IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpoW
unknown
malicious
http://185.215.113.37/rsonation
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpE
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/KW
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php4
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpY
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpIh
unknown
malicious

Domains

Name
IP
Malicious
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
DE1000
unkown
page execute and read and write
malicious
56E0000
direct allocation
page read and write
malicious
195E000
heap
page read and write
malicious
489E000
stack
page read and write
5261000
heap
page read and write
49DE000
stack
page read and write
1D66E000
stack
page read and write
1890000
heap
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
399E000
stack
page read and write
501E000
stack
page read and write
5278000
heap
page read and write
5840000
direct allocation
page execute and read and write
5261000
heap
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
411E000
stack
page read and write
1870000
direct allocation
page read and write
1870000
direct allocation
page read and write
5261000
heap
page read and write
1894000
heap
page read and write
56A0000
heap
page read and write
471F000
stack
page read and write
1894000
heap
page read and write
12BE000
unkown
page execute and read and write
5830000
direct allocation
page execute and read and write
1D76F000
stack
page read and write
12EA000
unkown
page execute and read and write
DB0000
heap
page read and write
3657000
heap
page read and write
1894000
heap
page read and write
103E000
unkown
page execute and read and write
1894000
heap
page read and write
1D62F000
stack
page read and write
E9D000
unkown
page execute and read and write
511F000
stack
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
385F000
stack
page read and write
1950000
heap
page read and write
5260000
heap
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
3640000
direct allocation
page execute and read and write
5261000
heap
page read and write
5261000
heap
page read and write
11D5000
unkown
page execute and read and write
5261000
heap
page read and write
19B7000
heap
page read and write
3BDF000
stack
page read and write
DE1000
unkown
page execute and write copy
1870000
direct allocation
page read and write
1870000
direct allocation
page read and write
3C1E000
stack
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
485F000
stack
page read and write
461E000
stack
page read and write
421F000
stack
page read and write
1894000
heap
page read and write
581F000
stack
page read and write
15A5000
stack
page read and write
5280000
heap
page read and write
525F000
stack
page read and write
DE0000
unkown
page readonly
4B1E000
stack
page read and write
5261000
heap
page read and write
1DB3C000
stack
page read and write
19C3000
heap
page read and write
1DA3D000
stack
page read and write
DE0000
unkown
page read and write
1D7AE000
stack
page read and write
1894000
heap
page read and write
19D1000
heap
page read and write
35FE000
stack
page read and write
5261000
heap
page read and write
1920000
direct allocation
page read and write
1894000
heap
page read and write
1870000
direct allocation
page read and write
1894000
heap
page read and write
18DE000
stack
page read and write
5261000
heap
page read and write
1870000
direct allocation
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
1894000
heap
page read and write
1D52E000
stack
page read and write
191B000
stack
page read and write
5261000
heap
page read and write
12E2000
unkown
page execute and read and write
1894000
heap
page read and write
4C5E000
stack
page read and write
1DC7E000
stack
page read and write
3F9F000
stack
page read and write
15FE000
stack
page read and write
1894000
heap
page read and write
E91000
unkown
page execute and read and write
5261000
heap
page read and write
1894000
heap
page read and write
1894000
heap
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
4D9E000
stack
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
375F000
stack
page read and write
5261000
heap
page read and write
475E000
stack
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
1870000
direct allocation
page read and write
1894000
heap
page read and write
35BF000
stack
page read and write
5261000
heap
page read and write
EC2000
unkown
page execute and read and write
1870000
direct allocation
page read and write
1D1E000
stack
page read and write
1870000
direct allocation
page read and write
1894000
heap
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
1894000
heap
page read and write
3E5F000
stack
page read and write
1894000
heap
page read and write
5261000
heap
page read and write
56A0000
trusted library allocation
page read and write
5261000
heap
page read and write
515E000
stack
page read and write
1894000
heap
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
195A000
heap
page read and write
44DE000
stack
page read and write
439E000
stack
page read and write
1940000
direct allocation
page execute and read and write
5820000
direct allocation
page execute and read and write
1894000
heap
page read and write
5850000
direct allocation
page execute and read and write
4C1F000
stack
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
1870000
direct allocation
page read and write
4D5F000
stack
page read and write
19A1000
heap
page read and write
14A8000
unkown
page execute and read and write
1920000
direct allocation
page read and write
1930000
direct allocation
page execute and read and write
1894000
heap
page read and write
4FDF000
stack
page read and write
3E9E000
stack
page read and write
1894000
heap
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
1894000
heap
page read and write
1894000
heap
page read and write
5261000
heap
page read and write
1894000
heap
page read and write
1D9EF000
stack
page read and write
363E000
stack
page read and write
571E000
stack
page read and write
1894000
heap
page read and write
1C1E000
stack
page read and write
4E9F000
stack
page read and write
5261000
heap
page read and write
1DB7E000
stack
page read and write
1870000
direct allocation
page read and write
1870000
direct allocation
page read and write
40DF000
stack
page read and write
DC0000
heap
page read and write
12FA000
unkown
page execute and write copy
435F000
stack
page read and write
5261000
heap
page read and write
499F000
stack
page read and write
1894000
heap
page read and write
1894000
heap
page read and write
3D5E000
stack
page read and write
5261000
heap
page read and write
1894000
heap
page read and write
5270000
heap
page read and write
15AF000
stack
page read and write
183E000
stack
page read and write
D5C000
stack
page read and write
1894000
heap
page read and write
1894000
heap
page read and write
5261000
heap
page read and write
3ADE000
stack
page read and write
5261000
heap
page read and write
45DF000
stack
page read and write
5820000
direct allocation
page execute and read and write
102A000
unkown
page execute and read and write
425E000
stack
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
12F9000
unkown
page execute and read and write
1870000
direct allocation
page read and write
3D1F000
stack
page read and write
1D8AE000
stack
page read and write
1894000
heap
page read and write
1894000
heap
page read and write
1894000
heap
page read and write
12F9000
unkown
page execute and write copy
1894000
heap
page read and write
5261000
heap
page read and write
449F000
stack
page read and write
5261000
heap
page read and write
1870000
direct allocation
page read and write
5261000
heap
page read and write
5261000
heap
page read and write
4ADF000
stack
page read and write
1894000
heap
page read and write
395F000
stack
page read and write
14A9000
unkown
page execute and write copy
365B000
heap
page read and write
1860000
heap
page read and write
1894000
heap
page read and write
1894000
heap
page read and write
3FDE000
stack
page read and write
1D8EE000
stack
page read and write
3650000
heap
page read and write
5261000
heap
page read and write
3A9F000
stack
page read and write
4EDE000
stack
page read and write
There are 218 hidden memdumps, click here to show them.