IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/u8
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpE
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpU
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php3
unknown
malicious
http://185.215.113.37s
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpG
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
A51000
unkown
page execute and read and write
malicious
5350000
direct allocation
page read and write
malicious
142E000
heap
page read and write
malicious
424F000
stack
page read and write
4ED1000
heap
page read and write
10F0000
unkown
page execute and read and write
3250000
direct allocation
page read and write
4ED1000
heap
page read and write
1530000
heap
page read and write
4ED1000
heap
page read and write
328B000
heap
page read and write
3250000
direct allocation
page read and write
360E000
stack
page read and write
4ED1000
heap
page read and write
A50000
unkown
page read and write
4ED1000
heap
page read and write
1471000
heap
page read and write
4ED1000
heap
page read and write
3250000
direct allocation
page read and write
15D4000
heap
page read and write
4ED1000
heap
page read and write
478E000
stack
page read and write
4ED1000
heap
page read and write
538E000
stack
page read and write
15D4000
heap
page read and write
14B9000
heap
page read and write
B01000
unkown
page execute and read and write
4ECF000
stack
page read and write
159E000
stack
page read and write
15D4000
heap
page read and write
54E0000
direct allocation
page execute and read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
11F5000
stack
page read and write
15D4000
heap
page read and write
4EE0000
heap
page read and write
15D4000
heap
page read and write
4ED1000
heap
page read and write
A50000
unkown
page readonly
4ED1000
heap
page read and write
4ED1000
heap
page read and write
54A0000
direct allocation
page execute and read and write
15D4000
heap
page read and write
4ED1000
heap
page read and write
4DCE000
stack
page read and write
1D54E000
stack
page read and write
3287000
heap
page read and write
15D4000
heap
page read and write
54D0000
direct allocation
page execute and read and write
3E8F000
stack
page read and write
35CF000
stack
page read and write
4ED1000
heap
page read and write
15D4000
heap
page read and write
30CE000
stack
page read and write
142A000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
15D4000
heap
page read and write
320C000
stack
page read and write
4ED1000
heap
page read and write
3280000
heap
page read and write
15D4000
heap
page read and write
3D4F000
stack
page read and write
3ACF000
stack
page read and write
17AF000
stack
page read and write
3250000
direct allocation
page read and write
15D4000
heap
page read and write
4ED1000
heap
page read and write
1480000
heap
page read and write
4ED1000
heap
page read and write
F4E000
unkown
page execute and read and write
4ED1000
heap
page read and write
C9A000
unkown
page execute and read and write
410F000
stack
page read and write
B32000
unkown
page execute and read and write
15D4000
heap
page read and write
F4E000
unkown
page execute and write copy
4EF0000
heap
page read and write
4ED1000
heap
page read and write
3250000
direct allocation
page read and write
15D4000
heap
page read and write
3250000
direct allocation
page read and write
1D6DC000
stack
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
15D4000
heap
page read and write
F10000
unkown
page execute and read and write
1D94F000
stack
page read and write
1520000
heap
page read and write
4ED1000
heap
page read and write
398F000
stack
page read and write
4ED1000
heap
page read and write
3250000
direct allocation
page read and write
464E000
stack
page read and write
4ED1000
heap
page read and write
15D0000
heap
page read and write
3250000
direct allocation
page read and write
4C4F000
stack
page read and write
4A0E000
stack
page read and write
4ED1000
heap
page read and write
15D4000
heap
page read and write
15D4000
heap
page read and write
3250000
direct allocation
page read and write
31CF000
stack
page read and write
3250000
direct allocation
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
3B0E000
stack
page read and write
4ED1000
heap
page read and write
4B0F000
stack
page read and write
428E000
stack
page read and write
15D4000
heap
page read and write
A1C000
stack
page read and write
15D4000
heap
page read and write
14B4000
heap
page read and write
17EE000
stack
page read and write
1D44E000
stack
page read and write
4B4E000
stack
page read and write
5330000
heap
page read and write
4D8F000
stack
page read and write
414E000
stack
page read and write
348F000
stack
page read and write
4ED1000
heap
page read and write
15D4000
heap
page read and write
1D7DB000
stack
page read and write
14B3000
heap
page read and write
4ED1000
heap
page read and write
3C4E000
stack
page read and write
1D30E000
stack
page read and write
3D8E000
stack
page read and write
15D4000
heap
page read and write
3250000
direct allocation
page read and write
4ED0000
heap
page read and write
39CE000
stack
page read and write
4ED1000
heap
page read and write
374E000
stack
page read and write
4ED1000
heap
page read and write
1D2CF000
stack
page read and write
44CF000
stack
page read and write
474F000
stack
page read and write
3270000
direct allocation
page read and write
49CF000
stack
page read and write
3C0F000
stack
page read and write
34CE000
stack
page read and write
15D4000
heap
page read and write
1D1CE000
stack
page read and write
3ECE000
stack
page read and write
54C0000
direct allocation
page execute and read and write
1D69C000
stack
page read and write
14AE000
heap
page read and write
460F000
stack
page read and write
15D4000
heap
page read and write
54F0000
direct allocation
page execute and read and write
4ED1000
heap
page read and write
15D4000
heap
page read and write
15D4000
heap
page read and write
15D4000
heap
page read and write
4ED1000
heap
page read and write
548F000
stack
page read and write
4FD0000
trusted library allocation
page read and write
1D40F000
stack
page read and write
18EE000
stack
page read and write
4ED1000
heap
page read and write
1D59C000
stack
page read and write
14B9000
heap
page read and write
5490000
direct allocation
page execute and read and write
4ED1000
heap
page read and write
CAE000
unkown
page execute and read and write
388E000
stack
page read and write
14BC000
heap
page read and write
15D4000
heap
page read and write
43CE000
stack
page read and write
4ED1000
heap
page read and write
3250000
direct allocation
page read and write
54C0000
direct allocation
page execute and read and write
F40000
unkown
page execute and read and write
384F000
stack
page read and write
370F000
stack
page read and write
4ED1000
heap
page read and write
324E000
stack
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
E35000
unkown
page execute and read and write
1473000
heap
page read and write
F4F000
unkown
page execute and write copy
4ED1000
heap
page read and write
15D4000
heap
page read and write
3270000
direct allocation
page read and write
B0D000
unkown
page execute and read and write
4ED1000
heap
page read and write
F36000
unkown
page execute and read and write
15C0000
heap
page read and write
3FCF000
stack
page read and write
4ED1000
heap
page read and write
15D4000
heap
page read and write
438F000
stack
page read and write
A51000
unkown
page execute and write copy
4ED1000
heap
page read and write
4ED1000
heap
page read and write
15D4000
heap
page read and write
15D4000
heap
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
3250000
direct allocation
page read and write
15D4000
heap
page read and write
4ED1000
heap
page read and write
488F000
stack
page read and write
4ED1000
heap
page read and write
54B0000
direct allocation
page execute and read and write
450E000
stack
page read and write
1420000
heap
page read and write
1D84E000
stack
page read and write
4ED1000
heap
page read and write
15D4000
heap
page read and write
400E000
stack
page read and write
4ED1000
heap
page read and write
15D4000
heap
page read and write
15D4000
heap
page read and write
4ED1000
heap
page read and write
15D4000
heap
page read and write
4ED1000
heap
page read and write
338F000
stack
page read and write
15D4000
heap
page read and write
11FE000
stack
page read and write
48CE000
stack
page read and write
4C8E000
stack
page read and write
4ED1000
heap
page read and write
10F1000
unkown
page execute and write copy
4ED1000
heap
page read and write
3250000
direct allocation
page read and write
15D4000
heap
page read and write
4ED1000
heap
page read and write
There are 226 hidden memdumps, click here to show them.