IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/d9
unknown
http://185.215.113.206/c4becf79229cb002.phpft
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.206/H
unknown
http://185.215.113.206/c4becf79229cb002.phpR
unknown
http://185.215.113.206/c4becf79229cb002.php&
unknown
http://185.215.113.206/c4becf79229cb002.phpF
unknown
http://185.215.113.206/c4becf79229cb002.phpv9
unknown
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
E41000
unkown
page execute and read and write
malicious
5490000
direct allocation
page read and write
malicious
16AE000
heap
page read and write
malicious
1670000
direct allocation
page read and write
4C8E000
stack
page read and write
5030000
heap
page read and write
5011000
heap
page read and write
338B000
heap
page read and write
5011000
heap
page read and write
330F000
stack
page read and write
410F000
stack
page read and write
5011000
heap
page read and write
B54000
heap
page read and write
B54000
heap
page read and write
1670000
direct allocation
page read and write
5011000
heap
page read and write
1670000
direct allocation
page read and write
488F000
stack
page read and write
5110000
trusted library allocation
page read and write
1A6E000
stack
page read and write
3C4E000
stack
page read and write
4B4E000
stack
page read and write
5011000
heap
page read and write
B54000
heap
page read and write
132F000
unkown
page execute and read and write
5011000
heap
page read and write
5011000
heap
page read and write
3360000
direct allocation
page execute and read and write
E41000
unkown
page execute and write copy
108C000
unkown
page execute and read and write
108A000
unkown
page write copy
5011000
heap
page read and write
5011000
heap
page read and write
5011000
heap
page read and write
14E3000
unkown
page execute and write copy
5011000
heap
page read and write
3D8E000
stack
page read and write
5011000
heap
page read and write
E3E000
stack
page read and write
44CF000
stack
page read and write
ECE000
unkown
page execute and read and write
1670000
direct allocation
page read and write
1D8FE000
stack
page read and write
35CF000
stack
page read and write
5011000
heap
page read and write
450E000
stack
page read and write
48CE000
stack
page read and write
5011000
heap
page read and write
384F000
stack
page read and write
1DA3C000
stack
page read and write
4D8F000
stack
page read and write
5011000
heap
page read and write
5011000
heap
page read and write
43CE000
stack
page read and write
1222000
unkown
page execute and read and write
1DADE000
stack
page read and write
B54000
heap
page read and write
EEF000
unkown
page execute and read and write
5011000
heap
page read and write
3380000
heap
page read and write
B90000
heap
page read and write
1328000
unkown
page execute and read and write
B54000
heap
page read and write
49CF000
stack
page read and write
B54000
heap
page read and write
B54000
heap
page read and write
B54000
heap
page read and write
B54000
heap
page read and write
E40000
unkown
page read and write
5011000
heap
page read and write
B54000
heap
page read and write
108A000
unkown
page read and write
BF0000
heap
page read and write
BA0000
heap
page read and write
348F000
stack
page read and write
474F000
stack
page read and write
B54000
heap
page read and write
B54000
heap
page read and write
14E2000
unkown
page execute and read and write
B1C000
stack
page read and write
1D6BE000
stack
page read and write
4F0E000
stack
page read and write
5011000
heap
page read and write
500F000
stack
page read and write
1670000
direct allocation
page read and write
3C0F000
stack
page read and write
15E5000
stack
page read and write
B54000
heap
page read and write
1D56E000
stack
page read and write
B54000
heap
page read and write
5011000
heap
page read and write
B54000
heap
page read and write
B54000
heap
page read and write
5011000
heap
page read and write
16F3000
heap
page read and write
1D3EF000
stack
page read and write
B54000
heap
page read and write
4DCE000
stack
page read and write
16AA000
heap
page read and write
54CC000
stack
page read and write
3ECE000
stack
page read and write
55CF000
stack
page read and write
5011000
heap
page read and write
54C6000
direct allocation
page read and write
3370000
direct allocation
page execute and read and write
5470000
heap
page read and write
1670000
direct allocation
page read and write
B54000
heap
page read and write
5011000
heap
page read and write
1690000
direct allocation
page read and write
5600000
direct allocation
page execute and read and write
5011000
heap
page read and write
B54000
heap
page read and write
16F5000
heap
page read and write
5011000
heap
page read and write
5011000
heap
page read and write
5610000
direct allocation
page execute and read and write
5011000
heap
page read and write
5011000
heap
page read and write
424F000
stack
page read and write
34CE000
stack
page read and write
5010000
heap
page read and write
1670000
direct allocation
page read and write
133F000
unkown
page execute and write copy
5011000
heap
page read and write
398F000
stack
page read and write
1670000
direct allocation
page read and write
5011000
heap
page read and write
374E000
stack
page read and write
B54000
heap
page read and write
5011000
heap
page read and write
5011000
heap
page read and write
414E000
stack
page read and write
B54000
heap
page read and write
5011000
heap
page read and write
3E8F000
stack
page read and write
370F000
stack
page read and write
B54000
heap
page read and write
B54000
heap
page read and write
5026000
heap
page read and write
5011000
heap
page read and write
B54000
heap
page read and write
B54000
heap
page read and write
5011000
heap
page read and write
55F0000
direct allocation
page execute and read and write
3387000
heap
page read and write
5011000
heap
page read and write
55E0000
direct allocation
page execute and read and write
16A0000
heap
page read and write
1D52F000
stack
page read and write
3B0E000
stack
page read and write
1078000
unkown
page execute and read and write
1690000
direct allocation
page read and write
B54000
heap
page read and write
B54000
heap
page read and write
4B0F000
stack
page read and write
400E000
stack
page read and write
B54000
heap
page read and write
15EE000
stack
page read and write
5011000
heap
page read and write
4A0E000
stack
page read and write
5011000
heap
page read and write
428E000
stack
page read and write
B54000
heap
page read and write
5011000
heap
page read and write
1670000
direct allocation
page read and write
B54000
heap
page read and write
5011000
heap
page read and write
1670000
direct allocation
page read and write
1D2EE000
stack
page read and write
388E000
stack
page read and write
ED6000
unkown
page execute and read and write
5011000
heap
page read and write
B50000
heap
page read and write
1670000
direct allocation
page read and write
5011000
heap
page read and write
B54000
heap
page read and write
1670000
direct allocation
page read and write
4C4F000
stack
page read and write
5011000
heap
page read and write
133E000
unkown
page execute and read and write
5011000
heap
page read and write
E77000
unkown
page execute and read and write
B54000
heap
page read and write
5011000
heap
page read and write
5011000
heap
page read and write
5011000
heap
page read and write
1D66F000
stack
page read and write
334B000
stack
page read and write
5011000
heap
page read and write
B54000
heap
page read and write
B54000
heap
page read and write
3ACF000
stack
page read and write
B54000
heap
page read and write
12FF000
unkown
page execute and read and write
4ECF000
stack
page read and write
133E000
unkown
page execute and write copy
B54000
heap
page read and write
5011000
heap
page read and write
166E000
stack
page read and write
B54000
heap
page read and write
3FCF000
stack
page read and write
5011000
heap
page read and write
39CE000
stack
page read and write
5011000
heap
page read and write
B54000
heap
page read and write
1D93D000
stack
page read and write
B54000
heap
page read and write
196E000
stack
page read and write
1D7FE000
stack
page read and write
B54000
heap
page read and write
162E000
stack
page read and write
360E000
stack
page read and write
1726000
heap
page read and write
B54000
heap
page read and write
E40000
unkown
page readonly
1DBE0000
heap
page read and write
5011000
heap
page read and write
1DBDF000
stack
page read and write
5011000
heap
page read and write
B54000
heap
page read and write
B54000
heap
page read and write
1D7BF000
stack
page read and write
478E000
stack
page read and write
1D42E000
stack
page read and write
55E0000
direct allocation
page execute and read and write
1690000
direct allocation
page read and write
1670000
direct allocation
page read and write
1708000
heap
page read and write
1670000
direct allocation
page read and write
438F000
stack
page read and write
5011000
heap
page read and write
460F000
stack
page read and write
3D4F000
stack
page read and write
5011000
heap
page read and write
55D0000
direct allocation
page execute and read and write
464E000
stack
page read and write
5011000
heap
page read and write
There are 228 hidden memdumps, click here to show them.