IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php)q
unknown
http://185.215.113.37/e2b1563c6670f193.phpT
unknown
http://185.215.113.37/ws
unknown
http://185.215.113.37/e2b1563c6670f193.php=qj
unknown
http://185.215.113.37s
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
711000
unkown
page execute and read and write
malicious
120E000
heap
page read and write
malicious
50B0000
direct allocation
page read and write
malicious
4B0E000
stack
page read and write
4C21000
heap
page read and write
35BE000
stack
page read and write
1D2BE000
stack
page read and write
2F3F000
stack
page read and write
31BF000
stack
page read and write
4C21000
heap
page read and write
1CF3E000
stack
page read and write
4C21000
heap
page read and write
30BE000
stack
page read and write
1D07E000
stack
page read and write
4C21000
heap
page read and write
4C10000
direct allocation
page read and write
4C21000
heap
page read and write
307F000
stack
page read and write
4C21000
heap
page read and write
357F000
stack
page read and write
11E4000
heap
page read and write
4C21000
heap
page read and write
4C21000
heap
page read and write
11E4000
heap
page read and write
40FE000
stack
page read and write
128B000
heap
page read and write
4C21000
heap
page read and write
11E4000
heap
page read and write
1200000
heap
page read and write
4C10000
direct allocation
page read and write
4C21000
heap
page read and write
4C10000
direct allocation
page read and write
4C10000
direct allocation
page read and write
4C21000
heap
page read and write
11E4000
heap
page read and write
1285000
heap
page read and write
11E4000
heap
page read and write
11E4000
heap
page read and write
45FE000
stack
page read and write
4C21000
heap
page read and write
46FF000
stack
page read and write
1208000
heap
page read and write
AF1000
unkown
page execute and read and write
4C21000
heap
page read and write
4D20000
trusted library allocation
page read and write
4C10000
direct allocation
page read and write
488E000
stack
page read and write
51EF000
stack
page read and write
DA4000
unkown
page execute and read and write
36FE000
stack
page read and write
11E4000
heap
page read and write
150E000
stack
page read and write
4C21000
heap
page read and write
4C21000
heap
page read and write
96E000
unkown
page execute and read and write
BD0000
unkown
page execute and read and write
4C21000
heap
page read and write
397E000
stack
page read and write
3A7F000
stack
page read and write
113F000
stack
page read and write
4C21000
heap
page read and write
333E000
stack
page read and write
50B0000
direct allocation
page read and write
11E4000
heap
page read and write
4C10000
direct allocation
page read and write
50EE000
stack
page read and write
1D3FF000
stack
page read and write
1D17F000
stack
page read and write
11E4000
heap
page read and write
11F7000
heap
page read and write
3F7F000
stack
page read and write
4C21000
heap
page read and write
4C21000
heap
page read and write
4C21000
heap
page read and write
4C21000
heap
page read and write
4C10000
direct allocation
page read and write
36BF000
stack
page read and write
4C21000
heap
page read and write
474E000
stack
page read and write
1D54D000
stack
page read and write
49CE000
stack
page read and write
140E000
stack
page read and write
4C21000
heap
page read and write
C09000
unkown
page execute and read and write
50B0000
direct allocation
page read and write
4C0F000
stack
page read and write
11E4000
heap
page read and write
4C10000
direct allocation
page read and write
11E4000
heap
page read and write
1D44D000
stack
page read and write
4C21000
heap
page read and write
3E7E000
stack
page read and write
11E4000
heap
page read and write
4C21000
heap
page read and write
32FF000
stack
page read and write
4C10000
direct allocation
page read and write
1D1BE000
stack
page read and write
5210000
direct allocation
page execute and read and write
11E4000
heap
page read and write
5230000
direct allocation
page execute and read and write
3CFF000
stack
page read and write
11E4000
heap
page read and write
437E000
stack
page read and write
4C21000
heap
page read and write
4C21000
heap
page read and write
4C21000
heap
page read and write
C09000
unkown
page execute and write copy
5250000
direct allocation
page execute and read and write
343F000
stack
page read and write
4C20000
heap
page read and write
2E3E000
stack
page read and write
5230000
direct allocation
page execute and read and write
11E4000
heap
page read and write
4C10000
direct allocation
page read and write
4C21000
heap
page read and write
11E4000
heap
page read and write
11E4000
heap
page read and write
11E4000
heap
page read and write
4C21000
heap
page read and write
3BFE000
stack
page read and write
40BF000
stack
page read and write
4C21000
heap
page read and write
1135000
stack
page read and write
4C21000
heap
page read and write
11E4000
heap
page read and write
1190000
heap
page read and write
154E000
stack
page read and write
711000
unkown
page execute and write copy
4C21000
heap
page read and write
31FE000
stack
page read and write
5090000
heap
page read and write
1D58D000
stack
page read and write
11E4000
heap
page read and write
7C1000
unkown
page execute and read and write
11E4000
heap
page read and write
7F2000
unkown
page execute and read and write
383E000
stack
page read and write
4C21000
heap
page read and write
164F000
stack
page read and write
3D3E000
stack
page read and write
5200000
direct allocation
page execute and read and write
4C10000
direct allocation
page read and write
11E4000
heap
page read and write
4C21000
heap
page read and write
1277000
heap
page read and write
11FB000
heap
page read and write
4C21000
heap
page read and write
498F000
stack
page read and write
11E4000
heap
page read and write
11E4000
heap
page read and write
4C10000
direct allocation
page read and write
4C37000
heap
page read and write
4C21000
heap
page read and write
393F000
stack
page read and write
11F0000
heap
page read and write
423E000
stack
page read and write
4C21000
heap
page read and write
BFA000
unkown
page execute and read and write
4C21000
heap
page read and write
11E4000
heap
page read and write
1D03F000
stack
page read and write
710000
unkown
page read and write
11E0000
heap
page read and write
4C21000
heap
page read and write
447F000
stack
page read and write
4C21000
heap
page read and write
11E4000
heap
page read and write
4C21000
heap
page read and write
484F000
stack
page read and write
11E4000
heap
page read and write
11E4000
heap
page read and write
11E4000
heap
page read and write
C0A000
unkown
page execute and write copy
347E000
stack
page read and write
4C21000
heap
page read and write
DA5000
unkown
page execute and write copy
433F000
stack
page read and write
11E4000
heap
page read and write
1268000
heap
page read and write
4C21000
heap
page read and write
4C21000
heap
page read and write
45BF000
stack
page read and write
4C40000
heap
page read and write
4C21000
heap
page read and write
1D68C000
stack
page read and write
3BBF000
stack
page read and write
4C10000
direct allocation
page read and write
4C21000
heap
page read and write
11E4000
heap
page read and write
4C30000
heap
page read and write
1D2FE000
stack
page read and write
11A0000
heap
page read and write
4C21000
heap
page read and write
95A000
unkown
page execute and read and write
710000
unkown
page readonly
5220000
direct allocation
page execute and read and write
4C21000
heap
page read and write
41FF000
stack
page read and write
11E4000
heap
page read and write
4C10000
direct allocation
page read and write
4C21000
heap
page read and write
37FF000
stack
page read and write
4C21000
heap
page read and write
103C000
stack
page read and write
4ACF000
stack
page read and write
4C21000
heap
page read and write
BF3000
unkown
page execute and read and write
4C21000
heap
page read and write
44BE000
stack
page read and write
1258000
heap
page read and write
2F7C000
stack
page read and write
5240000
direct allocation
page execute and read and write
11E4000
heap
page read and write
11E4000
heap
page read and write
3E3F000
stack
page read and write
4C21000
heap
page read and write
11E4000
heap
page read and write
4C21000
heap
page read and write
4C21000
heap
page read and write
11E4000
heap
page read and write
3FBE000
stack
page read and write
3ABE000
stack
page read and write
5260000
direct allocation
page execute and read and write
4C21000
heap
page read and write
4C21000
heap
page read and write
4C21000
heap
page read and write
4C21000
heap
page read and write
4700000
heap
page read and write
7CD000
unkown
page execute and read and write
11E4000
heap
page read and write
There are 220 hidden memdumps, click here to show them.