IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpl
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/9
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpT
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php(
unknown
malicious

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
791000
unkown
page execute and read and write
malicious
14AE000
heap
page read and write
malicious
5160000
direct allocation
page read and write
malicious
326F000
stack
page read and write
2F10000
direct allocation
page read and write
4CD1000
heap
page read and write
136E000
stack
page read and write
FCE000
stack
page read and write
4CD1000
heap
page read and write
2EFB000
stack
page read and write
FC5000
stack
page read and write
4CD1000
heap
page read and write
2F10000
direct allocation
page read and write
4CD1000
heap
page read and write
2F10000
direct allocation
page read and write
312F000
stack
page read and write
4CD1000
heap
page read and write
52C0000
direct allocation
page execute and read and write
E2F000
unkown
page execute and read and write
4CD1000
heap
page read and write
38AF000
stack
page read and write
4CD1000
heap
page read and write
4B6F000
stack
page read and write
4CD1000
heap
page read and write
2F10000
direct allocation
page read and write
4CD1000
heap
page read and write
33EE000
stack
page read and write
4CE0000
heap
page read and write
1300000
heap
page read and write
1D48F000
stack
page read and write
5160000
direct allocation
page read and write
4CD1000
heap
page read and write
1523000
heap
page read and write
33AF000
stack
page read and write
149E000
stack
page read and write
872000
unkown
page execute and read and write
4CD1000
heap
page read and write
366E000
stack
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
416F000
stack
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
C90000
unkown
page execute and write copy
2EBE000
stack
page read and write
4CD1000
heap
page read and write
2F27000
heap
page read and write
52D0000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
406E000
stack
page read and write
1D61E000
stack
page read and write
1D32F000
stack
page read and write
4CD1000
heap
page read and write
47EE000
stack
page read and write
43EF000
stack
page read and write
4CD1000
heap
page read and write
2F10000
direct allocation
page read and write
4CD6000
heap
page read and write
4CAF000
stack
page read and write
4A2F000
stack
page read and write
C8F000
unkown
page execute and read and write
2F10000
direct allocation
page read and write
1D38E000
stack
page read and write
E30000
unkown
page execute and write copy
791000
unkown
page execute and write copy
37AE000
stack
page read and write
1517000
heap
page read and write
14F0000
heap
page read and write
5310000
direct allocation
page execute and read and write
14F4000
heap
page read and write
4CD1000
heap
page read and write
4A6E000
stack
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
529F000
stack
page read and write
376F000
stack
page read and write
3DAF000
stack
page read and write
3C6F000
stack
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
52E0000
direct allocation
page execute and read and write
519E000
stack
page read and write
442E000
stack
page read and write
4CD1000
heap
page read and write
3EEF000
stack
page read and write
4CD1000
heap
page read and write
34EF000
stack
page read and write
ECC000
stack
page read and write
47AF000
stack
page read and write
4BAE000
stack
page read and write
452F000
stack
page read and write
4CD1000
heap
page read and write
316E000
stack
page read and write
2F10000
direct allocation
page read and write
46AE000
stack
page read and write
362F000
stack
page read and write
1D0AF000
stack
page read and write
4CD1000
heap
page read and write
1D5DC000
stack
page read and write
42EE000
stack
page read and write
4CB0000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
38EE000
stack
page read and write
402F000
stack
page read and write
790000
unkown
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
2F10000
direct allocation
page read and write
3B6E000
stack
page read and write
9EE000
unkown
page execute and read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
52E0000
direct allocation
page execute and read and write
4CD1000
heap
page read and write
2F10000
direct allocation
page read and write
52EE000
stack
page read and write
1D1EF000
stack
page read and write
2F00000
heap
page read and write
42AF000
stack
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
3B2F000
stack
page read and write
52F0000
direct allocation
page execute and read and write
41AE000
stack
page read and write
4CD1000
heap
page read and write
841000
unkown
page execute and read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
1D22E000
stack
page read and write
2F20000
heap
page read and write
2F10000
direct allocation
page read and write
C7F000
unkown
page execute and read and write
2E7E000
stack
page read and write
4CF0000
heap
page read and write
C8F000
unkown
page execute and write copy
2F10000
direct allocation
page read and write
4CD1000
heap
page read and write
1D0EE000
stack
page read and write
4CD1000
heap
page read and write
5300000
direct allocation
page execute and read and write
5110000
trusted library allocation
page read and write
3A2E000
stack
page read and write
14A0000
heap
page read and write
52B0000
direct allocation
page execute and read and write
84D000
unkown
page execute and read and write
14A8000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
5160000
direct allocation
page read and write
C52000
unkown
page execute and read and write
9DA000
unkown
page execute and read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
2F10000
direct allocation
page read and write
1390000
heap
page read and write
2F2B000
heap
page read and write
2D7E000
stack
page read and write
1220000
heap
page read and write
2F10000
direct allocation
page read and write
1395000
heap
page read and write
492E000
stack
page read and write
3CAE000
stack
page read and write
4CD1000
heap
page read and write
1D4DD000
stack
page read and write
1509000
heap
page read and write
C78000
unkown
page execute and read and write
B6D000
unkown
page execute and read and write
32AE000
stack
page read and write
39EF000
stack
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
466F000
stack
page read and write
4CD0000
heap
page read and write
4CD1000
heap
page read and write
2F10000
direct allocation
page read and write
456E000
stack
page read and write
790000
unkown
page readonly
3F2E000
stack
page read and write
4CD1000
heap
page read and write
3DEE000
stack
page read and write
4CD1000
heap
page read and write
302F000
stack
page read and write
1D71E000
stack
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
4CD1000
heap
page read and write
352E000
stack
page read and write
4CD1000
heap
page read and write
48EF000
stack
page read and write
There are 194 hidden memdumps, click here to show them.