IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/e2b1563c6670f193.php=
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/D
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpr
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/x
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpU
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpe
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/v
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpS
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpX
unknown
malicious
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5130000
direct allocation
page read and write
malicious
130E000
heap
page read and write
malicious
2E1000
unkown
page execute and read and write
malicious
4CA1000
heap
page read and write
3EBF000
stack
page read and write
4CA1000
heap
page read and write
4CA0000
heap
page read and write
4CA1000
heap
page read and write
2E1000
unkown
page execute and write copy
4CA1000
heap
page read and write
1366000
heap
page read and write
313E000
stack
page read and write
4CA1000
heap
page read and write
1352000
heap
page read and write
52A000
unkown
page execute and read and write
2FAF000
stack
page read and write
1382000
heap
page read and write
1255000
heap
page read and write
4CA1000
heap
page read and write
467E000
stack
page read and write
E9C000
stack
page read and write
977000
unkown
page execute and write copy
4CA1000
heap
page read and write
4C7F000
stack
page read and write
12F0000
direct allocation
page read and write
4CA1000
heap
page read and write
134D000
heap
page read and write
4CA1000
heap
page read and write
3C3F000
stack
page read and write
526F000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
12F0000
direct allocation
page read and write
4CA1000
heap
page read and write
38BE000
stack
page read and write
403E000
stack
page read and write
976000
unkown
page execute and read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
43FE000
stack
page read and write
6CD000
unkown
page execute and read and write
3C7E000
stack
page read and write
1D49D000
stack
page read and write
4B3F000
stack
page read and write
50E0000
trusted library allocation
page read and write
4CA1000
heap
page read and write
1250000
heap
page read and write
4CA1000
heap
page read and write
39D000
unkown
page execute and read and write
52A0000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
7DC000
unkown
page execute and write copy
4CA1000
heap
page read and write
F95000
stack
page read and write
4CA1000
heap
page read and write
4A3E000
stack
page read and write
3EFE000
stack
page read and write
52B0000
direct allocation
page execute and read and write
413F000
stack
page read and write
4CA2000
heap
page read and write
3B3E000
stack
page read and write
4CA1000
heap
page read and write
42BE000
stack
page read and write
5130000
direct allocation
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
3DBE000
stack
page read and write
4CA1000
heap
page read and write
2FEC000
stack
page read and write
44FF000
stack
page read and write
4CA1000
heap
page read and write
52BE000
stack
page read and write
1D6DC000
stack
page read and write
4CA1000
heap
page read and write
FF0000
heap
page read and write
4CA1000
heap
page read and write
7A0000
unkown
page execute and read and write
4CA1000
heap
page read and write
323F000
stack
page read and write
4CA1000
heap
page read and write
52C0000
direct allocation
page execute and read and write
48BF000
stack
page read and write
1D34E000
stack
page read and write
F9E000
stack
page read and write
387F000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
12F0000
direct allocation
page read and write
3AFF000
stack
page read and write
3D7F000
stack
page read and write
52B0000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
7CC000
unkown
page execute and read and write
1D2EF000
stack
page read and write
4CA1000
heap
page read and write
2FF7000
heap
page read and write
2E0000
unkown
page read and write
1D1EE000
stack
page read and write
417E000
stack
page read and write
4B7E000
stack
page read and write
4CA1000
heap
page read and write
5130000
direct allocation
page read and write
49FF000
stack
page read and write
4CA1000
heap
page read and write
34BF000
stack
page read and write
12F0000
direct allocation
page read and write
12E0000
heap
page read and write
4CA1000
heap
page read and write
39BF000
stack
page read and write
2E0000
unkown
page readonly
47BE000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
16CE000
stack
page read and write
4CA1000
heap
page read and write
1300000
heap
page read and write
4CB0000
heap
page read and write
12F0000
direct allocation
page read and write
363E000
stack
page read and write
7C5000
unkown
page execute and read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CC0000
heap
page read and write
5290000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
12F0000
direct allocation
page read and write
4CA1000
heap
page read and write
12F0000
direct allocation
page read and write
4CA1000
heap
page read and write
516E000
stack
page read and write
463F000
stack
page read and write
12F0000
direct allocation
page read and write
12F0000
direct allocation
page read and write
15CE000
stack
page read and write
3FFF000
stack
page read and write
5280000
direct allocation
page execute and read and write
30FF000
stack
page read and write
7DB000
unkown
page execute and read and write
1D06F000
stack
page read and write
4CA1000
heap
page read and write
48FE000
stack
page read and write
1200000
heap
page read and write
377E000
stack
page read and write
2FFB000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
477F000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
337F000
stack
page read and write
53E000
unkown
page execute and read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
1D59D000
stack
page read and write
373F000
stack
page read and write
12F0000
direct allocation
page read and write
129D000
stack
page read and write
130A000
heap
page read and write
34FE000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
1D0AE000
stack
page read and write
12DE000
stack
page read and write
327E000
stack
page read and write
12F0000
direct allocation
page read and write
4CA1000
heap
page read and write
2FF0000
heap
page read and write
3C2000
unkown
page execute and read and write
2EAE000
stack
page read and write
33BE000
stack
page read and write
427F000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
1D1AF000
stack
page read and write
12F0000
direct allocation
page read and write
35FF000
stack
page read and write
39FE000
stack
page read and write
4C80000
heap
page read and write
1D5DD000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
1D44F000
stack
page read and write
391000
unkown
page execute and read and write
4CA1000
heap
page read and write
453E000
stack
page read and write
52D0000
direct allocation
page execute and read and write
12F0000
direct allocation
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
7DB000
unkown
page execute and write copy
43BF000
stack
page read and write
12F0000
direct allocation
page read and write
There are 192 hidden memdumps, click here to show them.