IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpl
unknown
malicious
http://185.215.113.37//
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php;
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/(
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php#
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpC
unknown
malicious
http://185.215.113.37R
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpg
unknown
malicious
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5060000
direct allocation
page read and write
malicious
BC1000
unkown
page execute and read and write
malicious
13AE000
heap
page read and write
malicious
1D3DE000
stack
page read and write
BC0000
unkown
page read and write
4BE1000
heap
page read and write
31BE000
stack
page read and write
F97000
unkown
page execute and read and write
134E000
stack
page read and write
51C0000
direct allocation
page execute and read and write
106B000
unkown
page execute and read and write
447E000
stack
page read and write
4BE1000
heap
page read and write
1D4DE000
stack
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
BC0000
unkown
page readonly
4ABE000
stack
page read and write
169F000
stack
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
3A3F000
stack
page read and write
141A000
heap
page read and write
3F3F000
stack
page read and write
1235000
unkown
page execute and write copy
4BE1000
heap
page read and write
3B7F000
stack
page read and write
5060000
direct allocation
page read and write
497E000
stack
page read and write
41FE000
stack
page read and write
51EE000
stack
page read and write
483E000
stack
page read and write
4BE1000
heap
page read and write
1D0EF000
stack
page read and write
4BE1000
heap
page read and write
317F000
stack
page read and write
46FE000
stack
page read and write
109A000
unkown
page execute and read and write
2F3F000
stack
page read and write
51D0000
direct allocation
page execute and read and write
4BE1000
heap
page read and write
40BE000
stack
page read and write
407F000
stack
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
5060000
direct allocation
page read and write
C71000
unkown
page execute and read and write
BB0000
direct allocation
page read and write
367F000
stack
page read and write
E0A000
unkown
page execute and read and write
4BE1000
heap
page read and write
4C00000
heap
page read and write
45BE000
stack
page read and write
1D22E000
stack
page read and write
4BE1000
heap
page read and write
357E000
stack
page read and write
BB0000
direct allocation
page read and write
493F000
stack
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
42FF000
stack
page read and write
BB0000
direct allocation
page read and write
4BE1000
heap
page read and write
138C000
stack
page read and write
BB0000
direct allocation
page read and write
BB0000
direct allocation
page read and write
4BC0000
heap
page read and write
780000
heap
page read and write
4BE1000
heap
page read and write
1D12D000
stack
page read and write
4BE1000
heap
page read and write
47FF000
stack
page read and write
AF5000
stack
page read and write
10A7000
unkown
page execute and read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
443F000
stack
page read and write
3CBF000
stack
page read and write
51E0000
direct allocation
page execute and read and write
4BE1000
heap
page read and write
B8B000
heap
page read and write
BB0000
direct allocation
page read and write
51B0000
direct allocation
page execute and read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
433E000
stack
page read and write
B80000
heap
page read and write
1D38F000
stack
page read and write
4BE1000
heap
page read and write
1CFEE000
stack
page read and write
4BE1000
heap
page read and write
CA2000
unkown
page execute and read and write
1090000
unkown
page execute and read and write
1D61C000
stack
page read and write
74C000
stack
page read and write
303F000
stack
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
BB0000
direct allocation
page read and write
4CE0000
trusted library allocation
page read and write
393E000
stack
page read and write
10A8000
unkown
page execute and write copy
3F7E000
stack
page read and write
4BE1000
heap
page read and write
353F000
stack
page read and write
38FF000
stack
page read and write
1D51E000
stack
page read and write
4BBF000
stack
page read and write
4BE1000
heap
page read and write
10A7000
unkown
page execute and write copy
B7E000
stack
page read and write
B3E000
stack
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BF5000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
41BF000
stack
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
1234000
unkown
page execute and read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
32BF000
stack
page read and write
E1E000
unkown
page execute and read and write
4BE1000
heap
page read and write
159E000
stack
page read and write
4BE1000
heap
page read and write
36BE000
stack
page read and write
4BE1000
heap
page read and write
51E0000
direct allocation
page execute and read and write
4BE1000
heap
page read and write
519F000
stack
page read and write
785000
heap
page read and write
4A7F000
stack
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
C7D000
unkown
page execute and read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
1407000
heap
page read and write
BA0000
heap
page read and write
3E3E000
stack
page read and write
4BE1000
heap
page read and write
1428000
heap
page read and write
457F000
stack
page read and write
BB0000
direct allocation
page read and write
3A7E000
stack
page read and write
BC1000
unkown
page execute and write copy
BB0000
direct allocation
page read and write
13F1000
heap
page read and write
51F0000
direct allocation
page execute and read and write
37FE000
stack
page read and write
1CFAF000
stack
page read and write
BB0000
direct allocation
page read and write
7C0000
heap
page read and write
5210000
direct allocation
page execute and read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
33FF000
stack
page read and write
37BF000
stack
page read and write
AFE000
stack
page read and write
509E000
stack
page read and write
4BE1000
heap
page read and write
13A0000
heap
page read and write
4BE1000
heap
page read and write
5200000
direct allocation
page execute and read and write
4BE1000
heap
page read and write
3DFF000
stack
page read and write
BB0000
direct allocation
page read and write
B87000
heap
page read and write
4BE0000
heap
page read and write
1D28E000
stack
page read and write
BB0000
direct allocation
page read and write
4BE1000
heap
page read and write
3BBE000
stack
page read and write
46BF000
stack
page read and write
4BE1000
heap
page read and write
13A8000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
343E000
stack
page read and write
4BE1000
heap
page read and write
BB0000
direct allocation
page read and write
7B0000
heap
page read and write
32FE000
stack
page read and write
4BE1000
heap
page read and write
BB0000
direct allocation
page read and write
307E000
stack
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
3CFE000
stack
page read and write
4BF0000
heap
page read and write
4BE1000
heap
page read and write
There are 193 hidden memdumps, click here to show them.