IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php:
unknown
http://185.215.113.206/c4becf79229cb002.phpz
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206
unknown
http://185.215.113.206d
unknown
http://185.215.113.206/c4becf79229cb002.phpE
unknown
http://185.215.113.206/c4becf79229cb002.phpv
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4A10000
direct allocation
page read and write
malicious
6C1000
unkown
page execute and read and write
malicious
EFE000
heap
page read and write
malicious
6A0000
heap
page read and write
4571000
heap
page read and write
4B60000
direct allocation
page execute and read and write
4571000
heap
page read and write
4571000
heap
page read and write
37AF000
stack
page read and write
4571000
heap
page read and write
4590000
heap
page read and write
4B9E000
stack
page read and write
90A000
unkown
page write copy
2C6F000
stack
page read and write
BB7000
unkown
page execute and read and write
BB7000
unkown
page execute and write copy
4571000
heap
page read and write
4A4E000
stack
page read and write
4571000
heap
page read and write
2890000
direct allocation
page read and write
4571000
heap
page read and write
3DEF000
stack
page read and write
4571000
heap
page read and write
2890000
direct allocation
page read and write
3BAE000
stack
page read and write
4571000
heap
page read and write
316F000
stack
page read and write
4A00000
direct allocation
page read and write
446E000
stack
page read and write
4571000
heap
page read and write
1CC4C000
stack
page read and write
1CD8E000
stack
page read and write
4571000
heap
page read and write
1CEFE000
stack
page read and write
48D000
stack
page read and write
456F000
stack
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
68E000
stack
page read and write
F3A000
heap
page read and write
4571000
heap
page read and write
2890000
direct allocation
page read and write
406F000
stack
page read and write
342E000
stack
page read and write
366F000
stack
page read and write
4571000
heap
page read and write
2890000
direct allocation
page read and write
4571000
heap
page read and write
42EF000
stack
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
76F000
unkown
page execute and read and write
AC000
stack
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
306E000
stack
page read and write
2890000
direct allocation
page read and write
352F000
stack
page read and write
2890000
direct allocation
page read and write
31AE000
stack
page read and write
4B4F000
stack
page read and write
4571000
heap
page read and write
D5D000
unkown
page execute and read and write
3E2E000
stack
page read and write
690000
heap
page read and write
4B80000
direct allocation
page execute and read and write
1C95F000
stack
page read and write
4571000
heap
page read and write
2B6E000
stack
page read and write
1CA9F000
stack
page read and write
3B6F000
stack
page read and write
302F000
stack
page read and write
BA9000
unkown
page execute and read and write
F45000
heap
page read and write
37EE000
stack
page read and write
8F8000
unkown
page execute and read and write
3A6E000
stack
page read and write
4571000
heap
page read and write
F7E000
heap
page read and write
2890000
direct allocation
page read and write
BB8000
unkown
page execute and write copy
4571000
heap
page read and write
4571000
heap
page read and write
2890000
direct allocation
page read and write
32EE000
stack
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
6F7000
unkown
page execute and read and write
442F000
stack
page read and write
4A00000
direct allocation
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
41AF000
stack
page read and write
D5E000
unkown
page execute and write copy
4571000
heap
page read and write
33EF000
stack
page read and write
28AB000
heap
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
1D160000
heap
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
4B70000
direct allocation
page execute and read and write
4BA0000
direct allocation
page execute and read and write
392E000
stack
page read and write
1CFFF000
stack
page read and write
3CEE000
stack
page read and write
28EB000
stack
page read and write
4571000
heap
page read and write
2B2F000
stack
page read and write
4571000
heap
page read and write
6C0000
unkown
page read and write
2890000
direct allocation
page read and write
4571000
heap
page read and write
2DEE000
stack
page read and write
2DAF000
stack
page read and write
4B90000
direct allocation
page execute and read and write
4BC0000
direct allocation
page execute and read and write
4571000
heap
page read and write
41EE000
stack
page read and write
1A5000
stack
page read and write
EFA000
heap
page read and write
1C99E000
stack
page read and write
29EF000
stack
page read and write
1CE8E000
stack
page read and write
DAE000
stack
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
4A00000
direct allocation
page read and write
EF0000
heap
page read and write
F8C000
heap
page read and write
90C000
unkown
page execute and read and write
74E000
unkown
page execute and read and write
4571000
heap
page read and write
1CD4B000
stack
page read and write
4571000
heap
page read and write
36AE000
stack
page read and write
28A7000
heap
page read and write
4571000
heap
page read and write
38EF000
stack
page read and write
EEE000
stack
page read and write
4571000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
2CAE000
stack
page read and write
2EEF000
stack
page read and write
432E000
stack
page read and write
2890000
direct allocation
page read and write
3A2F000
stack
page read and write
2890000
direct allocation
page read and write
4B0000
heap
page read and write
2890000
direct allocation
page read and write
2A2E000
stack
page read and write
1AE000
stack
page read and write
4571000
heap
page read and write
288F000
stack
page read and write
410000
heap
page read and write
356E000
stack
page read and write
4571000
heap
page read and write
1D05E000
stack
page read and write
4571000
heap
page read and write
2F2E000
stack
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
3F2F000
stack
page read and write
4571000
heap
page read and write
6C0000
unkown
page readonly
4571000
heap
page read and write
756000
unkown
page execute and read and write
4571000
heap
page read and write
2890000
direct allocation
page read and write
32AF000
stack
page read and write
1D15F000
stack
page read and write
F79000
heap
page read and write
4571000
heap
page read and write
4570000
heap
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
6C1000
unkown
page execute and write copy
4571000
heap
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
F4E000
heap
page read and write
B71000
unkown
page execute and read and write
4571000
heap
page read and write
4A46000
direct allocation
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
4583000
heap
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
90A000
unkown
page read and write
4B5000
heap
page read and write
4571000
heap
page read and write
4B90000
direct allocation
page execute and read and write
28A0000
heap
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
3CAF000
stack
page read and write
4571000
heap
page read and write
1CBDE000
stack
page read and write
420000
heap
page read and write
B9F000
unkown
page execute and read and write
2890000
direct allocation
page read and write
4571000
heap
page read and write
49B0000
trusted library allocation
page read and write
4571000
heap
page read and write
EAE000
stack
page read and write
3F6E000
stack
page read and write
A90000
unkown
page execute and read and write
1CADE000
stack
page read and write
40AE000
stack
page read and write
4571000
heap
page read and write
There are 204 hidden memdumps, click here to show them.