IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php1G
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpUG
unknown
malicious
http://185.215.113.37/h
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php4
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpyGD
unknown
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php)G
unknown
malicious
http://185.215.113.37t
unknown
malicious
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
CEE000
heap
page read and write
malicious
4A20000
direct allocation
page read and write
malicious
81000
unkown
page execute and read and write
malicious
BF4000
heap
page read and write
CEA000
heap
page read and write
3B8F000
stack
page read and write
CC0000
heap
page read and write
BF0000
heap
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
304F000
stack
page read and write
BF4000
heap
page read and write
4591000
heap
page read and write
D49000
heap
page read and write
4591000
heap
page read and write
308E000
stack
page read and write
368F000
stack
page read and write
575000
unkown
page execute and write copy
CE0000
heap
page read and write
434E000
stack
page read and write
BF4000
heap
page read and write
2CA000
unkown
page execute and read and write
40CE000
stack
page read and write
4A5E000
stack
page read and write
2A4E000
stack
page read and write
1CFFE000
stack
page read and write
1C9AF000
stack
page read and write
4B80000
direct allocation
page execute and read and write
CD0000
direct allocation
page read and write
2DE000
unkown
page execute and read and write
C5E000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
420E000
stack
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
B00000
heap
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
4591000
heap
page read and write
BF4000
heap
page read and write
4B5F000
stack
page read and write
567000
unkown
page execute and read and write
4591000
heap
page read and write
318F000
stack
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
2E0E000
stack
page read and write
340F000
stack
page read and write
4591000
heap
page read and write
BF4000
heap
page read and write
53D000
unkown
page execute and read and write
28CB000
heap
page read and write
4591000
heap
page read and write
2DCF000
stack
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
2C8F000
stack
page read and write
2B8E000
stack
page read and write
1CC2F000
stack
page read and write
576000
unkown
page execute and write copy
32CF000
stack
page read and write
BF4000
heap
page read and write
13D000
unkown
page execute and read and write
4591000
heap
page read and write
1CB2E000
stack
page read and write
BF4000
heap
page read and write
4591000
heap
page read and write
4A20000
direct allocation
page read and write
463000
unkown
page execute and read and write
4591000
heap
page read and write
4591000
heap
page read and write
C9E000
stack
page read and write
3F8E000
stack
page read and write
4591000
heap
page read and write
BF4000
heap
page read and write
3D0E000
stack
page read and write
4591000
heap
page read and write
BF4000
heap
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
BF4000
heap
page read and write
4591000
heap
page read and write
BF4000
heap
page read and write
1CEBC000
stack
page read and write
28C0000
heap
page read and write
290C000
stack
page read and write
37CF000
stack
page read and write
354F000
stack
page read and write
CD0000
direct allocation
page read and write
D36000
heap
page read and write
4591000
heap
page read and write
BF4000
heap
page read and write
CD0000
direct allocation
page read and write
28C7000
heap
page read and write
CD0000
direct allocation
page read and write
380E000
stack
page read and write
CD0000
direct allocation
page read and write
4591000
heap
page read and write
3F4F000
stack
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
2B4F000
stack
page read and write
1D19F000
stack
page read and write
BF4000
heap
page read and write
70F000
unkown
page execute and write copy
4591000
heap
page read and write
4A20000
direct allocation
page read and write
3BCE000
stack
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
3A4F000
stack
page read and write
430F000
stack
page read and write
4B90000
direct allocation
page execute and read and write
BF4000
heap
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
1CD7F000
stack
page read and write
CD0000
direct allocation
page read and write
1CDBE000
stack
page read and write
BF4000
heap
page read and write
CD0000
direct allocation
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
BF4000
heap
page read and write
CD0000
direct allocation
page read and write
45B0000
heap
page read and write
CD0000
direct allocation
page read and write
448E000
stack
page read and write
CD0000
direct allocation
page read and write
AF5000
stack
page read and write
4591000
heap
page read and write
131000
unkown
page execute and read and write
1C8AE000
stack
page read and write
BF4000
heap
page read and write
575000
unkown
page execute and read and write
4591000
heap
page read and write
1C9EE000
stack
page read and write
4591000
heap
page read and write
2F4E000
stack
page read and write
4591000
heap
page read and write
1D09E000
stack
page read and write
36CE000
stack
page read and write
D32000
heap
page read and write
4591000
heap
page read and write
444F000
stack
page read and write
CD0000
direct allocation
page read and write
4591000
heap
page read and write
BF4000
heap
page read and write
4B70000
direct allocation
page execute and read and write
162000
unkown
page execute and read and write
BF4000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
4591000
heap
page read and write
358E000
stack
page read and write
458F000
stack
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
4591000
heap
page read and write
CD0000
direct allocation
page read and write
4591000
heap
page read and write
49D0000
trusted library allocation
page read and write
3E4E000
stack
page read and write
4590000
heap
page read and write
31CE000
stack
page read and write
4591000
heap
page read and write
BE0000
heap
page read and write
2CCE000
stack
page read and write
3E0F000
stack
page read and write
FDF000
stack
page read and write
1D1A0000
heap
page read and write
4591000
heap
page read and write
344E000
stack
page read and write
3CCF000
stack
page read and write
EDF000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
1CC7E000
stack
page read and write
70E000
unkown
page execute and read and write
BF4000
heap
page read and write
4591000
heap
page read and write
2F0F000
stack
page read and write
81000
unkown
page execute and write copy
CD0000
direct allocation
page read and write
4BD0000
direct allocation
page execute and read and write
4591000
heap
page read and write
4591000
heap
page read and write
3A8E000
stack
page read and write
BF4000
heap
page read and write
AFE000
stack
page read and write
1CEFE000
stack
page read and write
80000
unkown
page readonly
408F000
stack
page read and write
BF4000
heap
page read and write
4591000
heap
page read and write
BF4000
heap
page read and write
1CAEF000
stack
page read and write
4591000
heap
page read and write
41CF000
stack
page read and write
4591000
heap
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
BF4000
heap
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
D63000
heap
page read and write
390F000
stack
page read and write
BF4000
heap
page read and write
45A0000
heap
page read and write
4591000
heap
page read and write
394E000
stack
page read and write
80000
unkown
page read and write
330E000
stack
page read and write
4591000
heap
page read and write
2A0F000
stack
page read and write
4591000
heap
page read and write
4591000
heap
page read and write
27BE000
stack
page read and write
28BF000
stack
page read and write
CD0000
direct allocation
page read and write
7AC000
stack
page read and write
4A00000
heap
page read and write
4591000
heap
page read and write
55E000
unkown
page execute and read and write
There are 223 hidden memdumps, click here to show them.