IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37Wi
unknown
http://185.215.113.37//%
unknown
http://185.215.113.37/e2b1563c6670f193.phpktop
unknown
http://185.215.113.37/e2b1563c6670f193.php0
unknown
http://185.215.113.37/e2b1563c6670f193.php?
unknown
http://185.215.113.37/:%
unknown
http://185.215.113.37/ws
unknown
http://185.215.113.37/e2b1563c6670f193.phpg
unknown
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
CA1000
unkown
page execute and read and write
malicious
4DF0000
direct allocation
page read and write
malicious
9BE000
heap
page read and write
malicious
486E000
stack
page read and write
1D54F000
stack
page read and write
4F30000
direct allocation
page execute and read and write
4971000
heap
page read and write
1D16D000
stack
page read and write
8F4000
heap
page read and write
1D2AD000
stack
page read and write
46EF000
stack
page read and write
3BAF000
stack
page read and write
4DD0000
heap
page read and write
8F4000
heap
page read and write
1D3AE000
stack
page read and write
1CE9F000
stack
page read and write
8F4000
heap
page read and write
4971000
heap
page read and write
1086000
unkown
page execute and read and write
4F2F000
stack
page read and write
2CF0000
direct allocation
page read and write
4971000
heap
page read and write
1D26D000
stack
page read and write
8F4000
heap
page read and write
4971000
heap
page read and write
D82000
unkown
page execute and read and write
4971000
heap
page read and write
8F4000
heap
page read and write
1CD9E000
stack
page read and write
C8E000
stack
page read and write
4971000
heap
page read and write
2CF0000
direct allocation
page read and write
A32000
heap
page read and write
4971000
heap
page read and write
1D12F000
stack
page read and write
2D10000
direct allocation
page read and write
144E000
stack
page read and write
2CF0000
direct allocation
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
4E2E000
stack
page read and write
4971000
heap
page read and write
8F4000
heap
page read and write
4F40000
direct allocation
page execute and read and write
8F4000
heap
page read and write
4971000
heap
page read and write
C4C000
stack
page read and write
4F80000
direct allocation
page execute and read and write
4971000
heap
page read and write
C0E000
stack
page read and write
1166000
unkown
page execute and read and write
4971000
heap
page read and write
8F4000
heap
page read and write
40EE000
stack
page read and write
1D02E000
stack
page read and write
8F4000
heap
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
3BEE000
stack
page read and write
8F4000
heap
page read and write
2CF0000
direct allocation
page read and write
4971000
heap
page read and write
2F2F000
stack
page read and write
8F4000
heap
page read and write
30AE000
stack
page read and write
1D550000
heap
page read and write
45AF000
stack
page read and write
8F4000
heap
page read and write
2CEF000
stack
page read and write
1CEDE000
stack
page read and write
4971000
heap
page read and write
2CF0000
direct allocation
page read and write
5BE000
stack
page read and write
432F000
stack
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
3E2F000
stack
page read and write
4F60000
direct allocation
page execute and read and write
2E2F000
stack
page read and write
900000
heap
page read and write
436E000
stack
page read and write
133E000
unkown
page execute and write copy
4971000
heap
page read and write
4A70000
trusted library allocation
page read and write
482F000
stack
page read and write
2CF0000
direct allocation
page read and write
332E000
stack
page read and write
306F000
stack
page read and write
2D2B000
heap
page read and write
11A0000
unkown
page execute and write copy
4971000
heap
page read and write
4971000
heap
page read and write
BAF000
stack
page read and write
2CF0000
direct allocation
page read and write
1D44E000
stack
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
A1A000
heap
page read and write
9BA000
heap
page read and write
133D000
unkown
page execute and read and write
8F4000
heap
page read and write
4980000
heap
page read and write
4971000
heap
page read and write
3F6F000
stack
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
4F60000
direct allocation
page execute and read and write
4F70000
direct allocation
page execute and read and write
40AF000
stack
page read and write
4971000
heap
page read and write
8F4000
heap
page read and write
4971000
heap
page read and write
8F4000
heap
page read and write
1CFDF000
stack
page read and write
41EF000
stack
page read and write
4971000
heap
page read and write
3AAE000
stack
page read and write
8F4000
heap
page read and write
5B5000
stack
page read and write
422E000
stack
page read and write
4F50000
direct allocation
page execute and read and write
346E000
stack
page read and write
392F000
stack
page read and write
2CF0000
direct allocation
page read and write
4971000
heap
page read and write
36AF000
stack
page read and write
342F000
stack
page read and write
A03000
heap
page read and write
8F4000
heap
page read and write
4971000
heap
page read and write
4975000
heap
page read and write
8F4000
heap
page read and write
810000
heap
page read and write
2D27000
heap
page read and write
9B0000
heap
page read and write
2CF0000
direct allocation
page read and write
4971000
heap
page read and write
31AF000
stack
page read and write
4971000
heap
page read and write
3A6F000
stack
page read and write
EFE000
unkown
page execute and read and write
4971000
heap
page read and write
CA0000
unkown
page readonly
32EF000
stack
page read and write
1188000
unkown
page execute and read and write
8F4000
heap
page read and write
36EE000
stack
page read and write
446F000
stack
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
8F4000
heap
page read and write
4971000
heap
page read and write
2CF0000
direct allocation
page read and write
8F4000
heap
page read and write
4971000
heap
page read and write
8F0000
heap
page read and write
4990000
heap
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
4970000
heap
page read and write
C90000
heap
page read and write
4BC000
stack
page read and write
4971000
heap
page read and write
CA1000
unkown
page execute and write copy
8F4000
heap
page read and write
8F4000
heap
page read and write
4971000
heap
page read and write
EEA000
unkown
page execute and read and write
1CC5E000
stack
page read and write
396E000
stack
page read and write
11A1000
unkown
page execute and write copy
D51000
unkown
page execute and read and write
31EE000
stack
page read and write
37EF000
stack
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
1191000
unkown
page execute and read and write
35AE000
stack
page read and write
8F4000
heap
page read and write
96E000
stack
page read and write
44AE000
stack
page read and write
4971000
heap
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
4971000
heap
page read and write
9AE000
stack
page read and write
8F4000
heap
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
8F4000
heap
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
4971000
heap
page read and write
2CF0000
direct allocation
page read and write
3D2E000
stack
page read and write
4971000
heap
page read and write
496F000
stack
page read and write
356F000
stack
page read and write
8F4000
heap
page read and write
2CF0000
direct allocation
page read and write
8F4000
heap
page read and write
D5D000
unkown
page execute and read and write
45EE000
stack
page read and write
4971000
heap
page read and write
1CD5F000
stack
page read and write
4971000
heap
page read and write
2CF0000
direct allocation
page read and write
11A0000
unkown
page execute and read and write
8F4000
heap
page read and write
3FAE000
stack
page read and write
3CEF000
stack
page read and write
CA0000
unkown
page read and write
2D20000
heap
page read and write
4971000
heap
page read and write
472E000
stack
page read and write
3E6E000
stack
page read and write
382E000
stack
page read and write
2CF0000
direct allocation
page read and write
4971000
heap
page read and write
2F6E000
stack
page read and write
8F4000
heap
page read and write
8F4000
heap
page read and write
2D10000
direct allocation
page read and write
4971000
heap
page read and write
There are 223 hidden memdumps, click here to show them.