IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpo
unknown
http://185.215.113.37/e2b1563c6670f193.phpT
unknown
http://185.215.113.37/ws
unknown
http://185.215.113.37/e2b1563c6670f193.php8
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
8DE000
heap
page read and write
malicious
E11000
unkown
page execute and read and write
malicious
4E20000
direct allocation
page read and write
malicious
884000
heap
page read and write
49A1000
heap
page read and write
1CF2E000
stack
page read and write
49A1000
heap
page read and write
850000
heap
page read and write
884000
heap
page read and write
884000
heap
page read and write
884000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
399E000
stack
page read and write
884000
heap
page read and write
49A1000
heap
page read and write
1312000
unkown
page execute and read and write
DE0000
direct allocation
page read and write
884000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
EF2000
unkown
page execute and read and write
3BDF000
stack
page read and write
49A1000
heap
page read and write
884000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
3F9F000
stack
page read and write
884000
heap
page read and write
44DE000
stack
page read and write
884000
heap
page read and write
14B2000
unkown
page execute and write copy
49A1000
heap
page read and write
880000
heap
page read and write
884000
heap
page read and write
884000
heap
page read and write
1CDAF000
stack
page read and write
105A000
unkown
page execute and read and write
49A1000
heap
page read and write
345F000
stack
page read and write
DE0000
direct allocation
page read and write
884000
heap
page read and write
475E000
stack
page read and write
3ADE000
stack
page read and write
49A1000
heap
page read and write
884000
heap
page read and write
49A1000
heap
page read and write
884000
heap
page read and write
49A1000
heap
page read and write
DDE000
stack
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
11FC000
unkown
page execute and read and write
49A1000
heap
page read and write
939000
heap
page read and write
DE0000
direct allocation
page read and write
1D2FE000
stack
page read and write
49A1000
heap
page read and write
884000
heap
page read and write
884000
heap
page read and write
12FA000
unkown
page execute and read and write
884000
heap
page read and write
D1E000
stack
page read and write
49A1000
heap
page read and write
884000
heap
page read and write
2F9E000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
884000
heap
page read and write
3C1E000
stack
page read and write
49A1000
heap
page read and write
ADE000
stack
page read and write
449F000
stack
page read and write
49A1000
heap
page read and write
335E000
stack
page read and write
BDE000
stack
page read and write
4F5F000
stack
page read and write
3E5F000
stack
page read and write
4FB0000
direct allocation
page execute and read and write
439E000
stack
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
DE0000
direct allocation
page read and write
49A1000
heap
page read and write
1CCAE000
stack
page read and write
91C000
heap
page read and write
C1E000
stack
page read and write
371E000
stack
page read and write
30DE000
stack
page read and write
36DF000
stack
page read and write
49A5000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
411E000
stack
page read and write
385E000
stack
page read and write
425E000
stack
page read and write
1312000
unkown
page execute and write copy
1D17F000
stack
page read and write
922000
heap
page read and write
884000
heap
page read and write
321E000
stack
page read and write
49A1000
heap
page read and write
309F000
stack
page read and write
49A1000
heap
page read and write
884000
heap
page read and write
2F5F000
stack
page read and write
49A1000
heap
page read and write
884000
heap
page read and write
49A1000
heap
page read and write
884000
heap
page read and write
395F000
stack
page read and write
955000
heap
page read and write
884000
heap
page read and write
1CDEE000
stack
page read and write
1313000
unkown
page execute and write copy
884000
heap
page read and write
D9B000
stack
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
4E20000
direct allocation
page read and write
8D0000
heap
page read and write
49A1000
heap
page read and write
49C0000
heap
page read and write
3D1F000
stack
page read and write
EC1000
unkown
page execute and read and write
3E9E000
stack
page read and write
860000
heap
page read and write
331F000
stack
page read and write
1CEEF000
stack
page read and write
49A1000
heap
page read and write
DE0000
direct allocation
page read and write
49A1000
heap
page read and write
942000
heap
page read and write
1304000
unkown
page execute and read and write
49A1000
heap
page read and write
31DF000
stack
page read and write
49A0000
heap
page read and write
421F000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
884000
heap
page read and write
D5E000
stack
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
ECD000
unkown
page execute and read and write
12D8000
unkown
page execute and read and write
49A1000
heap
page read and write
884000
heap
page read and write
1D3FC000
stack
page read and write
1D2BE000
stack
page read and write
4F70000
direct allocation
page execute and read and write
884000
heap
page read and write
884000
heap
page read and write
471F000
stack
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
4FC000
stack
page read and write
1D07E000
stack
page read and write
3FDD000
stack
page read and write
359F000
stack
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
461E000
stack
page read and write
5F5000
stack
page read and write
349E000
stack
page read and write
40DF000
stack
page read and write
49A1000
heap
page read and write
8DA000
heap
page read and write
3A9F000
stack
page read and write
927000
heap
page read and write
DFB000
heap
page read and write
884000
heap
page read and write
489E000
stack
page read and write
DE0000
direct allocation
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
8C0000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
E11000
unkown
page execute and write copy
E10000
unkown
page readonly
DF7000
heap
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
E10000
unkown
page read and write
884000
heap
page read and write
DE0000
direct allocation
page read and write
49A1000
heap
page read and write
4E20000
direct allocation
page read and write
1D02E000
stack
page read and write
49B0000
heap
page read and write
4F80000
direct allocation
page execute and read and write
3D5E000
stack
page read and write
14B1000
unkown
page execute and read and write
49A1000
heap
page read and write
884000
heap
page read and write
DE0000
direct allocation
page read and write
49A1000
heap
page read and write
DE0000
direct allocation
page read and write
DE0000
direct allocation
page read and write
DF0000
heap
page read and write
49A1000
heap
page read and write
DE0000
direct allocation
page read and write
884000
heap
page read and write
DE0000
direct allocation
page read and write
2D5F000
stack
page read and write
49A1000
heap
page read and write
381F000
stack
page read and write
884000
heap
page read and write
485F000
stack
page read and write
49A1000
heap
page read and write
49A1000
heap
page read and write
2E5F000
stack
page read and write
4AA0000
trusted library allocation
page read and write
DE0000
direct allocation
page read and write
884000
heap
page read and write
49A1000
heap
page read and write
45DF000
stack
page read and write
5FF000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
4FC0000
direct allocation
page execute and read and write
884000
heap
page read and write
106E000
unkown
page execute and read and write
DE0000
direct allocation
page read and write
35DE000
stack
page read and write
499F000
stack
page read and write
884000
heap
page read and write
4F90000
direct allocation
page execute and read and write
4E00000
heap
page read and write
1D1BD000
stack
page read and write
435F000
stack
page read and write
4E5E000
stack
page read and write
49A1000
heap
page read and write
There are 224 hidden memdumps, click here to show them.