IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/e2b1563c6670f193.phpN
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/#
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpc%
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpy
unknown
malicious
http://185.215.113.37/:
unknown
malicious
http://185.215.113.37S
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
931000
unkown
page execute and read and write
malicious
4F80000
direct allocation
page read and write
malicious
10DE000
heap
page read and write
malicious
35BF000
stack
page read and write
3ABF000
stack
page read and write
2E3F000
stack
page read and write
2D20000
direct allocation
page read and write
2D00000
direct allocation
page read and write
B7A000
unkown
page execute and read and write
50C0000
direct allocation
page execute and read and write
3AFE000
stack
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
3EBE000
stack
page read and write
4FBE000
stack
page read and write
1D3DE000
stack
page read and write
49BF000
stack
page read and write
30BF000
stack
page read and write
1D2DE000
stack
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
3E7F000
stack
page read and write
D12000
unkown
page execute and read and write
44BF000
stack
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
4AFF000
stack
page read and write
4B01000
heap
page read and write
3FFE000
stack
page read and write
2D00000
direct allocation
page read and write
4B01000
heap
page read and write
2D00000
direct allocation
page read and write
2F7F000
stack
page read and write
2CFE000
stack
page read and write
FC4000
unkown
page execute and read and write
A12000
unkown
page execute and read and write
3BFF000
stack
page read and write
4B01000
heap
page read and write
930000
unkown
page read and write
2D3B000
heap
page read and write
1CEEE000
stack
page read and write
4B01000
heap
page read and write
387E000
stack
page read and write
4B01000
heap
page read and write
2D00000
direct allocation
page read and write
4B01000
heap
page read and write
115B000
heap
page read and write
3D7E000
stack
page read and write
3FBF000
stack
page read and write
2D00000
direct allocation
page read and write
E29000
unkown
page execute and write copy
1D41D000
stack
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
4F40000
trusted library allocation
page read and write
40FF000
stack
page read and write
4B01000
heap
page read and write
12DE000
stack
page read and write
473F000
stack
page read and write
E1A000
unkown
page execute and read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
2D37000
heap
page read and write
1CFEF000
stack
page read and write
30FE000
stack
page read and write
337E000
stack
page read and write
910000
heap
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
10D0000
heap
page read and write
50FE000
stack
page read and write
1D28F000
stack
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
45FF000
stack
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
3D3F000
stack
page read and write
2FBE000
stack
page read and write
2D00000
direct allocation
page read and write
383F000
stack
page read and write
427E000
stack
page read and write
397F000
stack
page read and write
4B01000
heap
page read and write
2D00000
direct allocation
page read and write
50F0000
direct allocation
page execute and read and write
3C3E000
stack
page read and write
9ED000
unkown
page execute and read and write
4B10000
heap
page read and write
83C000
stack
page read and write
2D00000
direct allocation
page read and write
2D30000
heap
page read and write
34BE000
stack
page read and write
2D00000
direct allocation
page read and write
423F000
stack
page read and write
13DF000
stack
page read and write
4B01000
heap
page read and write
2D00000
direct allocation
page read and write
333F000
stack
page read and write
1D51C000
stack
page read and write
43BE000
stack
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
49FE000
stack
page read and write
1154000
heap
page read and write
10CE000
stack
page read and write
4B01000
heap
page read and write
4B00000
heap
page read and write
347F000
stack
page read and write
2D20000
direct allocation
page read and write
B8E000
unkown
page execute and read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
8A0000
heap
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
FC5000
unkown
page execute and write copy
E13000
unkown
page execute and read and write
10DA000
heap
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
2D00000
direct allocation
page read and write
463E000
stack
page read and write
905000
heap
page read and write
931000
unkown
page execute and write copy
4B01000
heap
page read and write
4B01000
heap
page read and write
930000
unkown
page readonly
4B01000
heap
page read and write
4B01000
heap
page read and write
4B20000
heap
page read and write
4B01000
heap
page read and write
50BF000
stack
page read and write
4B01000
heap
page read and write
477E000
stack
page read and write
5100000
direct allocation
page execute and read and write
4B01000
heap
page read and write
413D000
stack
page read and write
4B01000
heap
page read and write
1124000
heap
page read and write
2E7B000
stack
page read and write
44FE000
stack
page read and write
437F000
stack
page read and write
39BE000
stack
page read and write
323E000
stack
page read and write
48BE000
stack
page read and write
50F0000
direct allocation
page execute and read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
5110000
direct allocation
page execute and read and write
2D00000
direct allocation
page read and write
50E0000
direct allocation
page execute and read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
1D02E000
stack
page read and write
10C5000
stack
page read and write
4B01000
heap
page read and write
1CEAF000
stack
page read and write
1D12E000
stack
page read and write
4B01000
heap
page read and write
151F000
stack
page read and write
E2A000
unkown
page execute and write copy
4B01000
heap
page read and write
890000
heap
page read and write
4B01000
heap
page read and write
1122000
heap
page read and write
2D00000
direct allocation
page read and write
1138000
heap
page read and write
4B01000
heap
page read and write
2D00000
direct allocation
page read and write
1D18E000
stack
page read and write
DF1000
unkown
page execute and read and write
4B01000
heap
page read and write
36FF000
stack
page read and write
50D0000
direct allocation
page execute and read and write
4B01000
heap
page read and write
4B15000
heap
page read and write
E29000
unkown
page execute and read and write
900000
heap
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
31FF000
stack
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
487F000
stack
page read and write
9E1000
unkown
page execute and read and write
35FE000
stack
page read and write
4B01000
heap
page read and write
4B01000
heap
page read and write
8F0000
heap
page read and write
4B01000
heap
page read and write
373E000
stack
page read and write
4B01000
heap
page read and write
141D000
stack
page read and write
There are 193 hidden memdumps, click here to show them.