IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/?
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpR
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpb
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php1
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
126E000
heap
page read and write
malicious
4FF0000
direct allocation
page read and write
malicious
401000
unkown
page execute and read and write
malicious
1D0AF000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4B50000
direct allocation
page read and write
1CF6F000
stack
page read and write
2F0B000
heap
page read and write
3B4E000
stack
page read and write
11D4000
heap
page read and write
145E000
stack
page read and write
11D4000
heap
page read and write
5170000
direct allocation
page execute and read and write
11D4000
heap
page read and write
4B61000
heap
page read and write
12E3000
heap
page read and write
4B61000
heap
page read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
404E000
stack
page read and write
360F000
stack
page read and write
D7C000
stack
page read and write
4B61000
heap
page read and write
4B1000
unkown
page execute and read and write
400000
unkown
page readonly
AA9000
unkown
page execute and read and write
4B50000
direct allocation
page read and write
11D4000
heap
page read and write
428F000
stack
page read and write
388F000
stack
page read and write
1250000
heap
page read and write
4B50000
direct allocation
page read and write
4B61000
heap
page read and write
1CE6E000
stack
page read and write
400F000
stack
page read and write
4B61000
heap
page read and write
310F000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
490E000
stack
page read and write
3ECF000
stack
page read and write
414F000
stack
page read and write
4B50000
direct allocation
page read and write
11D4000
heap
page read and write
47CE000
stack
page read and write
3B0F000
stack
page read and write
4B61000
heap
page read and write
11D4000
heap
page read and write
39CF000
stack
page read and write
328E000
stack
page read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
4B61000
heap
page read and write
907000
unkown
page execute and read and write
4B70000
heap
page read and write
1D37D000
stack
page read and write
4B61000
heap
page read and write
126A000
heap
page read and write
5140000
direct allocation
page execute and read and write
4B50000
direct allocation
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
159F000
stack
page read and write
450F000
stack
page read and write
5150000
direct allocation
page execute and read and write
4B61000
heap
page read and write
4FF0000
direct allocation
page read and write
34CF000
stack
page read and write
11D4000
heap
page read and write
5180000
direct allocation
page execute and read and write
4B61000
heap
page read and write
3DCE000
stack
page read and write
43CF000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
1D65E000
stack
page read and write
4B61000
heap
page read and write
1D75F000
stack
page read and write
3C4F000
stack
page read and write
11D4000
heap
page read and write
DE0000
heap
page read and write
338F000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
468E000
stack
page read and write
4B61000
heap
page read and write
11D4000
heap
page read and write
4B80000
heap
page read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
4B61000
heap
page read and write
314E000
stack
page read and write
364E000
stack
page read and write
1D5BC000
stack
page read and write
464F000
stack
page read and write
11D4000
heap
page read and write
4B60000
heap
page read and write
502E000
stack
page read and write
8F9000
unkown
page execute and read and write
11D4000
heap
page read and write
4B61000
heap
page read and write
400000
unkown
page read and write
2E7F000
stack
page read and write
4BD000
unkown
page execute and read and write
149E000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
418D000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
8F1000
unkown
page execute and read and write
4B61000
heap
page read and write
11D4000
heap
page read and write
4B61000
heap
page read and write
11D0000
heap
page read and write
11D4000
heap
page read and write
2F00000
heap
page read and write
3F0E000
stack
page read and write
65E000
unkown
page execute and read and write
4B50000
direct allocation
page read and write
11D4000
heap
page read and write
10FE000
stack
page read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
4B61000
heap
page read and write
1D1EF000
stack
page read and write
4B61000
heap
page read and write
2EBC000
stack
page read and write
4B61000
heap
page read and write
4FD0000
heap
page read and write
12AE000
heap
page read and write
4B50000
direct allocation
page read and write
4B50000
direct allocation
page read and write
11D4000
heap
page read and write
4B50000
direct allocation
page read and write
64A000
unkown
page execute and read and write
4B61000
heap
page read and write
1D760000
heap
page read and write
1D4BD000
stack
page read and write
2D7E000
stack
page read and write
11D4000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
5170000
direct allocation
page execute and read and write
350E000
stack
page read and write
4B50000
direct allocation
page read and write
4B4F000
stack
page read and write
4B61000
heap
page read and write
11D4000
heap
page read and write
401000
unkown
page execute and write copy
38CE000
stack
page read and write
48CF000
stack
page read and write
4B61000
heap
page read and write
5190000
direct allocation
page execute and read and write
11D4000
heap
page read and write
324F000
stack
page read and write
907000
unkown
page execute and write copy
2F07000
heap
page read and write
4B50000
direct allocation
page read and write
4B61000
heap
page read and write
4B50000
direct allocation
page read and write
4A4E000
stack
page read and write
1D0EE000
stack
page read and write
AAA000
unkown
page execute and write copy
11D4000
heap
page read and write
4B61000
heap
page read and write
11D4000
heap
page read and write
4B61000
heap
page read and write
4FA0000
trusted library allocation
page read and write
4B61000
heap
page read and write
12B3000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
440E000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
3C8E000
stack
page read and write
374F000
stack
page read and write
4B50000
direct allocation
page read and write
4E2000
unkown
page execute and read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
DD0000
heap
page read and write
5160000
direct allocation
page execute and read and write
4B50000
direct allocation
page read and write
1D47E000
stack
page read and write
12B6000
heap
page read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
378E000
stack
page read and write
10F5000
stack
page read and write
1D32F000
stack
page read and write
1D22E000
stack
page read and write
12C7000
heap
page read and write
512F000
stack
page read and write
4B61000
heap
page read and write
1260000
heap
page read and write
4B61000
heap
page read and write
8CC000
unkown
page execute and read and write
4B61000
heap
page read and write
300F000
stack
page read and write
4B61000
heap
page read and write
2EFE000
stack
page read and write
3D8F000
stack
page read and write
478F000
stack
page read and write
4A0F000
stack
page read and write
11D4000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
122D000
stack
page read and write
11D4000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
11D4000
heap
page read and write
908000
unkown
page execute and write copy
11D4000
heap
page read and write
4B61000
heap
page read and write
7E9000
unkown
page execute and read and write
33CE000
stack
page read and write
42CE000
stack
page read and write
3A0E000
stack
page read and write
4B61000
heap
page read and write
1CFAE000
stack
page read and write
454E000
stack
page read and write
4FF0000
direct allocation
page read and write
4B61000
heap
page read and write
There are 220 hidden memdumps, click here to show them.