IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.206/c4becf79229cb002.phpw
unknown
http://185.215.113.206/c4becf79229cb002.phpH
unknown
http://185.215.113.206/c4becf79229cb002.phptop
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
E31000
unkown
page execute and read and write
malicious
5080000
direct allocation
page read and write
malicious
D0E000
heap
page read and write
malicious
4C01000
heap
page read and write
D0A000
heap
page read and write
4C01000
heap
page read and write
51BF000
stack
page read and write
4C01000
heap
page read and write
3A7F000
stack
page read and write
3020000
direct allocation
page execute and read and write
4C01000
heap
page read and write
3ABE000
stack
page read and write
4C01000
heap
page read and write
51F0000
direct allocation
page execute and read and write
BA0000
heap
page read and write
4C01000
heap
page read and write
2F5F000
stack
page read and write
4C01000
heap
page read and write
1068000
unkown
page execute and read and write
3030000
heap
page read and write
D67000
heap
page read and write
343F000
stack
page read and write
107A000
unkown
page write copy
B3E000
stack
page read and write
4BFF000
stack
page read and write
B9E000
stack
page read and write
107C000
unkown
page execute and read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
E10000
direct allocation
page read and write
303B000
heap
page read and write
51E0000
direct allocation
page execute and read and write
1D4EC000
stack
page read and write
4C01000
heap
page read and write
CF0000
direct allocation
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
333F000
stack
page read and write
4C01000
heap
page read and write
1D7C0000
heap
page read and write
40FE000
stack
page read and write
4C01000
heap
page read and write
50B6000
direct allocation
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
E67000
unkown
page execute and read and write
5040000
trusted library allocation
page read and write
130C000
unkown
page execute and read and write
CF0000
direct allocation
page read and write
46FF000
stack
page read and write
CF0000
direct allocation
page read and write
51E0000
direct allocation
page execute and read and write
D55000
heap
page read and write
433E000
stack
page read and write
45BF000
stack
page read and write
4C00000
heap
page read and write
107A000
unkown
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
E30000
unkown
page readonly
71C000
stack
page read and write
790000
heap
page read and write
3BBF000
stack
page read and write
CF0000
direct allocation
page read and write
15BF000
stack
page read and write
EBE000
unkown
page execute and read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
CD0000
heap
page read and write
3CFF000
stack
page read and write
40BF000
stack
page read and write
131B000
unkown
page execute and read and write
2FDE000
stack
page read and write
4C01000
heap
page read and write
CF0000
direct allocation
page read and write
780000
heap
page read and write
3E3F000
stack
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
5210000
direct allocation
page execute and read and write
423D000
stack
page read and write
1D3AF000
stack
page read and write
51D0000
direct allocation
page execute and read and write
4C20000
heap
page read and write
36BF000
stack
page read and write
4C01000
heap
page read and write
41FF000
stack
page read and write
1D6BE000
stack
page read and write
4C01000
heap
page read and write
16BE000
stack
page read and write
CF0000
direct allocation
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
CF0000
direct allocation
page read and write
1D52E000
stack
page read and write
4C01000
heap
page read and write
497F000
stack
page read and write
36FE000
stack
page read and write
397E000
stack
page read and write
4C01000
heap
page read and write
EDF000
unkown
page execute and read and write
4C01000
heap
page read and write
357F000
stack
page read and write
1D16E000
stack
page read and write
AF5000
stack
page read and write
4C01000
heap
page read and write
CF0000
direct allocation
page read and write
CF0000
direct allocation
page read and write
1D2AE000
stack
page read and write
50BB000
stack
page read and write
7FE000
stack
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
CF0000
direct allocation
page read and write
1D02E000
stack
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
473E000
stack
page read and write
4C01000
heap
page read and write
45FE000
stack
page read and write
E30000
unkown
page read and write
CF0000
direct allocation
page read and write
4C01000
heap
page read and write
1303000
unkown
page execute and read and write
CF0000
direct allocation
page read and write
323F000
stack
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
CF0000
direct allocation
page read and write
437E000
stack
page read and write
3E7E000
stack
page read and write
393F000
stack
page read and write
3F7F000
stack
page read and write
1D62E000
stack
page read and write
483F000
stack
page read and write
4C01000
heap
page read and write
44BE000
stack
page read and write
4C01000
heap
page read and write
E31000
unkown
page execute and write copy
1D3EE000
stack
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
383E000
stack
page read and write
1CEEE000
stack
page read and write
35BE000
stack
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
14B3000
unkown
page execute and read and write
51C0000
direct allocation
page execute and read and write
4C01000
heap
page read and write
313F000
stack
page read and write
37FF000
stack
page read and write
4AFE000
stack
page read and write
CCC000
stack
page read and write
347E000
stack
page read and write
1D12F000
stack
page read and write
D83000
heap
page read and write
1D26F000
stack
page read and write
BB5000
heap
page read and write
4C01000
heap
page read and write
D00000
heap
page read and write
5200000
direct allocation
page execute and read and write
AFE000
stack
page read and write
1D7BE000
stack
page read and write
4C01000
heap
page read and write
487E000
stack
page read and write
3BFE000
stack
page read and write
1204000
unkown
page execute and read and write
131C000
unkown
page execute and write copy
EC6000
unkown
page execute and read and write
4C01000
heap
page read and write
49BE000
stack
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
E10000
direct allocation
page read and write
CF0000
direct allocation
page read and write
4C01000
heap
page read and write
447F000
stack
page read and write
12DA000
unkown
page execute and read and write
4ABF000
stack
page read and write
14B4000
unkown
page execute and write copy
301E000
stack
page read and write
BB0000
heap
page read and write
E10000
direct allocation
page read and write
4C01000
heap
page read and write
131B000
unkown
page execute and write copy
3037000
heap
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
3FBE000
stack
page read and write
1CFEE000
stack
page read and write
2F9E000
stack
page read and write
3D3E000
stack
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
4C16000
heap
page read and write
4C01000
heap
page read and write
There are 199 hidden memdumps, click here to show them.