IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php2
unknown
malicious
http://185.215.113.37/t
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php/
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php_
unknown
malicious
http://185.215.113.37/(
unknown
malicious
http://185.215.113.37e
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpS
unknown
malicious
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
DC1000
unkown
page execute and read and write
malicious
160E000
heap
page read and write
malicious
4FE0000
direct allocation
page read and write
malicious
319F000
stack
page read and write
4B61000
heap
page read and write
B44000
heap
page read and write
379E000
stack
page read and write
15D0000
direct allocation
page read and write
B44000
heap
page read and write
12B5000
unkown
page execute and read and write
4B61000
heap
page read and write
15D0000
direct allocation
page read and write
15F0000
direct allocation
page read and write
D2B000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
15D0000
direct allocation
page read and write
3C5F000
stack
page read and write
4B61000
heap
page read and write
B44000
heap
page read and write
361F000
stack
page read and write
15D0000
direct allocation
page read and write
1D21E000
stack
page read and write
38DE000
stack
page read and write
7CF000
stack
page read and write
4B61000
heap
page read and write
B44000
heap
page read and write
DAE000
stack
page read and write
4B61000
heap
page read and write
1690000
heap
page read and write
429E000
stack
page read and write
4B61000
heap
page read and write
1600000
heap
page read and write
B44000
heap
page read and write
419E000
stack
page read and write
5150000
direct allocation
page execute and read and write
D1E000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
15D0000
direct allocation
page read and write
C8F000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
1CF9E000
stack
page read and write
4C60000
trusted library allocation
page read and write
B44000
heap
page read and write
15D0000
direct allocation
page read and write
3EDF000
stack
page read and write
15D0000
direct allocation
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
1D31F000
stack
page read and write
5170000
direct allocation
page execute and read and write
6CC000
stack
page read and write
15F0000
direct allocation
page read and write
4B61000
heap
page read and write
B44000
heap
page read and write
B44000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
B44000
heap
page read and write
4B61000
heap
page read and write
B44000
heap
page read and write
4B60000
heap
page read and write
EA2000
unkown
page execute and read and write
491E000
stack
page read and write
4B61000
heap
page read and write
B44000
heap
page read and write
309F000
stack
page read and write
469E000
stack
page read and write
E7D000
unkown
page execute and read and write
4A5E000
stack
page read and write
465F000
stack
page read and write
4B80000
heap
page read and write
1CE5E000
stack
page read and write
375F000
stack
page read and write
B44000
heap
page read and write
511F000
stack
page read and write
4B61000
heap
page read and write
B44000
heap
page read and write
1D4AE000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
154E000
stack
page read and write
D27000
heap
page read and write
15D0000
direct allocation
page read and write
144D000
unkown
page execute and write copy
4B61000
heap
page read and write
405E000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
415F000
stack
page read and write
3B1F000
stack
page read and write
1D0DE000
stack
page read and write
4B61000
heap
page read and write
1654000
heap
page read and write
4B61000
heap
page read and write
B44000
heap
page read and write
B44000
heap
page read and write
7C5000
stack
page read and write
129F000
unkown
page execute and read and write
4B61000
heap
page read and write
441E000
stack
page read and write
1D46D000
stack
page read and write
B00000
heap
page read and write
1CF5F000
stack
page read and write
B44000
heap
page read and write
B44000
heap
page read and write
47DE000
stack
page read and write
4B61000
heap
page read and write
B40000
heap
page read and write
B44000
heap
page read and write
4B61000
heap
page read and write
DB0000
heap
page read and write
3DDE000
stack
page read and write
B44000
heap
page read and write
4B61000
heap
page read and write
144C000
unkown
page execute and read and write
4B61000
heap
page read and write
B44000
heap
page read and write
5140000
direct allocation
page execute and read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
127B000
unkown
page execute and read and write
5130000
direct allocation
page execute and read and write
4B61000
heap
page read and write
B44000
heap
page read and write
1D36D000
stack
page read and write
3C9E000
stack
page read and write
B44000
heap
page read and write
B44000
heap
page read and write
15D0000
direct allocation
page read and write
42DE000
stack
page read and write
4B5F000
stack
page read and write
12B6000
unkown
page execute and write copy
4B61000
heap
page read and write
B44000
heap
page read and write
15D0000
direct allocation
page read and write
100A000
unkown
page execute and read and write
4B61000
heap
page read and write
389F000
stack
page read and write
101E000
unkown
page execute and read and write
A20000
heap
page read and write
B8E000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
1608000
heap
page read and write
43DF000
stack
page read and write
DC0000
unkown
page readonly
D20000
heap
page read and write
B44000
heap
page read and write
B44000
heap
page read and write
351E000
stack
page read and write
B44000
heap
page read and write
B44000
heap
page read and write
4B70000
heap
page read and write
365E000
stack
page read and write
5120000
direct allocation
page execute and read and write
15D0000
direct allocation
page read and write
4B61000
heap
page read and write
339F000
stack
page read and write
4A1F000
stack
page read and write
4B61000
heap
page read and write
E71000
unkown
page execute and read and write
329F000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
158E000
stack
page read and write
1D09F000
stack
page read and write
4FC0000
heap
page read and write
501E000
stack
page read and write
1678000
heap
page read and write
479F000
stack
page read and write
DC0000
unkown
page read and write
39DF000
stack
page read and write
15D0000
direct allocation
page read and write
DC1000
unkown
page execute and write copy
4B61000
heap
page read and write
B44000
heap
page read and write
33DE000
stack
page read and write
401F000
stack
page read and write
B44000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
B44000
heap
page read and write
455E000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
B44000
heap
page read and write
B44000
heap
page read and write
4B61000
heap
page read and write
B44000
heap
page read and write
1686000
heap
page read and write
12B5000
unkown
page execute and write copy
4B61000
heap
page read and write
34DF000
stack
page read and write
3B5E000
stack
page read and write
4B61000
heap
page read and write
1D5AC000
stack
page read and write
4B61000
heap
page read and write
3A1E000
stack
page read and write
4B64000
heap
page read and write
4B61000
heap
page read and write
3F1E000
stack
page read and write
15D0000
direct allocation
page read and write
451F000
stack
page read and write
4B61000
heap
page read and write
B44000
heap
page read and write
1659000
heap
page read and write
48DF000
stack
page read and write
1D1DE000
stack
page read and write
3D9F000
stack
page read and write
4B61000
heap
page read and write
5150000
direct allocation
page execute and read and write
11A1000
unkown
page execute and read and write
4B61000
heap
page read and write
15CE000
stack
page read and write
5180000
direct allocation
page execute and read and write
1667000
heap
page read and write
4B61000
heap
page read and write
15D0000
direct allocation
page read and write
12A6000
unkown
page execute and read and write
CCE000
stack
page read and write
B44000
heap
page read and write
5160000
direct allocation
page execute and read and write
B44000
heap
page read and write
2F9F000
stack
page read and write
D6C000
stack
page read and write
1699000
heap
page read and write
There are 222 hidden memdumps, click here to show them.