IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpl
unknown
malicious
http://185.215.113.37/?
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37W
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php3
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phps
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpX
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpg
unknown
malicious
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5100000
direct allocation
page read and write
malicious
BA1000
unkown
page execute and read and write
malicious
13EE000
heap
page read and write
malicious
DFE000
unkown
page execute and read and write
5250000
direct allocation
page execute and read and write
462F000
stack
page read and write
4C71000
heap
page read and write
1D5BE000
stack
page read and write
BA0000
unkown
page readonly
4C71000
heap
page read and write
1093000
unkown
page execute and read and write
34AF000
stack
page read and write
B80000
heap
page read and write
1D1CE000
stack
page read and write
47AE000
stack
page read and write
513E000
stack
page read and write
4C71000
heap
page read and write
316F000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
10A2000
unkown
page execute and write copy
1241000
unkown
page execute and write copy
4C71000
heap
page read and write
13EA000
heap
page read and write
49EF000
stack
page read and write
1069000
unkown
page execute and read and write
5270000
direct allocation
page execute and read and write
3B2E000
stack
page read and write
4C71000
heap
page read and write
4C70000
heap
page read and write
1D04F000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
B90000
direct allocation
page read and write
B10000
heap
page read and write
4C71000
heap
page read and write
1D43F000
stack
page read and write
402E000
stack
page read and write
4C71000
heap
page read and write
48AF000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
476F000
stack
page read and write
3C6E000
stack
page read and write
C5D000
unkown
page execute and read and write
44EF000
stack
page read and write
5290000
direct allocation
page execute and read and write
B90000
direct allocation
page read and write
4C71000
heap
page read and write
B90000
direct allocation
page read and write
108B000
unkown
page execute and read and write
5100000
direct allocation
page read and write
15DF000
stack
page read and write
33AE000
stack
page read and write
1240000
unkown
page execute and read and write
35EF000
stack
page read and write
4C71000
heap
page read and write
3C2F000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
48EE000
stack
page read and write
386F000
stack
page read and write
5100000
direct allocation
page read and write
B90000
direct allocation
page read and write
B90000
direct allocation
page read and write
4C71000
heap
page read and write
13E0000
heap
page read and write
523F000
stack
page read and write
4C71000
heap
page read and write
B90000
direct allocation
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
362E000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
BA0000
unkown
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
3D6F000
stack
page read and write
B90000
direct allocation
page read and write
4C71000
heap
page read and write
4A2E000
stack
page read and write
4C71000
heap
page read and write
B20000
heap
page read and write
1D6BE000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
376E000
stack
page read and write
4C71000
heap
page read and write
139E000
stack
page read and write
4C71000
heap
page read and write
2F40000
heap
page read and write
326F000
stack
page read and write
4C71000
heap
page read and write
3EEE000
stack
page read and write
4C71000
heap
page read and write
4C90000
heap
page read and write
DEA000
unkown
page execute and read and write
452E000
stack
page read and write
B90000
direct allocation
page read and write
B90000
direct allocation
page read and write
1465000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
466E000
stack
page read and write
336F000
stack
page read and write
412F000
stack
page read and write
B90000
direct allocation
page read and write
B90000
direct allocation
page read and write
4C71000
heap
page read and write
1D33E000
stack
page read and write
4C71000
heap
page read and write
4C80000
heap
page read and write
3FEF000
stack
page read and write
43AE000
stack
page read and write
1459000
heap
page read and write
1D47D000
stack
page read and write
4C71000
heap
page read and write
AFE000
stack
page read and write
43EE000
stack
page read and write
2F6B000
heap
page read and write
1D57C000
stack
page read and write
B90000
direct allocation
page read and write
4C71000
heap
page read and write
50B0000
trusted library allocation
page read and write
1D08E000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
135E000
stack
page read and write
B85000
heap
page read and write
372F000
stack
page read and write
4B2F000
stack
page read and write
3AEF000
stack
page read and write
4C71000
heap
page read and write
426F000
stack
page read and write
1D2CF000
stack
page read and write
4C71000
heap
page read and write
1D18F000
stack
page read and write
38AE000
stack
page read and write
528E000
stack
page read and write
4C71000
heap
page read and write
10A1000
unkown
page execute and read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
10A1000
unkown
page execute and write copy
1438000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C6F000
stack
page read and write
B90000
direct allocation
page read and write
4C71000
heap
page read and write
306F000
stack
page read and write
5280000
direct allocation
page execute and read and write
2F60000
heap
page read and write
4B6E000
stack
page read and write
5260000
direct allocation
page execute and read and write
2F67000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
2F3E000
stack
page read and write
4C71000
heap
page read and write
7BC000
stack
page read and write
3DAE000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
39EE000
stack
page read and write
4C71000
heap
page read and write
52B0000
direct allocation
page execute and read and write
13DE000
stack
page read and write
4C71000
heap
page read and write
42AE000
stack
page read and write
16DE000
stack
page read and write
4C71000
heap
page read and write
B70000
heap
page read and write
4C71000
heap
page read and write
39AF000
stack
page read and write
144D000
heap
page read and write
2EFE000
stack
page read and write
BA1000
unkown
page execute and write copy
4C71000
heap
page read and write
5280000
direct allocation
page execute and read and write
2EBB000
stack
page read and write
52A0000
direct allocation
page execute and read and write
4C71000
heap
page read and write
B90000
direct allocation
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
146C000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
C82000
unkown
page execute and read and write
34EE000
stack
page read and write
4C71000
heap
page read and write
AF5000
stack
page read and write
C51000
unkown
page execute and read and write
4C71000
heap
page read and write
416E000
stack
page read and write
4C71000
heap
page read and write
3EAF000
stack
page read and write
F8F000
unkown
page execute and read and write
There are 195 hidden memdumps, click here to show them.