IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/BiQ
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/C84BCA9C91821060E9A79u
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpF
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phphi
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/&
unknown
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpJ
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpConnectionSettings
unknown
malicious
http://185.215.113.37oZ
unknown
malicious
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
11DE000
heap
page read and write
malicious
531000
unkown
page execute and read and write
malicious
5040000
direct allocation
page read and write
malicious
1D4CC000
stack
page read and write
DBC000
stack
page read and write
1184000
heap
page read and write
1184000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
5020000
heap
page read and write
303F000
stack
page read and write
1184000
heap
page read and write
51A0000
direct allocation
page execute and read and write
307E000
stack
page read and write
4BC0000
heap
page read and write
1184000
heap
page read and write
5E1000
unkown
page execute and read and write
4BE0000
heap
page read and write
3E3E000
stack
page read and write
32BF000
stack
page read and write
11D8000
heap
page read and write
2EFF000
stack
page read and write
1184000
heap
page read and write
1D13E000
stack
page read and write
2DC0000
direct allocation
page read and write
10F5000
stack
page read and write
4BC1000
heap
page read and write
1110000
heap
page read and write
A25000
unkown
page execute and read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
2DC0000
direct allocation
page read and write
4A7F000
stack
page read and write
45BE000
stack
page read and write
4BC1000
heap
page read and write
1184000
heap
page read and write
A26000
unkown
page execute and write copy
11CE000
stack
page read and write
1184000
heap
page read and write
1D3CE000
stack
page read and write
1184000
heap
page read and write
5ED000
unkown
page execute and read and write
2DC0000
direct allocation
page read and write
1184000
heap
page read and write
4BC1000
heap
page read and write
1184000
heap
page read and write
37FE000
stack
page read and write
1D50D000
stack
page read and write
1224000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
1184000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
1184000
heap
page read and write
2DF7000
heap
page read and write
2DC0000
direct allocation
page read and write
1184000
heap
page read and write
4BC1000
heap
page read and write
4ABE000
stack
page read and write
1184000
heap
page read and write
4BC1000
heap
page read and write
1184000
heap
page read and write
1184000
heap
page read and write
2DE0000
direct allocation
page read and write
1D60E000
stack
page read and write
4BC1000
heap
page read and write
3F3F000
stack
page read and write
51B0000
direct allocation
page execute and read and write
493F000
stack
page read and write
4BC1000
heap
page read and write
3CFE000
stack
page read and write
1184000
heap
page read and write
4BC1000
heap
page read and write
1184000
heap
page read and write
78E000
unkown
page execute and read and write
4BC1000
heap
page read and write
1184000
heap
page read and write
447E000
stack
page read and write
1184000
heap
page read and write
33FF000
stack
page read and write
407F000
stack
page read and write
A0E000
unkown
page execute and read and write
3DFF000
stack
page read and write
5190000
direct allocation
page execute and read and write
BBA000
unkown
page execute and read and write
4BBF000
stack
page read and write
4BC1000
heap
page read and write
10FE000
stack
page read and write
497E000
stack
page read and write
4BC1000
heap
page read and write
14DE000
stack
page read and write
4BC1000
heap
page read and write
BBB000
unkown
page execute and write copy
4BC1000
heap
page read and write
4BC1000
heap
page read and write
51D0000
direct allocation
page execute and read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
531000
unkown
page execute and write copy
3F7E000
stack
page read and write
4BC1000
heap
page read and write
4BD0000
heap
page read and write
32FE000
stack
page read and write
4BC1000
heap
page read and write
1170000
heap
page read and write
4BC1000
heap
page read and write
1184000
heap
page read and write
42FF000
stack
page read and write
1184000
heap
page read and write
2DC0000
direct allocation
page read and write
4BC1000
heap
page read and write
1184000
heap
page read and write
1184000
heap
page read and write
4BC1000
heap
page read and write
1184000
heap
page read and write
530000
unkown
page readonly
530000
unkown
page read and write
1184000
heap
page read and write
1CFFE000
stack
page read and write
343E000
stack
page read and write
4BC1000
heap
page read and write
3BBE000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
149F000
stack
page read and write
40BE000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
483E000
stack
page read and write
353F000
stack
page read and write
2DC0000
direct allocation
page read and write
914000
unkown
page execute and read and write
4BC1000
heap
page read and write
2DC0000
direct allocation
page read and write
357E000
stack
page read and write
51E0000
direct allocation
page execute and read and write
2DC0000
direct allocation
page read and write
1184000
heap
page read and write
1184000
heap
page read and write
1D37F000
stack
page read and write
2DF0000
heap
page read and write
2DC0000
direct allocation
page read and write
4BC1000
heap
page read and write
2DC0000
direct allocation
page read and write
9EB000
unkown
page execute and read and write
51C0000
direct allocation
page execute and read and write
4BC1000
heap
page read and write
443F000
stack
page read and write
1120000
heap
page read and write
1CFBF000
stack
page read and write
4BC1000
heap
page read and write
612000
unkown
page execute and read and write
41BF000
stack
page read and write
2DBE000
stack
page read and write
A17000
unkown
page execute and read and write
A25000
unkown
page execute and write copy
4BC1000
heap
page read and write
1180000
heap
page read and write
393E000
stack
page read and write
2DC0000
direct allocation
page read and write
4BC1000
heap
page read and write
3A7E000
stack
page read and write
1184000
heap
page read and write
1236000
heap
page read and write
3A3F000
stack
page read and write
367F000
stack
page read and write
11D0000
heap
page read and write
2DFB000
heap
page read and write
5180000
direct allocation
page execute and read and write
1D23F000
stack
page read and write
4BC1000
heap
page read and write
433E000
stack
page read and write
1184000
heap
page read and write
4BC1000
heap
page read and write
51B0000
direct allocation
page execute and read and write
4BC1000
heap
page read and write
31BE000
stack
page read and write
47FF000
stack
page read and write
1184000
heap
page read and write
5000000
trusted library allocation
page read and write
2DC0000
direct allocation
page read and write
1D27E000
stack
page read and write
1255000
heap
page read and write
1184000
heap
page read and write
4BC1000
heap
page read and write
3CBF000
stack
page read and write
457F000
stack
page read and write
4BC1000
heap
page read and write
2DC0000
direct allocation
page read and write
41FD000
stack
page read and write
15DF000
stack
page read and write
1184000
heap
page read and write
1D0FF000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
517F000
stack
page read and write
2DE0000
direct allocation
page read and write
1184000
heap
page read and write
2F3E000
stack
page read and write
4BC1000
heap
page read and write
1184000
heap
page read and write
4BC1000
heap
page read and write
37BF000
stack
page read and write
2DC0000
direct allocation
page read and write
46BF000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
1184000
heap
page read and write
36BE000
stack
page read and write
317F000
stack
page read and write
1184000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
77A000
unkown
page execute and read and write
38FF000
stack
page read and write
507E000
stack
page read and write
46FE000
stack
page read and write
1CEBE000
stack
page read and write
3B7F000
stack
page read and write
There are 216 hidden memdumps, click here to show them.