IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37//Q
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/(Q
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php?
unknown
malicious
http://185.215.113.37/6Q
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpC
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpw
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3D1000
unkown
page execute and read and write
malicious
106E000
heap
page read and write
malicious
4DC0000
direct allocation
page read and write
malicious
353F000
stack
page read and write
33FF000
stack
page read and write
2AFF000
stack
page read and write
104E000
stack
page read and write
2B90000
direct allocation
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
2B90000
direct allocation
page read and write
2B90000
direct allocation
page read and write
4941000
heap
page read and write
1D38E000
stack
page read and write
4DFB000
stack
page read and write
4F40000
direct allocation
page execute and read and write
4941000
heap
page read and write
303F000
stack
page read and write
4941000
heap
page read and write
BC4000
heap
page read and write
4941000
heap
page read and write
2DBF000
stack
page read and write
46BF000
stack
page read and write
10E4000
heap
page read and write
4941000
heap
page read and write
BC4000
heap
page read and write
BA0000
heap
page read and write
BC4000
heap
page read and write
1CFFE000
stack
page read and write
4941000
heap
page read and write
3E3E000
stack
page read and write
1060000
heap
page read and write
367F000
stack
page read and write
4941000
heap
page read and write
483E000
stack
page read and write
2BB0000
heap
page read and write
4941000
heap
page read and write
2B90000
direct allocation
page read and write
4941000
heap
page read and write
BC4000
heap
page read and write
37BF000
stack
page read and write
BC4000
heap
page read and write
8A7000
unkown
page execute and read and write
47FF000
stack
page read and write
BC4000
heap
page read and write
357E000
stack
page read and write
41FE000
stack
page read and write
41BF000
stack
page read and write
32FE000
stack
page read and write
8B2000
unkown
page execute and read and write
317F000
stack
page read and write
2B90000
direct allocation
page read and write
4EFF000
stack
page read and write
457F000
stack
page read and write
BC4000
heap
page read and write
40BE000
stack
page read and write
433E000
stack
page read and write
46FE000
stack
page read and write
45BE000
stack
page read and write
BC4000
heap
page read and write
4941000
heap
page read and write
10C7000
heap
page read and write
BC4000
heap
page read and write
4941000
heap
page read and write
1D24D000
stack
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
32BF000
stack
page read and write
4941000
heap
page read and write
BC4000
heap
page read and write
407F000
stack
page read and write
4941000
heap
page read and write
2BBB000
heap
page read and write
1CEBE000
stack
page read and write
BC4000
heap
page read and write
4D80000
trusted library allocation
page read and write
38FF000
stack
page read and write
BC4000
heap
page read and write
4941000
heap
page read and write
BC4000
heap
page read and write
BB0000
heap
page read and write
4941000
heap
page read and write
1CD3F000
stack
page read and write
3D0000
unkown
page read and write
BC4000
heap
page read and write
1D28E000
stack
page read and write
1CE7F000
stack
page read and write
4F30000
direct allocation
page execute and read and write
4DC0000
direct allocation
page read and write
2B90000
direct allocation
page read and write
BC4000
heap
page read and write
1D14D000
stack
page read and write
4940000
heap
page read and write
1CC3E000
stack
page read and write
37FE000
stack
page read and write
4941000
heap
page read and write
3B7F000
stack
page read and write
4941000
heap
page read and write
BC4000
heap
page read and write
BC4000
heap
page read and write
481000
unkown
page execute and read and write
4F20000
direct allocation
page execute and read and write
4941000
heap
page read and write
2DFE000
stack
page read and write
8C0000
unkown
page execute and read and write
4941000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
10B2000
heap
page read and write
BC4000
heap
page read and write
447E000
stack
page read and write
2B90000
direct allocation
page read and write
4941000
heap
page read and write
42FF000
stack
page read and write
4941000
heap
page read and write
2B3E000
stack
page read and write
BC4000
heap
page read and write
7AB000
unkown
page execute and read and write
A55000
unkown
page execute and read and write
2CBF000
stack
page read and write
8C1000
unkown
page execute and write copy
4941000
heap
page read and write
2B90000
direct allocation
page read and write
4941000
heap
page read and write
4DA0000
heap
page read and write
2F3E000
stack
page read and write
4960000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
2B90000
direct allocation
page read and write
3CFE000
stack
page read and write
4941000
heap
page read and write
443F000
stack
page read and write
2B90000
direct allocation
page read and write
4941000
heap
page read and write
36BE000
stack
page read and write
BC0000
heap
page read and write
3D0000
unkown
page readonly
4F40000
direct allocation
page execute and read and write
BC4000
heap
page read and write
4941000
heap
page read and write
3A7E000
stack
page read and write
BC4000
heap
page read and write
4941000
heap
page read and write
BC4000
heap
page read and write
4941000
heap
page read and write
4B2000
unkown
page execute and read and write
4941000
heap
page read and write
61A000
unkown
page execute and read and write
BC4000
heap
page read and write
4941000
heap
page read and write
3F3F000
stack
page read and write
8C0000
unkown
page execute and write copy
BC4000
heap
page read and write
1CFBE000
stack
page read and write
2B90000
direct allocation
page read and write
3BBE000
stack
page read and write
BC4000
heap
page read and write
BC4000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
48D000
unkown
page execute and read and write
3A3F000
stack
page read and write
2BB7000
heap
page read and write
4F50000
direct allocation
page execute and read and write
4941000
heap
page read and write
4DC0000
direct allocation
page read and write
A56000
unkown
page execute and write copy
1CD7E000
stack
page read and write
1068000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
3CBF000
stack
page read and write
4941000
heap
page read and write
2EFF000
stack
page read and write
3D1000
unkown
page execute and write copy
4941000
heap
page read and write
BC4000
heap
page read and write
4941000
heap
page read and write
31BE000
stack
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
62E000
unkown
page execute and read and write
4941000
heap
page read and write
1D0FF000
stack
page read and write
BC4000
heap
page read and write
2B80000
heap
page read and write
4941000
heap
page read and write
BC4000
heap
page read and write
BC4000
heap
page read and write
4F60000
direct allocation
page execute and read and write
BC4000
heap
page read and write
EFF000
stack
page read and write
2B7B000
stack
page read and write
BC4000
heap
page read and write
2B90000
direct allocation
page read and write
885000
unkown
page execute and read and write
100D000
stack
page read and write
4F10000
direct allocation
page execute and read and write
BC4000
heap
page read and write
4941000
heap
page read and write
BC4000
heap
page read and write
493F000
stack
page read and write
4941000
heap
page read and write
B4C000
stack
page read and write
307E000
stack
page read and write
393E000
stack
page read and write
BC4000
heap
page read and write
BC4000
heap
page read and write
4941000
heap
page read and write
3DFF000
stack
page read and write
EF5000
stack
page read and write
BC4000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
125E000
stack
page read and write
4941000
heap
page read and write
2B90000
direct allocation
page read and write
4950000
heap
page read and write
3F7E000
stack
page read and write
343E000
stack
page read and write
2B90000
direct allocation
page read and write
There are 216 hidden memdumps, click here to show them.