IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/e2b1563c6670f193.php~
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpL
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpK
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37e
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpd
unknown
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpft
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php7
unknown
malicious
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
541000
unkown
page execute and read and write
malicious
1028000
heap
page read and write
malicious
4C20000
direct allocation
page read and write
malicious
92D000
unkown
page execute and read and write
47A1000
heap
page read and write
3C5000
stack
page read and write
104D000
heap
page read and write
1092000
heap
page read and write
2A20000
direct allocation
page read and write
47A1000
heap
page read and write
4D5F000
stack
page read and write
4D9E000
stack
page read and write
29DB000
stack
page read and write
2A20000
direct allocation
page read and write
47A1000
heap
page read and write
540000
unkown
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
1D0CD000
stack
page read and write
1CB9E000
stack
page read and write
451F000
stack
page read and write
FBE000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
47A1000
heap
page read and write
100A000
heap
page read and write
500000
heap
page read and write
2A20000
direct allocation
page read and write
E3E000
stack
page read and write
47A1000
heap
page read and write
1CB5F000
stack
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
301E000
stack
page read and write
4DC0000
direct allocation
page execute and read and write
A46000
unkown
page execute and write copy
365E000
stack
page read and write
79E000
unkown
page execute and read and write
F75000
heap
page read and write
361F000
stack
page read and write
4D90000
direct allocation
page execute and read and write
47A1000
heap
page read and write
2FDF000
stack
page read and write
465F000
stack
page read and write
39DF000
stack
page read and write
47A1000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
2D9E000
stack
page read and write
47B0000
heap
page read and write
420000
heap
page read and write
47A1000
heap
page read and write
339F000
stack
page read and write
47A1000
heap
page read and write
33DE000
stack
page read and write
F70000
heap
page read and write
47A1000
heap
page read and write
622000
unkown
page execute and read and write
3C9E000
stack
page read and write
47A1000
heap
page read and write
2C5F000
stack
page read and write
47A1000
heap
page read and write
F50000
heap
page read and write
47A1000
heap
page read and write
2A40000
direct allocation
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
A37000
unkown
page execute and read and write
47A1000
heap
page read and write
441E000
stack
page read and write
5FD000
unkown
page execute and read and write
3CE000
stack
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
BE7000
unkown
page execute and write copy
47A1000
heap
page read and write
4BE0000
trusted library allocation
page read and write
2A20000
direct allocation
page read and write
47A1000
heap
page read and write
379E000
stack
page read and write
419E000
stack
page read and write
479F000
stack
page read and write
47A1000
heap
page read and write
2A20000
direct allocation
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
1CC9F000
stack
page read and write
1CDDF000
stack
page read and write
3DDE000
stack
page read and write
375F000
stack
page read and write
47A1000
heap
page read and write
455E000
stack
page read and write
3EDE000
stack
page read and write
405E000
stack
page read and write
5F1000
unkown
page execute and read and write
4D70000
direct allocation
page execute and read and write
47A1000
heap
page read and write
34DF000
stack
page read and write
47A1000
heap
page read and write
A2C000
unkown
page execute and read and write
3D9F000
stack
page read and write
1CE4E000
stack
page read and write
106A000
heap
page read and write
47A1000
heap
page read and write
F40000
heap
page read and write
469E000
stack
page read and write
47A1000
heap
page read and write
1053000
heap
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
351E000
stack
page read and write
47A1000
heap
page read and write
3B5E000
stack
page read and write
2A20000
direct allocation
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
2A57000
heap
page read and write
11FE000
stack
page read and write
2A20000
direct allocation
page read and write
47A1000
heap
page read and write
2A20000
direct allocation
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
3B1F000
stack
page read and write
1088000
heap
page read and write
2A40000
direct allocation
page read and write
A45000
unkown
page execute and read and write
2A20000
direct allocation
page read and write
1000000
heap
page read and write
1CCDE000
stack
page read and write
A45000
unkown
page execute and write copy
2A1E000
stack
page read and write
1023000
heap
page read and write
2B5F000
stack
page read and write
540000
unkown
page readonly
2D5F000
stack
page read and write
415F000
stack
page read and write
329E000
stack
page read and write
47A1000
heap
page read and write
4C5E000
stack
page read and write
47A1000
heap
page read and write
3C5F000
stack
page read and write
78A000
unkown
page execute and read and write
A0A000
unkown
page execute and read and write
47A1000
heap
page read and write
F3E000
stack
page read and write
47A1000
heap
page read and write
43DF000
stack
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
2CC000
stack
page read and write
315E000
stack
page read and write
47A1000
heap
page read and write
3A1E000
stack
page read and write
389F000
stack
page read and write
4D90000
direct allocation
page execute and read and write
325F000
stack
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
1CF8D000
stack
page read and write
100E000
heap
page read and write
47A1000
heap
page read and write
BE6000
unkown
page execute and read and write
2A50000
heap
page read and write
47A1000
heap
page read and write
2EDE000
stack
page read and write
47A1000
heap
page read and write
1D08C000
stack
page read and write
3F1E000
stack
page read and write
42DE000
stack
page read and write
107B000
heap
page read and write
541000
unkown
page execute and write copy
47A1000
heap
page read and write
47A0000
heap
page read and write
401F000
stack
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
429F000
stack
page read and write
4D80000
direct allocation
page execute and read and write
2E9F000
stack
page read and write
311F000
stack
page read and write
38DE000
stack
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
FFE000
stack
page read and write
4D60000
direct allocation
page execute and read and write
2A20000
direct allocation
page read and write
1CF4F000
stack
page read and write
2A5B000
heap
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
1099000
heap
page read and write
2A20000
direct allocation
page read and write
1D1CE000
stack
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
2A20000
direct allocation
page read and write
2A20000
direct allocation
page read and write
2A20000
direct allocation
page read and write
47A1000
heap
page read and write
There are 199 hidden memdumps, click here to show them.