IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/n
unknown
http://185.215.113.37/I~
unknown
http://185.215.113.37/e2b1563c6670f193.php2
unknown
http://185.215.113.37/e2b1563c6670f193.phpd
unknown
http://185.215.113.37/e2b1563c6670f193.phpo?
unknown
http://185.215.113.37/e2b1563c6670f193.phpW
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
52E0000
direct allocation
page read and write
malicious
15CE000
heap
page read and write
malicious
941000
unkown
page execute and read and write
malicious
4E61000
heap
page read and write
445F000
stack
page read and write
4E61000
heap
page read and write
30F0000
direct allocation
page read and write
395E000
stack
page read and write
1454000
heap
page read and write
A22000
unkown
page execute and read and write
30F0000
direct allocation
page read and write
4E61000
heap
page read and write
4E60000
heap
page read and write
15C0000
heap
page read and write
4E61000
heap
page read and write
345E000
stack
page read and write
4E61000
heap
page read and write
1454000
heap
page read and write
1D95E000
stack
page read and write
1454000
heap
page read and write
4BDF000
stack
page read and write
52E0000
direct allocation
page read and write
1454000
heap
page read and write
4E61000
heap
page read and write
E2C000
unkown
page execute and read and write
1454000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
13C0000
heap
page read and write
4E61000
heap
page read and write
1645000
heap
page read and write
15BE000
stack
page read and write
1D16E000
stack
page read and write
1454000
heap
page read and write
4E61000
heap
page read and write
B9E000
unkown
page execute and read and write
449E000
stack
page read and write
1454000
heap
page read and write
1454000
heap
page read and write
FD3000
unkown
page execute and read and write
30DE000
stack
page read and write
4E61000
heap
page read and write
4E5F000
stack
page read and write
30F0000
direct allocation
page read and write
331F000
stack
page read and write
1454000
heap
page read and write
1612000
heap
page read and write
1454000
heap
page read and write
4E61000
heap
page read and write
36DE000
stack
page read and write
3B9F000
stack
page read and write
4D1F000
stack
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
5460000
direct allocation
page execute and read and write
3E5E000
stack
page read and write
1D67D000
stack
page read and write
41DF000
stack
page read and write
1628000
heap
page read and write
4E61000
heap
page read and write
1454000
heap
page read and write
940000
unkown
page read and write
4E61000
heap
page read and write
1454000
heap
page read and write
1454000
heap
page read and write
1454000
heap
page read and write
1D3EE000
stack
page read and write
941000
unkown
page execute and write copy
4E61000
heap
page read and write
1DA60000
heap
page read and write
46DF000
stack
page read and write
459E000
stack
page read and write
3CDF000
stack
page read and write
3BDE000
stack
page read and write
4E61000
heap
page read and write
1D52E000
stack
page read and write
4E61000
heap
page read and write
485E000
stack
page read and write
1454000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
309E000
stack
page read and write
1DA5E000
stack
page read and write
1454000
heap
page read and write
30F0000
direct allocation
page read and write
3110000
heap
page read and write
481F000
stack
page read and write
4E61000
heap
page read and write
3A9E000
stack
page read and write
4E61000
heap
page read and write
940000
unkown
page readonly
30F0000
direct allocation
page read and write
1454000
heap
page read and write
1454000
heap
page read and write
409F000
stack
page read and write
E3A000
unkown
page execute and read and write
1454000
heap
page read and write
1D8BE000
stack
page read and write
4E61000
heap
page read and write
30F0000
direct allocation
page read and write
30F0000
direct allocation
page read and write
4E61000
heap
page read and write
359E000
stack
page read and write
1454000
heap
page read and write
381E000
stack
page read and write
4E61000
heap
page read and write
1D2AE000
stack
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
5480000
direct allocation
page execute and read and write
3D1E000
stack
page read and write
9FD000
unkown
page execute and read and write
18BE000
stack
page read and write
13D0000
heap
page read and write
E01000
unkown
page execute and read and write
D20000
unkown
page execute and read and write
1450000
heap
page read and write
1454000
heap
page read and write
1454000
heap
page read and write
321F000
stack
page read and write
126C000
stack
page read and write
1454000
heap
page read and write
4E61000
heap
page read and write
1454000
heap
page read and write
1454000
heap
page read and write
1D77C000
stack
page read and write
4E70000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
1D4EF000
stack
page read and write
5460000
direct allocation
page execute and read and write
5490000
direct allocation
page execute and read and write
143E000
stack
page read and write
369F000
stack
page read and write
471E000
stack
page read and write
3F5F000
stack
page read and write
1365000
stack
page read and write
4E61000
heap
page read and write
4E80000
heap
page read and write
5440000
direct allocation
page execute and read and write
4E61000
heap
page read and write
1454000
heap
page read and write
3A5F000
stack
page read and write
1454000
heap
page read and write
531E000
stack
page read and write
391F000
stack
page read and write
1454000
heap
page read and write
1454000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
1454000
heap
page read and write
17BE000
stack
page read and write
30F0000
direct allocation
page read and write
1D7BD000
stack
page read and write
52C0000
heap
page read and write
311B000
heap
page read and write
15CA000
heap
page read and write
4ADE000
stack
page read and write
1454000
heap
page read and write
30F0000
direct allocation
page read and write
3E1F000
stack
page read and write
4E61000
heap
page read and write
495F000
stack
page read and write
1454000
heap
page read and write
4E61000
heap
page read and write
156E000
stack
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
40DE000
stack
page read and write
1615000
heap
page read and write
37DF000
stack
page read and write
4C1E000
stack
page read and write
5430000
direct allocation
page execute and read and write
1454000
heap
page read and write
4D5E000
stack
page read and write
136E000
stack
page read and write
1D26F000
stack
page read and write
1454000
heap
page read and write
B8A000
unkown
page execute and read and write
435E000
stack
page read and write
4F60000
trusted library allocation
page read and write
541F000
stack
page read and write
FD4000
unkown
page execute and write copy
1454000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
30F0000
direct allocation
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
E3A000
unkown
page execute and write copy
421E000
stack
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
30F0000
direct allocation
page read and write
4E61000
heap
page read and write
355F000
stack
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
1D62F000
stack
page read and write
E3B000
unkown
page execute and write copy
4E61000
heap
page read and write
431F000
stack
page read and write
4A9F000
stack
page read and write
341F000
stack
page read and write
30F0000
direct allocation
page read and write
E23000
unkown
page execute and read and write
1D3AF000
stack
page read and write
9F1000
unkown
page execute and read and write
1454000
heap
page read and write
3F9E000
stack
page read and write
5470000
direct allocation
page execute and read and write
45DE000
stack
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
52E0000
direct allocation
page read and write
4E61000
heap
page read and write
5450000
direct allocation
page execute and read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
30F0000
direct allocation
page read and write
3117000
heap
page read and write
1454000
heap
page read and write
30F0000
direct allocation
page read and write
30E0000
heap
page read and write
499E000
stack
page read and write
4E61000
heap
page read and write
There are 221 hidden memdumps, click here to show them.