IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php;
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php5
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpu
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpX
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpg
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5000000
direct allocation
page read and write
malicious
4B1000
unkown
page execute and read and write
malicious
116E000
heap
page read and write
malicious
70E000
unkown
page execute and read and write
12E4000
heap
page read and write
38EE000
stack
page read and write
316F000
stack
page read and write
3EEF000
stack
page read and write
DE0000
heap
page read and write
12D0000
direct allocation
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
2E67000
heap
page read and write
D8C000
stack
page read and write
9A0000
unkown
page execute and read and write
5180000
direct allocation
page execute and read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
1D24E000
stack
page read and write
1CF7F000
stack
page read and write
4B71000
heap
page read and write
5190000
direct allocation
page execute and read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
47EE000
stack
page read and write
4B71000
heap
page read and write
3F2E000
stack
page read and write
43EF000
stack
page read and write
12E4000
heap
page read and write
12E4000
heap
page read and write
3A2E000
stack
page read and write
5150000
direct allocation
page execute and read and write
11E1000
heap
page read and write
513F000
stack
page read and write
2DDB000
stack
page read and write
306F000
stack
page read and write
4FB0000
trusted library allocation
page read and write
4A6E000
stack
page read and write
1D0FE000
stack
page read and write
12D0000
direct allocation
page read and write
326F000
stack
page read and write
12E4000
heap
page read and write
4B71000
heap
page read and write
2E60000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
12E4000
heap
page read and write
89D000
unkown
page execute and read and write
37AE000
stack
page read and write
4B71000
heap
page read and write
592000
unkown
page execute and read and write
362F000
stack
page read and write
12E4000
heap
page read and write
42EE000
stack
page read and write
14BF000
stack
page read and write
4B71000
heap
page read and write
129E000
stack
page read and write
12E4000
heap
page read and write
12E4000
heap
page read and write
561000
unkown
page execute and read and write
4B71000
heap
page read and write
416F000
stack
page read and write
15BE000
stack
page read and write
12E4000
heap
page read and write
4B0000
unkown
page readonly
12E4000
heap
page read and write
97A000
unkown
page execute and read and write
2D9E000
stack
page read and write
12E4000
heap
page read and write
1D0BF000
stack
page read and write
115E000
stack
page read and write
4B71000
heap
page read and write
12E4000
heap
page read and write
1D1FF000
stack
page read and write
1D38D000
stack
page read and write
4B71000
heap
page read and write
12D0000
direct allocation
page read and write
1D4CE000
stack
page read and write
34EF000
stack
page read and write
51A0000
direct allocation
page execute and read and write
5000000
direct allocation
page read and write
12D0000
direct allocation
page read and write
12E4000
heap
page read and write
12E4000
heap
page read and write
5180000
direct allocation
page execute and read and write
4B71000
heap
page read and write
12D0000
direct allocation
page read and write
12E4000
heap
page read and write
12E4000
heap
page read and write
3DAF000
stack
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
38AF000
stack
page read and write
4B80000
heap
page read and write
12E4000
heap
page read and write
452F000
stack
page read and write
3B6E000
stack
page read and write
12E4000
heap
page read and write
12E4000
heap
page read and write
1D48D000
stack
page read and write
4B71000
heap
page read and write
4FE0000
heap
page read and write
12E4000
heap
page read and write
5000000
direct allocation
page read and write
4A2F000
stack
page read and write
4B1000
unkown
page execute and write copy
4B71000
heap
page read and write
9B7000
unkown
page execute and write copy
DF0000
heap
page read and write
4B71000
heap
page read and write
466F000
stack
page read and write
12E0000
heap
page read and write
4B71000
heap
page read and write
366E000
stack
page read and write
12E4000
heap
page read and write
12D0000
direct allocation
page read and write
1CE7E000
stack
page read and write
4B71000
heap
page read and write
10FF000
stack
page read and write
4B71000
heap
page read and write
47AF000
stack
page read and write
39EF000
stack
page read and write
3B2F000
stack
page read and write
11AE000
heap
page read and write
12E4000
heap
page read and write
4B70000
heap
page read and write
12E4000
heap
page read and write
402F000
stack
page read and write
33EE000
stack
page read and write
12E4000
heap
page read and write
12E4000
heap
page read and write
4B71000
heap
page read and write
12D0000
direct allocation
page read and write
492E000
stack
page read and write
456E000
stack
page read and write
11C7000
heap
page read and write
12E4000
heap
page read and write
4B71000
heap
page read and write
12E4000
heap
page read and write
32AE000
stack
page read and write
4B71000
heap
page read and write
12E4000
heap
page read and write
3C6F000
stack
page read and write
4B71000
heap
page read and write
442E000
stack
page read and write
12E4000
heap
page read and write
12E4000
heap
page read and write
6FA000
unkown
page execute and read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
12D0000
direct allocation
page read and write
12D0000
direct allocation
page read and write
12D0000
direct allocation
page read and write
12D0000
direct allocation
page read and write
12D0000
direct allocation
page read and write
1CFBE000
stack
page read and write
5160000
direct allocation
page execute and read and write
11AC000
heap
page read and write
4B71000
heap
page read and write
376F000
stack
page read and write
12D0000
direct allocation
page read and write
4B71000
heap
page read and write
9B8000
unkown
page execute and write copy
11B3000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
2E6B000
heap
page read and write
4B0000
unkown
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
12E4000
heap
page read and write
4B71000
heap
page read and write
B54000
unkown
page execute and read and write
12D0000
direct allocation
page read and write
4B71000
heap
page read and write
116A000
heap
page read and write
2E1E000
stack
page read and write
41AE000
stack
page read and write
2E5E000
stack
page read and write
4B71000
heap
page read and write
12E4000
heap
page read and write
12E4000
heap
page read and write
12E4000
heap
page read and write
10F5000
stack
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
12E4000
heap
page read and write
5170000
direct allocation
page execute and read and write
4B71000
heap
page read and write
2F6F000
stack
page read and write
4B71000
heap
page read and write
56D000
unkown
page execute and read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
48EF000
stack
page read and write
3CAE000
stack
page read and write
4B90000
heap
page read and write
3DEE000
stack
page read and write
1D34F000
stack
page read and write
352E000
stack
page read and write
4B71000
heap
page read and write
1160000
heap
page read and write
12C0000
heap
page read and write
4B71000
heap
page read and write
9B7000
unkown
page execute and read and write
12E4000
heap
page read and write
4B71000
heap
page read and write
46AE000
stack
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
1D5CC000
stack
page read and write
406E000
stack
page read and write
4B71000
heap
page read and write
9A9000
unkown
page execute and read and write
4B6F000
stack
page read and write
42AF000
stack
page read and write
503E000
stack
page read and write
4B71000
heap
page read and write
12E4000
heap
page read and write
33AF000
stack
page read and write
There are 219 hidden memdumps, click here to show them.