IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpL
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpE
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpC
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phps
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php7
unknown
malicious

Domains

Name
IP
Malicious
s-part-0017.t-0009.fb-t-msedge.net
13.107.253.45

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4FC0000
direct allocation
page read and write
malicious
12FE000
heap
page read and write
malicious
621000
unkown
page execute and read and write
malicious
4B31000
heap
page read and write
4B41000
heap
page read and write
4B31000
heap
page read and write
D4C000
stack
page read and write
460F000
stack
page read and write
5150000
direct allocation
page execute and read and write
4B31000
heap
page read and write
4FFE000
stack
page read and write
370F000
stack
page read and write
360E000
stack
page read and write
621000
unkown
page execute and write copy
1D20E000
stack
page read and write
4B31000
heap
page read and write
6DD000
unkown
page execute and read and write
4B20000
direct allocation
page read and write
1214000
heap
page read and write
1214000
heap
page read and write
4B31000
heap
page read and write
4A1E000
stack
page read and write
4B31000
heap
page read and write
4B20000
direct allocation
page read and write
384F000
stack
page read and write
4B20000
direct allocation
page read and write
2D8E000
stack
page read and write
1D35D000
stack
page read and write
1214000
heap
page read and write
6D1000
unkown
page execute and read and write
4B31000
heap
page read and write
1214000
heap
page read and write
ADE000
unkown
page execute and read and write
1214000
heap
page read and write
4B31000
heap
page read and write
3D4F000
stack
page read and write
1214000
heap
page read and write
479E000
stack
page read and write
4B20000
direct allocation
page read and write
12AB000
heap
page read and write
4B31000
heap
page read and write
87E000
unkown
page execute and read and write
14EE000
stack
page read and write
1214000
heap
page read and write
4FC0000
direct allocation
page read and write
1D0CE000
stack
page read and write
3ECE000
stack
page read and write
B1A000
unkown
page execute and read and write
1214000
heap
page read and write
310E000
stack
page read and write
4B20000
direct allocation
page read and write
4B31000
heap
page read and write
43CE000
stack
page read and write
1214000
heap
page read and write
4B31000
heap
page read and write
2F8F000
stack
page read and write
1214000
heap
page read and write
10F5000
stack
page read and write
4B20000
direct allocation
page read and write
1CF4F000
stack
page read and write
1214000
heap
page read and write
4B20000
direct allocation
page read and write
1214000
heap
page read and write
A02000
unkown
page execute and read and write
489F000
stack
page read and write
1214000
heap
page read and write
1214000
heap
page read and write
4B31000
heap
page read and write
5120000
direct allocation
page execute and read and write
438F000
stack
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
1214000
heap
page read and write
50FF000
stack
page read and write
1368000
heap
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
1358000
heap
page read and write
4B31000
heap
page read and write
1214000
heap
page read and write
1CE4E000
stack
page read and write
1D30F000
stack
page read and write
320F000
stack
page read and write
12A0000
heap
page read and write
4B20000
direct allocation
page read and write
3C0F000
stack
page read and write
1214000
heap
page read and write
1214000
heap
page read and write
4B31000
heap
page read and write
3B0E000
stack
page read and write
410F000
stack
page read and write
4B31000
heap
page read and write
414D000
stack
page read and write
620000
unkown
page read and write
30CF000
stack
page read and write
134A000
heap
page read and write
1214000
heap
page read and write
4B20000
direct allocation
page read and write
4B31000
heap
page read and write
1214000
heap
page read and write
4750000
heap
page read and write
5140000
direct allocation
page execute and read and write
1D49D000
stack
page read and write
4B1F000
stack
page read and write
4B31000
heap
page read and write
86A000
unkown
page execute and read and write
4B31000
heap
page read and write
120E000
stack
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
129E000
stack
page read and write
49DF000
stack
page read and write
1D59D000
stack
page read and write
464E000
stack
page read and write
4B31000
heap
page read and write
1214000
heap
page read and write
702000
unkown
page execute and read and write
48DE000
stack
page read and write
CB4000
unkown
page execute and write copy
1214000
heap
page read and write
1214000
heap
page read and write
2E8F000
stack
page read and write
4B31000
heap
page read and write
374E000
stack
page read and write
1214000
heap
page read and write
1214000
heap
page read and write
4B31000
heap
page read and write
348F000
stack
page read and write
DB0000
heap
page read and write
1214000
heap
page read and write
1214000
heap
page read and write
B1A000
unkown
page execute and write copy
1214000
heap
page read and write
1210000
heap
page read and write
12A7000
heap
page read and write
4B30000
heap
page read and write
4B31000
heap
page read and write
39CE000
stack
page read and write
4B31000
heap
page read and write
388E000
stack
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
424F000
stack
page read and write
10FE000
stack
page read and write
4B31000
heap
page read and write
3ACF000
stack
page read and write
4B20000
direct allocation
page read and write
1214000
heap
page read and write
4B20000
direct allocation
page read and write
5110000
direct allocation
page execute and read and write
4B31000
heap
page read and write
35CF000
stack
page read and write
4B31000
heap
page read and write
5140000
direct allocation
page execute and read and write
5130000
direct allocation
page execute and read and write
1D45D000
stack
page read and write
34CE000
stack
page read and write
4B31000
heap
page read and write
125D000
stack
page read and write
CB3000
unkown
page execute and read and write
4B31000
heap
page read and write
2FCE000
stack
page read and write
DA0000
heap
page read and write
1D1CF000
stack
page read and write
1345000
heap
page read and write
4B31000
heap
page read and write
474F000
stack
page read and write
450E000
stack
page read and write
398F000
stack
page read and write
3C4E000
stack
page read and write
4B31000
heap
page read and write
4FC0000
direct allocation
page read and write
5170000
direct allocation
page execute and read and write
1214000
heap
page read and write
4B20000
direct allocation
page read and write
4B20000
direct allocation
page read and write
12EB000
stack
page read and write
1D08F000
stack
page read and write
4B31000
heap
page read and write
1343000
heap
page read and write
4B31000
heap
page read and write
1214000
heap
page read and write
4B31000
heap
page read and write
12F0000
heap
page read and write
400E000
stack
page read and write
1214000
heap
page read and write
1214000
heap
page read and write
12FA000
heap
page read and write
4B31000
heap
page read and write
B0C000
unkown
page execute and read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
4FA0000
heap
page read and write
3E8F000
stack
page read and write
4B31000
heap
page read and write
4F70000
trusted library allocation
page read and write
324E000
stack
page read and write
334F000
stack
page read and write
1214000
heap
page read and write
B01000
unkown
page execute and read and write
3FCF000
stack
page read and write
5160000
direct allocation
page execute and read and write
4B31000
heap
page read and write
1214000
heap
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
338E000
stack
page read and write
1214000
heap
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
1CF8E000
stack
page read and write
44CF000
stack
page read and write
4B31000
heap
page read and write
428E000
stack
page read and write
4B20000
direct allocation
page read and write
1360000
heap
page read and write
B1B000
unkown
page execute and write copy
3D8E000
stack
page read and write
4B31000
heap
page read and write
620000
unkown
page readonly
4B31000
heap
page read and write
1376000
heap
page read and write
1214000
heap
page read and write
1365000
heap
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
There are 219 hidden memdumps, click here to show them.