap
page read and write
4AAE000
stack
page read and write
4BC1000
heap
page read and write
4A6F000
stack
page read and write
1210000
heap
page read and write
1254000
heap
page read and write
1D02E000
stack
page read and write
4BB0000
direct allocation
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
3F6E000
stack
page read and write
8EC000
unkown
page execute and read and write
1254000
heap
page read and write
4BB0000
direct allocation
page read and write
1254000
heap
page read and write
1379000
heap
page read and write
4BC1000
heap
page read and write
B97000
unkown
page execute and write copy
1130000
heap
page read and write
482E000
stack
page read and write
1254000
heap
page read and write
446E000
stack
page read and write
3A2F000
stack
page read and write
5200000
direct allocation
page execute and read and write
1D3FD000
stack
page read and write
4BC1000
heap
page read and write
A72000
unkown
page execute and read and write
B96000
unkown
page execute and write copy
1254000
heap
page read and write
1300000
heap
page read and write
5050000
direct allocation
page read and write
3CAF000
stack
page read and write
51D0000
direct allocation
page execute and read and write
6A0000
unkown
page readonly
10F5000
stack
page read and write
3E2E000
stack
page read and write
1254000
heap
page read and write
131A000
heap
page read and write
4BC0000
heap
page read and write
46EE000
stack
page read and write
4BD0000
heap
page read and write
B53000
unkown
page execute and read and write
41AF000
stack
page read and write
4BC1000
heap
page read and write
4BB0000
direct allocation
page read and write
129E000
stack
page read and write
4BC1000
heap
page read and write
32AF000
stack
page read and write
4BC1000
heap
page read and write
442F000
stack
page read and write
1254000
heap
page read and write
4BC1000
heap
page read and write
4BB0000
direct allocation
page read and write
74F000
unkown
page execute and read and write
51E0000
direct allocation
page execute and read and write
1254000
heap
page read and write
6A0000
unkown
page read and write
4BB0000
direct allocation
page read and write
4BB0000
direct allocation
page read and write
1D53D000
stack
page read and write
1D26F000
stack
page read and write
4BB0000
direct allocation
page read and write
42EF000
stack
page read and write
1254000
heap
page read and write
4BC1000
heap
page read and write
1254000
heap
page read and write
1254000
heap
page read and write
456F000
stack
page read and write
4CC0000
trusted library allocation
page read and write
366F000
stack
page read and write
1254000
heap
page read and write
38EF000
stack
page read and write
B7E000
unkown
page execute and read and write
1254000
heap
page read and write
1254000
heap
page read and write
1254000
heap
page read and write
8D8000
unkown
page execute and read and write
1254000
heap
page read and write
1D6DE000
stack
page read and write
1254000
heap
page read and write
4BB0000
direct allocation
page read and write
1254000
heap
page read and write
B86000
unkown
page execute and read and write
6D7000
unkown
page execute and read and write
5050000
direct allocation
page read and write
4BAF000
stack
page read and write
1D12F000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
51F0000
direct allocation
page execute and read and write
1D4FC000
stack
page read and write
47EF000
stack
page read and write
4BC1000
heap
page read and write
1254000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
392E000
stack
page read and write
1D7E0000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
1254000
heap
page read and write
4BC1000
heap
page read and write
150F000
stack
page read and write
1394000
heap
page read and write
139B000
heap
page read and write
4BC1000
heap
page read and write
D37000
unkown
page execute and read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
1366000
heap
page read and write
1254000
heap
page read and write
37EE000
stack
page read and write
2F2B000
stack
page read and write
4BC1000
heap
page read and write
1254000
heap
page read and write
DCC000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
1254000
heap
page read and write
4BB0000
direct allocation
page read and write
4BC1000
heap
page read and write
51E0000
direct allocation
page execute and read and write
1254000
heap
page read and write
4BC1000
heap
page read and write
1254000
heap
page read and write
2DEE000
stack
page read and write
492F000
stack
page read and write
1254000
heap
page read and write
10FE000
stack
page read and write
1254000
heap
page read and write
1254000
heap
page read and write
352F000
stack
page read and write
45AE000
stack
page read and write
1D2BE000
stack
page read and write
5050000
direct allocation
page read and write
4BC1000
heap
page read and write
4BB0000
direct allocation
page read and write
2EEF000
stack
page read and write
1254000
heap
page read and write
1254000
heap
page read and write
306E000
stack
page read and write
3CEE000
stack
page read and write
316F000
stack
page read and write
51B0000
heap
page read and write
406F000
stack
page read and write
4BC1000
heap
page read and write
1CEEE000
stack
page read and write
4BC1000
heap
page read and write
8EA000
unkown
page write copy
1254000
heap
page read and write
32EE000
stack
page read and write
1254000
heap
page read and write
1254000
heap
page read and write
8EA000
unkown
page read and write
41ED000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
1254000
heap
page read and write
3DEF000
stack
page read and write
4BC1000
heap
page read and write
5086000
direct allocation
page read and write
496E000
stack
page read and write
4BC1000
heap
page read and write
1CFEF000
stack
page read and write
12F0000
heap
page read and write
5210000
direct allocation
page execute and read and write
12DE000
stack
page read and write
3BAE000
stack
page read and write
33EF000
stack
page read and write
There are 229 hidden memdumps, click here to show them.