IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php_
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4EF0000
direct allocation
page read and write
malicious
921000
unkown
page execute and read and write
malicious
103E000
heap
page read and write
malicious
11A4000
heap
page read and write
38EF000
stack
page read and write
3CEE000
stack
page read and write
4A71000
heap
page read and write
42EF000
stack
page read and write
1180000
direct allocation
page read and write
11A4000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
9D1000
unkown
page execute and read and write
2DEB000
heap
page read and write
4A71000
heap
page read and write
11A4000
heap
page read and write
2EEF000
stack
page read and write
342E000
stack
page read and write
3DEF000
stack
page read and write
E0A000
unkown
page execute and read and write
11A4000
heap
page read and write
4A71000
heap
page read and write
496E000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
45AE000
stack
page read and write
4A71000
heap
page read and write
456F000
stack
page read and write
11A4000
heap
page read and write
47EF000
stack
page read and write
1180000
direct allocation
page read and write
1CFFE000
stack
page read and write
1030000
heap
page read and write
5070000
direct allocation
page execute and read and write
11A4000
heap
page read and write
4A71000
heap
page read and write
1D24F000
stack
page read and write
1D28D000
stack
page read and write
4A80000
heap
page read and write
4A71000
heap
page read and write
13BE000
stack
page read and write
4EF0000
direct allocation
page read and write
E19000
unkown
page execute and read and write
33EF000
stack
page read and write
4EB0000
trusted library allocation
page read and write
4A71000
heap
page read and write
392E000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
492F000
stack
page read and write
11A4000
heap
page read and write
5050000
direct allocation
page execute and read and write
4A71000
heap
page read and write
37EE000
stack
page read and write
2D9F000
stack
page read and write
4A71000
heap
page read and write
31AE000
stack
page read and write
2DE0000
heap
page read and write
3E2E000
stack
page read and write
4A71000
heap
page read and write
11A4000
heap
page read and write
3F2F000
stack
page read and write
4A71000
heap
page read and write
4A75000
heap
page read and write
DDE000
unkown
page execute and read and write
11A4000
heap
page read and write
4A71000
heap
page read and write
11A4000
heap
page read and write
11A4000
heap
page read and write
3BAE000
stack
page read and write
4A71000
heap
page read and write
E1A000
unkown
page execute and write copy
E19000
unkown
page execute and write copy
1CE7F000
stack
page read and write
5040000
direct allocation
page execute and read and write
921000
unkown
page execute and write copy
920000
unkown
page read and write
1D0FF000
stack
page read and write
4A71000
heap
page read and write
1CEBE000
stack
page read and write
4A71000
heap
page read and write
1180000
direct allocation
page read and write
1D14E000
stack
page read and write
1CFBF000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
5070000
direct allocation
page execute and read and write
316F000
stack
page read and write
1082000
heap
page read and write
3B6F000
stack
page read and write
B6A000
unkown
page execute and read and write
1180000
direct allocation
page read and write
4A71000
heap
page read and write
432E000
stack
page read and write
8F5000
stack
page read and write
502F000
stack
page read and write
FE0000
heap
page read and write
1180000
direct allocation
page read and write
11A4000
heap
page read and write
1180000
direct allocation
page read and write
4ED0000
heap
page read and write
109B000
heap
page read and write
1180000
direct allocation
page read and write
46EE000
stack
page read and write
4A71000
heap
page read and write
4F2E000
stack
page read and write
4A71000
heap
page read and write
2F2E000
stack
page read and write
4A71000
heap
page read and write
3F6E000
stack
page read and write
11A4000
heap
page read and write
11A4000
heap
page read and write
11A4000
heap
page read and write
E03000
unkown
page execute and read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
5060000
direct allocation
page execute and read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
11A4000
heap
page read and write
FB6000
unkown
page execute and read and write
4A71000
heap
page read and write
356E000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
1180000
direct allocation
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
11A4000
heap
page read and write
11A4000
heap
page read and write
1180000
direct allocation
page read and write
4A71000
heap
page read and write
8FE000
stack
page read and write
11A4000
heap
page read and write
4A71000
heap
page read and write
1180000
direct allocation
page read and write
32EE000
stack
page read and write
4A90000
heap
page read and write
11A4000
heap
page read and write
446E000
stack
page read and write
3CAF000
stack
page read and write
4A70000
heap
page read and write
137E000
stack
page read and write
4A71000
heap
page read and write
36AE000
stack
page read and write
4A71000
heap
page read and write
103A000
heap
page read and write
4A71000
heap
page read and write
2DE7000
heap
page read and write
366F000
stack
page read and write
4A71000
heap
page read and write
306E000
stack
page read and write
4A6F000
stack
page read and write
11A4000
heap
page read and write
11A4000
heap
page read and write
FD0000
heap
page read and write
11A4000
heap
page read and write
4A71000
heap
page read and write
11A4000
heap
page read and write
4A71000
heap
page read and write
482E000
stack
page read and write
11A4000
heap
page read and write
50A0000
direct allocation
page execute and read and write
11A4000
heap
page read and write
14BE000
stack
page read and write
3A6E000
stack
page read and write
4A71000
heap
page read and write
46AF000
stack
page read and write
1180000
direct allocation
page read and write
116E000
stack
page read and write
9DD000
unkown
page execute and read and write
11A0000
heap
page read and write
1180000
direct allocation
page read and write
11A4000
heap
page read and write
11A4000
heap
page read and write
1D38E000
stack
page read and write
4A71000
heap
page read and write
11A4000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
5DC000
stack
page read and write
5080000
direct allocation
page execute and read and write
11A4000
heap
page read and write
4A71000
heap
page read and write
1CD7E000
stack
page read and write
10B5000
heap
page read and write
302F000
stack
page read and write
11A4000
heap
page read and write
4A71000
heap
page read and write
406F000
stack
page read and write
4A71000
heap
page read and write
3A2F000
stack
page read and write
1180000
direct allocation
page read and write
32AF000
stack
page read and write
1D4CC000
stack
page read and write
1D3CD000
stack
page read and write
2DDC000
stack
page read and write
1170000
heap
page read and write
40AE000
stack
page read and write
1180000
direct allocation
page read and write
4A71000
heap
page read and write
2C9E000
stack
page read and write
11A4000
heap
page read and write
37AF000
stack
page read and write
11A4000
heap
page read and write
920000
unkown
page readonly
11A4000
heap
page read and write
4A71000
heap
page read and write
11A4000
heap
page read and write
4A71000
heap
page read and write
1085000
heap
page read and write
4EF0000
direct allocation
page read and write
5090000
direct allocation
page execute and read and write
4A71000
heap
page read and write
11A4000
heap
page read and write
352F000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
41EE000
stack
page read and write
FB7000
unkown
page execute and write copy
4A71000
heap
page read and write
B7E000
unkown
page execute and read and write
CFA000
unkown
page execute and read and write
11A4000
heap
page read and write
A02000
unkown
page execute and read and write
4A71000
heap
page read and write
442F000
stack
page read and write
41AF000
stack
page read and write
There are 221 hidden memdumps, click here to show them.