IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpK
unknown
malicious
http://185.215.113.37/U
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpo
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpU
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpz
unknown
malicious

Domains

Name
IP
Malicious
fp2e7a.wpc.phicdn.net
192.229.221.95
windowsupdatebg.s.llnwi.net
87.248.204.0

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1C9E000
heap
page read and write
malicious
E41000
unkown
page execute and read and write
malicious
5830000
direct allocation
page read and write
malicious
53B1000
heap
page read and write
1D7DE000
stack
page read and write
462E000
stack
page read and write
1A5D000
stack
page read and write
1D91E000
stack
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
3D2F000
stack
page read and write
EF1000
unkown
page execute and read and write
3A2F000
stack
page read and write
372F000
stack
page read and write
53B1000
heap
page read and write
1DF6E000
stack
page read and write
53B1000
heap
page read and write
1AF0000
heap
page read and write
EFD000
unkown
page execute and read and write
53B1000
heap
page read and write
53B2000
heap
page read and write
53B1000
heap
page read and write
3EAE000
stack
page read and write
43AE000
stack
page read and write
108A000
unkown
page execute and read and write
37AE000
stack
page read and write
1D69E000
stack
page read and write
1344000
unkown
page execute and write copy
476E000
stack
page read and write
53B1000
heap
page read and write
15D0000
heap
page read and write
1CF6000
heap
page read and write
1C9A000
heap
page read and write
1C80000
direct allocation
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
1BFF000
stack
page read and write
53B1000
heap
page read and write
422F000
stack
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
130B000
unkown
page execute and read and write
4C6E000
stack
page read and write
3827000
heap
page read and write
1DF70000
heap
page read and write
1C80000
direct allocation
page read and write
1CE2000
heap
page read and write
3FAF000
stack
page read and write
53B1000
heap
page read and write
3D6E000
stack
page read and write
53B1000
heap
page read and write
3820000
heap
page read and write
59B0000
direct allocation
page execute and read and write
1C7E000
stack
page read and write
5990000
direct allocation
page execute and read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
5980000
direct allocation
page execute and read and write
53B1000
heap
page read and write
109E000
unkown
page execute and read and write
1C3C000
stack
page read and write
1DA5E000
stack
page read and write
53AF000
stack
page read and write
157C000
stack
page read and write
1C80000
direct allocation
page read and write
53B1000
heap
page read and write
472F000
stack
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
53D0000
heap
page read and write
3800000
direct allocation
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
E40000
unkown
page read and write
53B1000
heap
page read and write
1344000
unkown
page execute and read and write
1D79F000
stack
page read and write
4EEE000
stack
page read and write
5990000
direct allocation
page execute and read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
1C80000
direct allocation
page read and write
4D6F000
stack
page read and write
436F000
stack
page read and write
1C80000
direct allocation
page read and write
37EE000
stack
page read and write
53B1000
heap
page read and write
3810000
direct allocation
page execute and read and write
1C80000
direct allocation
page read and write
53B1000
heap
page read and write
1C80000
direct allocation
page read and write
53B1000
heap
page read and write
1AF5000
heap
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
1335000
unkown
page execute and read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
516E000
stack
page read and write
53B1000
heap
page read and write
1230000
unkown
page execute and read and write
5970000
direct allocation
page execute and read and write
426E000
stack
page read and write
1AC0000
heap
page read and write
4C2F000
stack
page read and write
1E8E000
stack
page read and write
14E4000
unkown
page execute and write copy
53B1000
heap
page read and write
1DC9E000
stack
page read and write
1A1E000
stack
page read and write
4FEF000
stack
page read and write
486F000
stack
page read and write
53B1000
heap
page read and write
1CE0000
heap
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
4DAE000
stack
page read and write
59A0000
direct allocation
page execute and read and write
59C0000
direct allocation
page execute and read and write
1C80000
direct allocation
page read and write
1D13000
heap
page read and write
14E3000
unkown
page execute and read and write
53B1000
heap
page read and write
18F5000
stack
page read and write
1DCDD000
stack
page read and write
3B2F000
stack
page read and write
53C0000
heap
page read and write
1C80000
direct allocation
page read and write
412E000
stack
page read and write
53B1000
heap
page read and write
1C80000
direct allocation
page read and write
44EE000
stack
page read and write
4AEF000
stack
page read and write
1D1C000
heap
page read and write
1C80000
direct allocation
page read and write
53B1000
heap
page read and write
44AF000
stack
page read and write
53B1000
heap
page read and write
1C80000
direct allocation
page read and write
1DB5F000
stack
page read and write
132E000
unkown
page execute and read and write
15E0000
heap
page read and write
4B2E000
stack
page read and write
53B1000
heap
page read and write
1DE6E000
stack
page read and write
53B1000
heap
page read and write
E41000
unkown
page execute and write copy
49EE000
stack
page read and write
502E000
stack
page read and write
49AF000
stack
page read and write
53B1000
heap
page read and write
1AD0000
heap
page read and write
1C90000
heap
page read and write
3800000
direct allocation
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
40EF000
stack
page read and write
512F000
stack
page read and write
3E6F000
stack
page read and write
F22000
unkown
page execute and read and write
392F000
stack
page read and write
53B1000
heap
page read and write
1C80000
direct allocation
page read and write
52AE000
stack
page read and write
3FEE000
stack
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
48AE000
stack
page read and write
1D8DF000
stack
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
1ABE000
stack
page read and write
586E000
stack
page read and write
1DDDD000
stack
page read and write
53B1000
heap
page read and write
4EAF000
stack
page read and write
3C2F000
stack
page read and write
376E000
stack
page read and write
53B1000
heap
page read and write
1C80000
direct allocation
page read and write
53B1000
heap
page read and write
53B0000
heap
page read and write
53B1000
heap
page read and write
57F0000
trusted library allocation
page read and write
18FE000
stack
page read and write
45EF000
stack
page read and write
382B000
heap
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
526F000
stack
page read and write
1DB9E000
stack
page read and write
1345000
unkown
page execute and write copy
1DA1E000
stack
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
53B1000
heap
page read and write
E40000
unkown
page readonly
596F000
stack
page read and write
There are 197 hidden memdumps, click here to show them.