IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php;
unknown
http://185.215.113.37/e2b1563c6670f193.phpK
unknown
http://185.215.113.37/e2b1563c6670f193.phpXN
unknown
http://185.215.113.37/e2b1563c6670f193.php/
unknown
http://185.215.113.37/ws
unknown
http://185.215.113.37/e2b1563c6670f193.phpw
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5610000
direct allocation
page read and write
malicious
C31000
unkown
page execute and read and write
malicious
19BE000
heap
page read and write
malicious
CE1000
unkown
page execute and read and write
17B4000
heap
page read and write
C30000
unkown
page readonly
E8E000
unkown
page execute and read and write
418E000
stack
page read and write
17B4000
heap
page read and write
3DCE000
stack
page read and write
1990000
direct allocation
page read and write
1D92F000
stack
page read and write
5191000
heap
page read and write
1A29000
heap
page read and write
5191000
heap
page read and write
1BAF000
stack
page read and write
19FF000
heap
page read and write
1DABD000
stack
page read and write
17B4000
heap
page read and write
C30000
unkown
page read and write
1DD62000
heap
page read and write
43CF000
stack
page read and write
55D0000
heap
page read and write
5191000
heap
page read and write
4E0E000
stack
page read and write
5191000
heap
page read and write
17B4000
heap
page read and write
10F7000
unkown
page execute and read and write
404E000
stack
page read and write
518F000
stack
page read and write
5770000
direct allocation
page execute and read and write
450F000
stack
page read and write
400F000
stack
page read and write
464F000
stack
page read and write
4B8E000
stack
page read and write
4F4E000
stack
page read and write
3A0E000
stack
page read and write
1A02000
heap
page read and write
17B4000
heap
page read and write
5191000
heap
page read and write
17B4000
heap
page read and write
564E000
stack
page read and write
5191000
heap
page read and write
17B4000
heap
page read and write
17B4000
heap
page read and write
12D3000
unkown
page execute and read and write
51B0000
heap
page read and write
3487000
heap
page read and write
468E000
stack
page read and write
17B4000
heap
page read and write
39CF000
stack
page read and write
1990000
direct allocation
page read and write
1DA7C000
stack
page read and write
5191000
heap
page read and write
5191000
heap
page read and write
4C8F000
stack
page read and write
17B4000
heap
page read and write
3460000
direct allocation
page execute and read and write
1A34000
heap
page read and write
4A4E000
stack
page read and write
3D8F000
stack
page read and write
5191000
heap
page read and write
5191000
heap
page read and write
3470000
direct allocation
page execute and read and write
1D56F000
stack
page read and write
5198000
heap
page read and write
17B4000
heap
page read and write
48CF000
stack
page read and write
388F000
stack
page read and write
1990000
direct allocation
page read and write
1990000
direct allocation
page read and write
1D97D000
stack
page read and write
173E000
stack
page read and write
5191000
heap
page read and write
17B4000
heap
page read and write
1990000
direct allocation
page read and write
17B4000
heap
page read and write
5191000
heap
page read and write
17B4000
heap
page read and write
17B4000
heap
page read and write
16F5000
stack
page read and write
5191000
heap
page read and write
12D4000
unkown
page execute and write copy
5191000
heap
page read and write
D12000
unkown
page execute and read and write
17B4000
heap
page read and write
5191000
heap
page read and write
5760000
direct allocation
page execute and read and write
358F000
stack
page read and write
17B4000
heap
page read and write
5191000
heap
page read and write
5191000
heap
page read and write
17B4000
heap
page read and write
17B4000
heap
page read and write
5760000
direct allocation
page execute and read and write
440E000
stack
page read and write
5191000
heap
page read and write
5191000
heap
page read and write
5191000
heap
page read and write
1DC5E000
stack
page read and write
5191000
heap
page read and write
5750000
direct allocation
page execute and read and write
574F000
stack
page read and write
5191000
heap
page read and write
19BA000
heap
page read and write
4A0F000
stack
page read and write
5191000
heap
page read and write
17B4000
heap
page read and write
17B4000
heap
page read and write
5191000
heap
page read and write
5190000
heap
page read and write
16FF000
stack
page read and write
3C4F000
stack
page read and write
5191000
heap
page read and write
1990000
direct allocation
page read and write
3480000
heap
page read and write
5191000
heap
page read and write
508E000
stack
page read and write
4F0F000
stack
page read and write
136C000
stack
page read and write
17B4000
heap
page read and write
1DBBE000
stack
page read and write
5790000
direct allocation
page execute and read and write
1D6AF000
stack
page read and write
17B4000
heap
page read and write
5191000
heap
page read and write
5191000
heap
page read and write
C31000
unkown
page execute and write copy
3ECF000
stack
page read and write
177E000
stack
page read and write
5191000
heap
page read and write
5191000
heap
page read and write
5191000
heap
page read and write
1133000
unkown
page execute and write copy
17B4000
heap
page read and write
17B4000
heap
page read and write
1990000
direct allocation
page read and write
1D82E000
stack
page read and write
1134000
unkown
page execute and write copy
5191000
heap
page read and write
5191000
heap
page read and write
1133000
unkown
page execute and read and write
340E000
stack
page read and write
47CD000
stack
page read and write
19B0000
heap
page read and write
478F000
stack
page read and write
5191000
heap
page read and write
5191000
heap
page read and write
5191000
heap
page read and write
1D6EE000
stack
page read and write
5191000
heap
page read and write
1D7EF000
stack
page read and write
17B4000
heap
page read and write
1D46E000
stack
page read and write
17B4000
heap
page read and write
17B0000
heap
page read and write
5191000
heap
page read and write
1990000
direct allocation
page read and write
5191000
heap
page read and write
5191000
heap
page read and write
17B4000
heap
page read and write
3C8E000
stack
page read and write
17A0000
heap
page read and write
5191000
heap
page read and write
13D0000
heap
page read and write
3B4E000
stack
page read and write
3450000
direct allocation
page read and write
5191000
heap
page read and write
3F0E000
stack
page read and write
5191000
heap
page read and write
17B4000
heap
page read and write
5191000
heap
page read and write
17B4000
heap
page read and write
1990000
direct allocation
page read and write
1DD5F000
stack
page read and write
5191000
heap
page read and write
414F000
stack
page read and write
51A0000
heap
page read and write
344E000
stack
page read and write
5191000
heap
page read and write
5191000
heap
page read and write
1990000
direct allocation
page read and write
1DD60000
heap
page read and write
1A44000
heap
page read and write
33CC000
stack
page read and write
55D0000
trusted library allocation
page read and write
17B4000
heap
page read and write
17B4000
heap
page read and write
5191000
heap
page read and write
1990000
direct allocation
page read and write
1990000
direct allocation
page read and write
5191000
heap
page read and write
5191000
heap
page read and write
428F000
stack
page read and write
1D5AE000
stack
page read and write
5191000
heap
page read and write
198F000
stack
page read and write
368F000
stack
page read and write
1125000
unkown
page execute and read and write
5191000
heap
page read and write
101E000
unkown
page execute and read and write
378F000
stack
page read and write
38CE000
stack
page read and write
1990000
direct allocation
page read and write
17B4000
heap
page read and write
17B4000
heap
page read and write
1990000
direct allocation
page read and write
504F000
stack
page read and write
13C0000
heap
page read and write
1A19000
heap
page read and write
CED000
unkown
page execute and read and write
3450000
direct allocation
page read and write
5191000
heap
page read and write
42CE000
stack
page read and write
454E000
stack
page read and write
111A000
unkown
page execute and read and write
5191000
heap
page read and write
1A26000
heap
page read and write
17B4000
heap
page read and write
E7A000
unkown
page execute and read and write
4B4F000
stack
page read and write
5191000
heap
page read and write
4CCE000
stack
page read and write
17B4000
heap
page read and write
5191000
heap
page read and write
5191000
heap
page read and write
5780000
direct allocation
page execute and read and write
490E000
stack
page read and write
4DCF000
stack
page read and write
5191000
heap
page read and write
5191000
heap
page read and write
348B000
heap
page read and write
17B4000
heap
page read and write
3B0F000
stack
page read and write
338E000
stack
page read and write
There are 225 hidden memdumps, click here to show them.