IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php.
unknown
http://185.215.113.37p
unknown
http://185.215.113.37/6t
unknown
http://185.215.113.37/e2b1563c6670f193.phpZ
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
EC1000
unkown
page execute and read and write
malicious
1B6E000
heap
page read and write
malicious
5650000
direct allocation
page read and write
malicious
405E000
stack
page read and write
455E000
stack
page read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
1D6DF000
stack
page read and write
15FE000
stack
page read and write
5800000
direct allocation
page execute and read and write
57E0000
direct allocation
page execute and read and write
1BC6000
heap
page read and write
13C0000
unkown
page execute and read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
3680000
direct allocation
page read and write
1D9CD000
stack
page read and write
51D2000
heap
page read and write
1BE1000
heap
page read and write
3EDF000
stack
page read and write
57D0000
direct allocation
page execute and read and write
4CDE000
stack
page read and write
51C1000
heap
page read and write
4B9E000
stack
page read and write
51C1000
heap
page read and write
190E000
stack
page read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
1D5F000
stack
page read and write
51C1000
heap
page read and write
1DDB0000
heap
page read and write
51C1000
heap
page read and write
401F000
stack
page read and write
1D97F000
stack
page read and write
51C1000
heap
page read and write
4DDF000
stack
page read and write
3680000
direct allocation
page read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
3680000
direct allocation
page read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
1BEE000
heap
page read and write
51C1000
heap
page read and write
4A5E000
stack
page read and write
3A9F000
stack
page read and write
3680000
direct allocation
page read and write
465F000
stack
page read and write
1D59F000
stack
page read and write
51C1000
heap
page read and write
F7D000
unkown
page execute and read and write
51C1000
heap
page read and write
EC0000
unkown
page readonly
578F000
stack
page read and write
110A000
unkown
page execute and read and write
1B6A000
heap
page read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
1990000
heap
page read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
198E000
stack
page read and write
42DE000
stack
page read and write
3680000
direct allocation
page read and write
3C9F000
stack
page read and write
1D87E000
stack
page read and write
419E000
stack
page read and write
3D9F000
stack
page read and write
F71000
unkown
page execute and read and write
51C1000
heap
page read and write
57D0000
direct allocation
page execute and read and write
FA2000
unkown
page execute and read and write
51C1000
heap
page read and write
111E000
unkown
page execute and read and write
1BB2000
heap
page read and write
194B000
stack
page read and write
51C1000
heap
page read and write
363E000
stack
page read and write
1574000
unkown
page execute and write copy
51C1000
heap
page read and write
57B0000
direct allocation
page execute and read and write
429F000
stack
page read and write
415F000
stack
page read and write
3DDE000
stack
page read and write
51C1000
heap
page read and write
EC0000
unkown
page read and write
35FF000
stack
page read and write
1573000
unkown
page execute and read and write
57C0000
direct allocation
page execute and read and write
3F1E000
stack
page read and write
3680000
direct allocation
page read and write
1DDAF000
stack
page read and write
51C1000
heap
page read and write
3690000
heap
page read and write
51C1000
heap
page read and write
51E0000
heap
page read and write
3680000
direct allocation
page read and write
1D71E000
stack
page read and write
51C1000
heap
page read and write
48DF000
stack
page read and write
43DF000
stack
page read and write
3B9F000
stack
page read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
479F000
stack
page read and write
51C1000
heap
page read and write
1DACD000
stack
page read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
3680000
direct allocation
page read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
509E000
stack
page read and write
DF5000
stack
page read and write
51C1000
heap
page read and write
4C9F000
stack
page read and write
1B5E000
stack
page read and write
13B8000
unkown
page execute and read and write
4E1E000
stack
page read and write
51C1000
heap
page read and write
1D81E000
stack
page read and write
57F0000
direct allocation
page execute and read and write
EB0000
heap
page read and write
51C1000
heap
page read and write
13D0000
unkown
page execute and write copy
5600000
trusted library allocation
page read and write
3680000
direct allocation
page read and write
389F000
stack
page read and write
13CF000
unkown
page execute and read and write
399F000
stack
page read and write
1B60000
heap
page read and write
369B000
heap
page read and write
51C1000
heap
page read and write
451F000
stack
page read and write
3680000
direct allocation
page read and write
51C1000
heap
page read and write
4F1F000
stack
page read and write
51C1000
heap
page read and write
379F000
stack
page read and write
441E000
stack
page read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
15BE000
stack
page read and write
1396000
unkown
page execute and read and write
519F000
stack
page read and write
568E000
stack
page read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
3697000
heap
page read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
E50000
heap
page read and write
3680000
direct allocation
page read and write
13CF000
unkown
page execute and write copy
505F000
stack
page read and write
51C1000
heap
page read and write
57A0000
direct allocation
page execute and read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
3680000
direct allocation
page read and write
51C1000
heap
page read and write
367E000
stack
page read and write
51C1000
heap
page read and write
12AF000
unkown
page execute and read and write
E60000
heap
page read and write
51A0000
heap
page read and write
47DE000
stack
page read and write
469E000
stack
page read and write
57DE000
stack
page read and write
4A1F000
stack
page read and write
491E000
stack
page read and write
4F5E000
stack
page read and write
1D5DE000
stack
page read and write
5650000
direct allocation
page read and write
51C0000
heap
page read and write
51C1000
heap
page read and write
51C1000
heap
page read and write
3680000
direct allocation
page read and write
DFE000
stack
page read and write
51C1000
heap
page read and write
EC1000
unkown
page execute and write copy
51C1000
heap
page read and write
51C1000
heap
page read and write
5650000
direct allocation
page read and write
CFC000
stack
page read and write
1995000
heap
page read and write
51C1000
heap
page read and write
1B1E000
stack
page read and write
1DB0E000
stack
page read and write
3680000
direct allocation
page read and write
51C1000
heap
page read and write
1ADE000
stack
page read and write
51C1000
heap
page read and write
4B5F000
stack
page read and write
51C1000
heap
page read and write
1DC0C000
stack
page read and write
1A9E000
stack
page read and write
1DCAE000
stack
page read and write
51C1000
heap
page read and write
51D0000
heap
page read and write
There are 196 hidden memdumps, click here to show them.