IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/e2b1563c6670f193.phpzcu
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpvca
unknown
malicious
http://185.215.113.37GD7
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/am
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpEy
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpj
unknown
malicious
http://185.215.113.37/:y
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php&c
unknown
malicious
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1043000
heap
page read and write
malicious
231000
unkown
page execute and read and write
malicious
4DE0000
direct allocation
page read and write
malicious
1D39E000
stack
page read and write
47FF000
stack
page read and write
4940000
direct allocation
page read and write
4951000
heap
page read and write
6F5000
unkown
page execute and read and write
4951000
heap
page read and write
4951000
heap
page read and write
46BF000
stack
page read and write
357E000
stack
page read and write
4951000
heap
page read and write
135F000
stack
page read and write
4F80000
direct allocation
page execute and read and write
4951000
heap
page read and write
722000
unkown
page execute and read and write
4951000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
37BF000
stack
page read and write
4951000
heap
page read and write
307E000
stack
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
10A6000
heap
page read and write
102E000
heap
page read and write
BC0000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
2B7B000
heap
page read and write
B4C000
stack
page read and write
37FE000
stack
page read and write
730000
unkown
page execute and read and write
4951000
heap
page read and write
1D01E000
stack
page read and write
493F000
stack
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
317F000
stack
page read and write
4F50000
direct allocation
page execute and read and write
4951000
heap
page read and write
4F6E000
stack
page read and write
1072000
heap
page read and write
4DE0000
direct allocation
page read and write
1CD6E000
stack
page read and write
1D25C000
stack
page read and write
42FF000
stack
page read and write
47A000
unkown
page execute and read and write
102A000
heap
page read and write
EFE000
stack
page read and write
4F70000
direct allocation
page execute and read and write
2ED000
unkown
page execute and read and write
4F1F000
stack
page read and write
1CD2F000
stack
page read and write
4940000
direct allocation
page read and write
730000
unkown
page execute and write copy
407F000
stack
page read and write
4F90000
direct allocation
page execute and read and write
4960000
heap
page read and write
230000
unkown
page read and write
1D11F000
stack
page read and write
4951000
heap
page read and write
4940000
direct allocation
page read and write
2DFE000
stack
page read and write
4F60000
direct allocation
page execute and read and write
41BF000
stack
page read and write
4951000
heap
page read and write
3B7F000
stack
page read and write
4951000
heap
page read and write
61F000
unkown
page execute and read and write
4951000
heap
page read and write
457F000
stack
page read and write
3A7E000
stack
page read and write
4940000
direct allocation
page read and write
121E000
stack
page read and write
4940000
direct allocation
page read and write
4940000
direct allocation
page read and write
108A000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
2B40000
heap
page read and write
2B50000
heap
page read and write
3CFE000
stack
page read and write
41FE000
stack
page read and write
312000
unkown
page execute and read and write
125E000
stack
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
353F000
stack
page read and write
443F000
stack
page read and write
4940000
direct allocation
page read and write
38FF000
stack
page read and write
4951000
heap
page read and write
B70000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
36BE000
stack
page read and write
109A000
heap
page read and write
303F000
stack
page read and write
3F3F000
stack
page read and write
4F30000
direct allocation
page execute and read and write
4E1E000
stack
page read and write
3E3E000
stack
page read and write
4951000
heap
page read and write
45BE000
stack
page read and write
2DBF000
stack
page read and write
40BE000
stack
page read and write
4A50000
trusted library allocation
page read and write
1CE6F000
stack
page read and write
4940000
direct allocation
page read and write
100E000
stack
page read and write
4951000
heap
page read and write
31BE000
stack
page read and write
4951000
heap
page read and write
2CBB000
stack
page read and write
4951000
heap
page read and write
3F7E000
stack
page read and write
4940000
direct allocation
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
3DFF000
stack
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
2F3E000
stack
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
8CD000
unkown
page execute and write copy
4951000
heap
page read and write
230000
unkown
page readonly
4951000
heap
page read and write
367F000
stack
page read and write
483E000
stack
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
EF5000
stack
page read and write
2EFF000
stack
page read and write
231000
unkown
page execute and write copy
4940000
direct allocation
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
B75000
heap
page read and write
4F60000
direct allocation
page execute and read and write
4951000
heap
page read and write
4951000
heap
page read and write
393E000
stack
page read and write
4951000
heap
page read and write
2E1000
unkown
page execute and read and write
1CEAE000
stack
page read and write
4951000
heap
page read and write
731000
unkown
page execute and write copy
32FE000
stack
page read and write
8CC000
unkown
page execute and read and write
4951000
heap
page read and write
4940000
direct allocation
page read and write
4950000
heap
page read and write
447E000
stack
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
4940000
direct allocation
page read and write
2B77000
heap
page read and write
4DE0000
direct allocation
page read and write
4940000
direct allocation
page read and write
4951000
heap
page read and write
2B70000
heap
page read and write
718000
unkown
page execute and read and write
343E000
stack
page read and write
4951000
heap
page read and write
4F40000
direct allocation
page execute and read and write
1020000
heap
page read and write
4940000
direct allocation
page read and write
3CBF000
stack
page read and write
1D29D000
stack
page read and write
48E000
unkown
page execute and read and write
3A3F000
stack
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
BB0000
heap
page read and write
2C7F000
stack
page read and write
4951000
heap
page read and write
1D15D000
stack
page read and write
32BF000
stack
page read and write
46FE000
stack
page read and write
4951000
heap
page read and write
4951000
heap
page read and write
2B3E000
stack
page read and write
433E000
stack
page read and write
3BBE000
stack
page read and write
1078000
heap
page read and write
1CFAF000
stack
page read and write
33FF000
stack
page read and write
There are 195 hidden memdumps, click here to show them.