IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php2
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php0
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php/
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php$
unknown
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37a
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php(
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
471000
unkown
page execute and read and write
malicious
121E000
heap
page read and write
malicious
4E30000
direct allocation
page read and write
malicious
49B1000
heap
page read and write
35AF000
stack
page read and write
31EF000
stack
page read and write
961000
unkown
page execute and read and write
1094000
heap
page read and write
11E0000
direct allocation
page read and write
3FAF000
stack
page read and write
49B1000
heap
page read and write
462E000
stack
page read and write
552000
unkown
page execute and read and write
1094000
heap
page read and write
106B000
heap
page read and write
2D2B000
stack
page read and write
1094000
heap
page read and write
49B1000
heap
page read and write
43AE000
stack
page read and write
1CDEE000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
49B1000
heap
page read and write
1094000
heap
page read and write
49B1000
heap
page read and write
49B1000
heap
page read and write
49B1000
heap
page read and write
49B1000
heap
page read and write
1094000
heap
page read and write
49B1000
heap
page read and write
2FAE000
stack
page read and write
49B1000
heap
page read and write
3D6E000
stack
page read and write
472F000
stack
page read and write
49B1000
heap
page read and write
49B1000
heap
page read and write
2F6F000
stack
page read and write
49B1000
heap
page read and write
382F000
stack
page read and write
1094000
heap
page read and write
3BEF000
stack
page read and write
49B1000
heap
page read and write
970000
unkown
page execute and write copy
49B1000
heap
page read and write
49B1000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
49B1000
heap
page read and write
4E10000
heap
page read and write
3AEE000
stack
page read and write
49B1000
heap
page read and write
1060000
heap
page read and write
1218000
heap
page read and write
30EE000
stack
page read and write
1094000
heap
page read and write
11E0000
direct allocation
page read and write
1080000
heap
page read and write
386E000
stack
page read and write
44EE000
stack
page read and write
49B1000
heap
page read and write
11E0000
direct allocation
page read and write
119E000
stack
page read and write
1210000
heap
page read and write
EFE000
stack
page read and write
1094000
heap
page read and write
11E0000
direct allocation
page read and write
35EE000
stack
page read and write
49B1000
heap
page read and write
1094000
heap
page read and write
49B1000
heap
page read and write
2BEE000
stack
page read and write
49B1000
heap
page read and write
2E6E000
stack
page read and write
30AF000
stack
page read and write
412E000
stack
page read and write
1094000
heap
page read and write
49B1000
heap
page read and write
6CE000
unkown
page execute and read and write
49B1000
heap
page read and write
346F000
stack
page read and write
1067000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
396F000
stack
page read and write
52D000
unkown
page execute and read and write
49B1000
heap
page read and write
1D02F000
stack
page read and write
49C1000
heap
page read and write
11E0000
direct allocation
page read and write
3EAE000
stack
page read and write
1094000
heap
page read and write
49B1000
heap
page read and write
49B0000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
4F6F000
stack
page read and write
3D2F000
stack
page read and write
36EF000
stack
page read and write
125C000
heap
page read and write
49B1000
heap
page read and write
1094000
heap
page read and write
49B1000
heap
page read and write
1090000
heap
page read and write
11E0000
direct allocation
page read and write
1094000
heap
page read and write
2BAE000
stack
page read and write
49AF000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
1296000
heap
page read and write
1094000
heap
page read and write
486F000
stack
page read and write
11E0000
direct allocation
page read and write
1CEEF000
stack
page read and write
49B1000
heap
page read and write
49B1000
heap
page read and write
49B1000
heap
page read and write
1D2BD000
stack
page read and write
1094000
heap
page read and write
1CCAE000
stack
page read and write
49B1000
heap
page read and write
1094000
heap
page read and write
96F000
unkown
page execute and write copy
436F000
stack
page read and write
49B1000
heap
page read and write
4F70000
direct allocation
page execute and read and write
3FEE000
stack
page read and write
4DF0000
trusted library allocation
page read and write
4FC0000
direct allocation
page execute and read and write
11E0000
direct allocation
page read and write
11E0000
direct allocation
page read and write
1094000
heap
page read and write
49B1000
heap
page read and write
39AE000
stack
page read and write
49B1000
heap
page read and write
2CEF000
stack
page read and write
49B1000
heap
page read and write
3C2E000
stack
page read and write
49B1000
heap
page read and write
49B1000
heap
page read and write
49B1000
heap
page read and write
B10000
unkown
page execute and write copy
1200000
direct allocation
page read and write
1262000
heap
page read and write
49B1000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
1CDAF000
stack
page read and write
40EF000
stack
page read and write
B0F000
unkown
page execute and read and write
49B1000
heap
page read and write
937000
unkown
page execute and read and write
45EF000
stack
page read and write
336E000
stack
page read and write
49B1000
heap
page read and write
49B1000
heap
page read and write
3AAF000
stack
page read and write
48AE000
stack
page read and write
1094000
heap
page read and write
49B1000
heap
page read and write
11E0000
direct allocation
page read and write
4E6E000
stack
page read and write
44AF000
stack
page read and write
1094000
heap
page read and write
2E2F000
stack
page read and write
1094000
heap
page read and write
49B1000
heap
page read and write
49B1000
heap
page read and write
332F000
stack
page read and write
49B1000
heap
page read and write
49B1000
heap
page read and write
49B1000
heap
page read and write
957000
unkown
page execute and read and write
49B1000
heap
page read and write
1094000
heap
page read and write
49B1000
heap
page read and write
372E000
stack
page read and write
49B1000
heap
page read and write
6BA000
unkown
page execute and read and write
FE0000
heap
page read and write
1D2FD000
stack
page read and write
F00000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
1277000
heap
page read and write
476E000
stack
page read and write
859000
unkown
page execute and read and write
426E000
stack
page read and write
4F90000
direct allocation
page execute and read and write
1CF2E000
stack
page read and write
BAC000
stack
page read and write
4FB0000
direct allocation
page execute and read and write
EF5000
stack
page read and write
471000
unkown
page execute and write copy
11E0000
direct allocation
page read and write
49B1000
heap
page read and write
49B1000
heap
page read and write
1094000
heap
page read and write
49B1000
heap
page read and write
1D3FE000
stack
page read and write
11E0000
direct allocation
page read and write
1D1BD000
stack
page read and write
322E000
stack
page read and write
470000
unkown
page read and write
3E6F000
stack
page read and write
521000
unkown
page execute and read and write
422F000
stack
page read and write
34AE000
stack
page read and write
49B1000
heap
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
104D000
stack
page read and write
11E0000
direct allocation
page read and write
1D06E000
stack
page read and write
1200000
direct allocation
page read and write
1094000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
49B1000
heap
page read and write
96F000
unkown
page execute and read and write
11DE000
stack
page read and write
4F80000
direct allocation
page execute and read and write
49B1000
heap
page read and write
1094000
heap
page read and write
470000
unkown
page readonly
1D16F000
stack
page read and write
49B1000
heap
page read and write
11E0000
direct allocation
page read and write
There are 216 hidden memdumps, click here to show them.