IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phpi
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206
unknown
http://185.215.113.206/L
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.206/c4becf79229cb002.php$XV
unknown
http://185.215.113.206/u
unknown
185.215.113.206/c4becf79229cb002.php

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1B7E000
heap
page read and write
malicious
FB1000
unkown
page execute and read and write
malicious
5750000
direct allocation
page read and write
malicious
588F000
stack
page read and write
51CE000
stack
page read and write
1714000
heap
page read and write
FE7000
unkown
page execute and read and write
4A0F000
stack
page read and write
578E000
stack
page read and write
1B40000
direct allocation
page read and write
1714000
heap
page read and write
52F0000
heap
page read and write
52D1000
heap
page read and write
103E000
unkown
page execute and read and write
1D82E000
stack
page read and write
1714000
heap
page read and write
1BF6000
heap
page read and write
11FA000
unkown
page read and write
1714000
heap
page read and write
52D1000
heap
page read and write
1714000
heap
page read and write
5786000
direct allocation
page read and write
1D7EF000
stack
page read and write
428F000
stack
page read and write
52D1000
heap
page read and write
1714000
heap
page read and write
52D1000
heap
page read and write
4B8E000
stack
page read and write
52D1000
heap
page read and write
52D1000
heap
page read and write
1AFE000
stack
page read and write
52D1000
heap
page read and write
52D1000
heap
page read and write
4E0E000
stack
page read and write
1714000
heap
page read and write
1B70000
heap
page read and write
F70000
heap
page read and write
175E000
stack
page read and write
518F000
stack
page read and write
1714000
heap
page read and write
1D6EE000
stack
page read and write
1714000
heap
page read and write
52D1000
heap
page read and write
52D1000
heap
page read and write
FB0000
unkown
page readonly
1B40000
direct allocation
page read and write
52D1000
heap
page read and write
52D0000
heap
page read and write
53D0000
trusted library allocation
page read and write
17EE000
stack
page read and write
4F0F000
stack
page read and write
58D0000
direct allocation
page execute and read and write
52D1000
heap
page read and write
52D1000
heap
page read and write
1D6AF000
stack
page read and write
52D1000
heap
page read and write
E0C000
stack
page read and write
105F000
unkown
page execute and read and write
52CF000
stack
page read and write
52D1000
heap
page read and write
52D1000
heap
page read and write
1710000
heap
page read and write
4F4E000
stack
page read and write
3570000
direct allocation
page execute and read and write
1495000
unkown
page execute and read and write
43CF000
stack
page read and write
1B60000
direct allocation
page read and write
1714000
heap
page read and write
1714000
heap
page read and write
52D1000
heap
page read and write
1B60000
direct allocation
page read and write
11FA000
unkown
page write copy
1495000
unkown
page execute and write copy
1BD7000
heap
page read and write
1B40000
direct allocation
page read and write
1B40000
direct allocation
page read and write
1488000
unkown
page execute and read and write
1B40000
direct allocation
page read and write
404E000
stack
page read and write
58A0000
direct allocation
page execute and read and write
1714000
heap
page read and write
1714000
heap
page read and write
3C8E000
stack
page read and write
47CE000
stack
page read and write
1714000
heap
page read and write
1714000
heap
page read and write
400F000
stack
page read and write
1D5AE000
stack
page read and write
440E000
stack
page read and write
414F000
stack
page read and write
52D1000
heap
page read and write
1D92F000
stack
page read and write
52D1000
heap
page read and write
FB1000
unkown
page execute and write copy
1714000
heap
page read and write
4B4F000
stack
page read and write
3587000
heap
page read and write
52D1000
heap
page read and write
F05000
stack
page read and write
52D1000
heap
page read and write
11FC000
unkown
page execute and read and write
1714000
heap
page read and write
11E8000
unkown
page execute and read and write
490E000
stack
page read and write
1B40000
direct allocation
page read and write
3ECF000
stack
page read and write
1B40000
direct allocation
page read and write
52D1000
heap
page read and write
52D1000
heap
page read and write
58A0000
direct allocation
page execute and read and write
58C0000
direct allocation
page execute and read and write
1B40000
direct allocation
page read and write
162C000
unkown
page execute and read and write
52D1000
heap
page read and write
1714000
heap
page read and write
4DCF000
stack
page read and write
52D1000
heap
page read and write
1DCFE000
stack
page read and write
1D6E000
stack
page read and write
162D000
unkown
page execute and write copy
388F000
stack
page read and write
5890000
direct allocation
page execute and read and write
1714000
heap
page read and write
1BF3000
heap
page read and write
52D1000
heap
page read and write
3560000
direct allocation
page execute and read and write
450F000
stack
page read and write
1714000
heap
page read and write
504F000
stack
page read and write
3DCE000
stack
page read and write
52D1000
heap
page read and write
52D1000
heap
page read and write
478F000
stack
page read and write
1B40000
direct allocation
page read and write
179E000
stack
page read and write
1714000
heap
page read and write
1B40000
direct allocation
page read and write
52D1000
heap
page read and write
1714000
heap
page read and write
1DBFD000
stack
page read and write
52D1000
heap
page read and write
3B0F000
stack
page read and write
17F0000
heap
page read and write
F0E000
stack
page read and write
52D1000
heap
page read and write
3A0E000
stack
page read and write
52D5000
heap
page read and write
1714000
heap
page read and write
52D1000
heap
page read and write
1714000
heap
page read and write
1BC0000
heap
page read and write
4C8F000
stack
page read and write
52D1000
heap
page read and write
454E000
stack
page read and write
468E000
stack
page read and write
52D1000
heap
page read and write
52D1000
heap
page read and write
1380000
unkown
page execute and read and write
1456000
unkown
page execute and read and write
52D1000
heap
page read and write
52D1000
heap
page read and write
52D1000
heap
page read and write
52D1000
heap
page read and write
354E000
stack
page read and write
1046000
unkown
page execute and read and write
464F000
stack
page read and write
368F000
stack
page read and write
1714000
heap
page read and write
1714000
heap
page read and write
39CF000
stack
page read and write
1B40000
direct allocation
page read and write
3580000
heap
page read and write
1714000
heap
page read and write
F80000
heap
page read and write
58B0000
direct allocation
page execute and read and write
1DABD000
stack
page read and write
52D1000
heap
page read and write
52D1000
heap
page read and write
1714000
heap
page read and write
3B4E000
stack
page read and write
52E0000
heap
page read and write
52D1000
heap
page read and write
4A4E000
stack
page read and write
42CE000
stack
page read and write
52D1000
heap
page read and write
1B40000
direct allocation
page read and write
147E000
unkown
page execute and read and write
52D1000
heap
page read and write
1714000
heap
page read and write
FB0000
unkown
page read and write
1B40000
direct allocation
page read and write
38CE000
stack
page read and write
1DA6F000
stack
page read and write
1714000
heap
page read and write
52D1000
heap
page read and write
1496000
unkown
page execute and write copy
52D1000
heap
page read and write
508E000
stack
page read and write
48CF000
stack
page read and write
52D1000
heap
page read and write
3C4F000
stack
page read and write
52D1000
heap
page read and write
5730000
heap
page read and write
1714000
heap
page read and write
1714000
heap
page read and write
1714000
heap
page read and write
418E000
stack
page read and write
52D1000
heap
page read and write
52D1000
heap
page read and write
378F000
stack
page read and write
1DBBC000
stack
page read and write
52D1000
heap
page read and write
52D1000
heap
page read and write
1714000
heap
page read and write
3F0E000
stack
page read and write
1714000
heap
page read and write
1D96E000
stack
page read and write
4CCE000
stack
page read and write
1714000
heap
page read and write
52D1000
heap
page read and write
1B40000
direct allocation
page read and write
1714000
heap
page read and write
3D8F000
stack
page read and write
52D1000
heap
page read and write
1B78000
heap
page read and write
1714000
heap
page read and write
1714000
heap
page read and write
1B3C000
stack
page read and write
1714000
heap
page read and write
358B000
heap
page read and write
1B60000
direct allocation
page read and write
52D1000
heap
page read and write
1714000
heap
page read and write
There are 223 hidden memdumps, click here to show them.