IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/ctionSettingsa
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php/
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php&
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/f
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpS
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpi
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpG
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpw
unknown
malicious
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5F1000
unkown
page execute and read and write
malicious
4FB0000
direct allocation
page read and write
malicious
13EE000
heap
page read and write
malicious
4B21000
heap
page read and write
4B21000
heap
page read and write
5110000
direct allocation
page execute and read and write
4B21000
heap
page read and write
3C5E000
stack
page read and write
339E000
stack
page read and write
2F40000
direct allocation
page read and write
ABE000
unkown
page execute and read and write
5150000
direct allocation
page execute and read and write
2F40000
direct allocation
page read and write
439F000
stack
page read and write
4B21000
heap
page read and write
3D5F000
stack
page read and write
389E000
stack
page read and write
1254000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
2F50000
heap
page read and write
1254000
heap
page read and write
1254000
heap
page read and write
4FB0000
direct allocation
page read and write
1254000
heap
page read and write
6A1000
unkown
page execute and read and write
DA0000
heap
page read and write
1254000
heap
page read and write
1250000
heap
page read and write
305F000
stack
page read and write
48DE000
stack
page read and write
84E000
unkown
page execute and read and write
4B21000
heap
page read and write
1254000
heap
page read and write
4B1F000
stack
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
1254000
heap
page read and write
1463000
heap
page read and write
4B21000
heap
page read and write
120E000
stack
page read and write
4B21000
heap
page read and write
2EFE000
stack
page read and write
1254000
heap
page read and write
361E000
stack
page read and write
371F000
stack
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
5120000
direct allocation
page execute and read and write
3ADF000
stack
page read and write
4B21000
heap
page read and write
D90000
heap
page read and write
2F40000
direct allocation
page read and write
1D2EF000
stack
page read and write
5F1000
unkown
page execute and write copy
1433000
heap
page read and write
1254000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
AFB000
unkown
page execute and write copy
1254000
heap
page read and write
4B21000
heap
page read and write
415E000
stack
page read and write
4A1E000
stack
page read and write
3C1F000
stack
page read and write
451E000
stack
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
50EF000
stack
page read and write
CA3000
unkown
page execute and write copy
2F40000
direct allocation
page read and write
4B20000
heap
page read and write
141B000
heap
page read and write
1254000
heap
page read and write
349F000
stack
page read and write
4B21000
heap
page read and write
1254000
heap
page read and write
2F57000
heap
page read and write
139E000
stack
page read and write
1254000
heap
page read and write
1254000
heap
page read and write
401E000
stack
page read and write
2F40000
direct allocation
page read and write
1D33D000
stack
page read and write
5F0000
unkown
page read and write
2F40000
direct allocation
page read and write
2F40000
direct allocation
page read and write
4B21000
heap
page read and write
1254000
heap
page read and write
2F5B000
heap
page read and write
4B21000
heap
page read and write
1254000
heap
page read and write
1D0AE000
stack
page read and write
4B21000
heap
page read and write
1254000
heap
page read and write
1254000
heap
page read and write
1254000
heap
page read and write
2F40000
direct allocation
page read and write
9DB000
unkown
page execute and read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
10F5000
stack
page read and write
2F3E000
stack
page read and write
4B21000
heap
page read and write
CA2000
unkown
page execute and read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
44DF000
stack
page read and write
1254000
heap
page read and write
1D06F000
stack
page read and write
2F40000
direct allocation
page read and write
4B21000
heap
page read and write
49DF000
stack
page read and write
AED000
unkown
page execute and read and write
1254000
heap
page read and write
5130000
direct allocation
page execute and read and write
15DF000
stack
page read and write
1D43D000
stack
page read and write
D3C000
stack
page read and write
135F000
stack
page read and write
465E000
stack
page read and write
4B40000
heap
page read and write
43DE000
stack
page read and write
1254000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
1254000
heap
page read and write
375E000
stack
page read and write
4B21000
heap
page read and write
3EDE000
stack
page read and write
479E000
stack
page read and write
5130000
direct allocation
page execute and read and write
4B21000
heap
page read and write
461F000
stack
page read and write
13E0000
heap
page read and write
4FB0000
direct allocation
page read and write
4F60000
trusted library allocation
page read and write
4B21000
heap
page read and write
1254000
heap
page read and write
1D1AF000
stack
page read and write
1254000
heap
page read and write
4B21000
heap
page read and write
425F000
stack
page read and write
1CF2F000
stack
page read and write
3E9F000
stack
page read and write
AFC000
unkown
page execute and write copy
489F000
stack
page read and write
335F000
stack
page read and write
3FDF000
stack
page read and write
4B21000
heap
page read and write
1254000
heap
page read and write
315F000
stack
page read and write
1254000
heap
page read and write
3D9E000
stack
page read and write
1254000
heap
page read and write
2F40000
direct allocation
page read and write
4B21000
heap
page read and write
4B30000
heap
page read and write
1D57C000
stack
page read and write
4B21000
heap
page read and write
39DE000
stack
page read and write
4B21000
heap
page read and write
2F40000
direct allocation
page read and write
13DB000
stack
page read and write
4F90000
heap
page read and write
34DE000
stack
page read and write
AE4000
unkown
page execute and read and write
1446000
heap
page read and write
5F0000
unkown
page readonly
4B21000
heap
page read and write
1D720000
heap
page read and write
1CF6E000
stack
page read and write
AFB000
unkown
page execute and read and write
3B1E000
stack
page read and write
1254000
heap
page read and write
429E000
stack
page read and write
1254000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
2EBE000
stack
page read and write
1D61E000
stack
page read and write
411F000
stack
page read and write
4B21000
heap
page read and write
475F000
stack
page read and write
1254000
heap
page read and write
399F000
stack
page read and write
1D1EE000
stack
page read and write
325F000
stack
page read and write
124E000
stack
page read and write
4B21000
heap
page read and write
1254000
heap
page read and write
4B21000
heap
page read and write
2F40000
direct allocation
page read and write
13EA000
heap
page read and write
1254000
heap
page read and write
5140000
direct allocation
page execute and read and write
4B21000
heap
page read and write
385F000
stack
page read and write
5100000
direct allocation
page execute and read and write
10FE000
stack
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4FEE000
stack
page read and write
35DF000
stack
page read and write
1254000
heap
page read and write
1254000
heap
page read and write
2F40000
direct allocation
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
1D71E000
stack
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
DF0000
heap
page read and write
1254000
heap
page read and write
4B21000
heap
page read and write
2F40000
direct allocation
page read and write
6AD000
unkown
page execute and read and write
1D47E000
stack
page read and write
6D2000
unkown
page execute and read and write
2E7F000
stack
page read and write
4B21000
heap
page read and write
146D000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
1254000
heap
page read and write
1CE2E000
stack
page read and write
83A000
unkown
page execute and read and write
4B21000
heap
page read and write
There are 220 hidden memdumps, click here to show them.