IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/e2b1563c6670f193.php8a
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpR
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php%:
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpu:
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/law
unknown
malicious
http://185.215.113.37W$
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
107E000
heap
page read and write
malicious
321000
unkown
page execute and read and write
malicious
4E80000
direct allocation
page read and write
malicious
2D50000
direct allocation
page read and write
1078000
heap
page read and write
4A01000
heap
page read and write
11BE000
stack
page read and write
4A01000
heap
page read and write
321000
unkown
page execute and write copy
4A01000
heap
page read and write
3DBE000
stack
page read and write
1D0CE000
stack
page read and write
2D50000
direct allocation
page read and write
1D08F000
stack
page read and write
1CF4F000
stack
page read and write
4A01000
heap
page read and write
4A20000
heap
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
F84000
heap
page read and write
F84000
heap
page read and write
F84000
heap
page read and write
F84000
heap
page read and write
2BFE000
stack
page read and write
402000
unkown
page execute and read and write
4A01000
heap
page read and write
2D50000
direct allocation
page read and write
327E000
stack
page read and write
2D50000
direct allocation
page read and write
F84000
heap
page read and write
9A6000
unkown
page execute and read and write
4A01000
heap
page read and write
43BF000
stack
page read and write
811000
unkown
page execute and write copy
1CF8E000
stack
page read and write
F84000
heap
page read and write
4FBF000
stack
page read and write
320000
unkown
page readonly
35FF000
stack
page read and write
4A01000
heap
page read and write
5000000
direct allocation
page execute and read and write
4A01000
heap
page read and write
F84000
heap
page read and write
4A01000
heap
page read and write
3FFF000
stack
page read and write
4A01000
heap
page read and write
F84000
heap
page read and write
48FE000
stack
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
13FE000
stack
page read and write
313E000
stack
page read and write
4A01000
heap
page read and write
5000000
direct allocation
page execute and read and write
7FB000
unkown
page execute and read and write
4A01000
heap
page read and write
802000
unkown
page execute and read and write
4A01000
heap
page read and write
12FE000
stack
page read and write
F84000
heap
page read and write
10D8000
heap
page read and write
467E000
stack
page read and write
4A01000
heap
page read and write
42BE000
stack
page read and write
F84000
heap
page read and write
477F000
stack
page read and write
4A01000
heap
page read and write
F84000
heap
page read and write
2FFE000
stack
page read and write
4A17000
heap
page read and write
812000
unkown
page execute and write copy
4A01000
heap
page read and write
49FF000
stack
page read and write
F84000
heap
page read and write
4A01000
heap
page read and write
3AFF000
stack
page read and write
47BE000
stack
page read and write
4A01000
heap
page read and write
2D50000
direct allocation
page read and write
2D50000
direct allocation
page read and write
4FD0000
direct allocation
page execute and read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
373F000
stack
page read and write
5010000
direct allocation
page execute and read and write
F84000
heap
page read and write
3D1000
unkown
page execute and read and write
2D50000
direct allocation
page read and write
4A01000
heap
page read and write
10E6000
heap
page read and write
2E7F000
stack
page read and write
4A00000
heap
page read and write
1D45E000
stack
page read and write
F35000
stack
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
30FF000
stack
page read and write
323F000
stack
page read and write
2D77000
heap
page read and write
2D7B000
heap
page read and write
4E80000
direct allocation
page read and write
2D50000
direct allocation
page read and write
4FF0000
direct allocation
page execute and read and write
F84000
heap
page read and write
F3E000
stack
page read and write
4A10000
heap
page read and write
F80000
heap
page read and write
F84000
heap
page read and write
10F9000
heap
page read and write
4A01000
heap
page read and write
7D8000
unkown
page execute and read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
3C3F000
stack
page read and write
2FBF000
stack
page read and write
2CFF000
stack
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
F60000
heap
page read and write
3EFE000
stack
page read and write
3D7F000
stack
page read and write
F84000
heap
page read and write
F84000
heap
page read and write
363E000
stack
page read and write
1D1CF000
stack
page read and write
463F000
stack
page read and write
1CD0E000
stack
page read and write
4A14000
heap
page read and write
4A01000
heap
page read and write
F84000
heap
page read and write
320000
unkown
page read and write
4A01000
heap
page read and write
377E000
stack
page read and write
F84000
heap
page read and write
F84000
heap
page read and write
413F000
stack
page read and write
F84000
heap
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
1CE0F000
stack
page read and write
57E000
unkown
page execute and read and write
F84000
heap
page read and write
F84000
heap
page read and write
2D50000
direct allocation
page read and write
4A01000
heap
page read and write
F84000
heap
page read and write
1CE4E000
stack
page read and write
38BE000
stack
page read and write
3DD000
unkown
page execute and read and write
F84000
heap
page read and write
4A01000
heap
page read and write
48BF000
stack
page read and write
4A01000
heap
page read and write
4EBE000
stack
page read and write
4A01000
heap
page read and write
43FE000
stack
page read and write
10C6000
heap
page read and write
F84000
heap
page read and write
F84000
heap
page read and write
39FE000
stack
page read and write
F84000
heap
page read and write
F84000
heap
page read and write
427F000
stack
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
F84000
heap
page read and write
F84000
heap
page read and write
6FE000
unkown
page execute and read and write
F84000
heap
page read and write
39BF000
stack
page read and write
12BF000
stack
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
2D50000
direct allocation
page read and write
F84000
heap
page read and write
417E000
stack
page read and write
811000
unkown
page execute and read and write
4A01000
heap
page read and write
3EBF000
stack
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
1D31C000
stack
page read and write
2D50000
direct allocation
page read and write
387F000
stack
page read and write
337F000
stack
page read and write
4B00000
trusted library allocation
page read and write
4A01000
heap
page read and write
F70000
heap
page read and write
4A01000
heap
page read and write
2EBE000
stack
page read and write
2D50000
direct allocation
page read and write
F84000
heap
page read and write
4A01000
heap
page read and write
3B3E000
stack
page read and write
F84000
heap
page read and write
3C7E000
stack
page read and write
4A01000
heap
page read and write
4E60000
heap
page read and write
1D35E000
stack
page read and write
2D70000
heap
page read and write
2D3E000
stack
page read and write
5020000
direct allocation
page execute and read and write
34BF000
stack
page read and write
1070000
heap
page read and write
1D21D000
stack
page read and write
56A000
unkown
page execute and read and write
4E80000
direct allocation
page read and write
2D40000
heap
page read and write
2D50000
direct allocation
page read and write
9A7000
unkown
page execute and write copy
F84000
heap
page read and write
2D50000
direct allocation
page read and write
4FE0000
direct allocation
page execute and read and write
453E000
stack
page read and write
E3C000
stack
page read and write
5030000
direct allocation
page execute and read and write
44FF000
stack
page read and write
33BE000
stack
page read and write
4A01000
heap
page read and write
10F2000
heap
page read and write
34FE000
stack
page read and write
F84000
heap
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
4A01000
heap
page read and write
403E000
stack
page read and write
There are 221 hidden memdumps, click here to show them.