IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/t
unknown
http://185.215.113.37/e2b1563c6670f193.php&f&f
unknown
http://185.215.113.37w
unknown
http://185.215.113.37/e2b1563c6670f193.phpfeV
unknown
http://185.215.113.37/e2b1563c6670f193.phpVe
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4AA0000
direct allocation
page read and write
malicious
A71000
unkown
page execute and read and write
malicious
66E000
heap
page read and write
malicious
110A000
unkown
page execute and read and write
595000
heap
page read and write
4611000
heap
page read and write
650000
direct allocation
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
650000
direct allocation
page read and write
4AA0000
direct allocation
page read and write
426E000
stack
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
63B000
heap
page read and write
F33000
unkown
page execute and read and write
4611000
heap
page read and write
372E000
stack
page read and write
322E000
stack
page read and write
1CB5E000
stack
page read and write
1D0000
heap
page read and write
1D1EE000
stack
page read and write
4AA0000
direct allocation
page read and write
2F6F000
stack
page read and write
650000
direct allocation
page read and write
637000
heap
page read and write
CCE000
unkown
page execute and read and write
30AF000
stack
page read and write
1D04D000
stack
page read and write
39AE000
stack
page read and write
1CA1D000
stack
page read and write
4611000
heap
page read and write
650000
direct allocation
page read and write
640000
heap
page read and write
4611000
heap
page read and write
3FEE000
stack
page read and write
4611000
heap
page read and write
40EF000
stack
page read and write
F55000
unkown
page execute and read and write
1CB1E000
stack
page read and write
4C40000
direct allocation
page execute and read and write
4C2E000
stack
page read and write
4611000
heap
page read and write
650000
direct allocation
page read and write
4620000
heap
page read and write
4611000
heap
page read and write
43AE000
stack
page read and write
336E000
stack
page read and write
4C20000
direct allocation
page execute and read and write
4BDF000
stack
page read and write
4611000
heap
page read and write
E58000
unkown
page execute and read and write
4611000
heap
page read and write
A2F000
stack
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
6DB000
heap
page read and write
4FE000
stack
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
44AF000
stack
page read and write
4611000
heap
page read and write
4A50000
trusted library allocation
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
4C00000
direct allocation
page execute and read and write
4611000
heap
page read and write
650000
direct allocation
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
5EE000
stack
page read and write
2CEF000
stack
page read and write
650000
direct allocation
page read and write
92F000
stack
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
A71000
unkown
page execute and write copy
2E2F000
stack
page read and write
4611000
heap
page read and write
1CDCF000
stack
page read and write
660000
heap
page read and write
A6E000
stack
page read and write
4C10000
direct allocation
page execute and read and write
4611000
heap
page read and write
31EF000
stack
page read and write
1CF0E000
stack
page read and write
650000
direct allocation
page read and write
4611000
heap
page read and write
4610000
heap
page read and write
4611000
heap
page read and write
1CC5F000
stack
page read and write
4630000
heap
page read and write
3AAF000
stack
page read and write
3D2F000
stack
page read and write
650000
direct allocation
page read and write
110B000
unkown
page execute and write copy
4611000
heap
page read and write
4611000
heap
page read and write
650000
direct allocation
page read and write
1CCCE000
stack
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
2BEE000
stack
page read and write
B52000
unkown
page execute and read and write
2AAF000
stack
page read and write
4611000
heap
page read and write
630000
heap
page read and write
2E6E000
stack
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
35EE000
stack
page read and write
4611000
heap
page read and write
590000
heap
page read and write
6E4000
heap
page read and write
396F000
stack
page read and write
4611000
heap
page read and write
436F000
stack
page read and write
650000
direct allocation
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
2D2E000
stack
page read and write
4ADE000
stack
page read and write
57E000
stack
page read and write
36EF000
stack
page read and write
412E000
stack
page read and write
1CF4E000
stack
page read and write
45EF000
stack
page read and write
650000
direct allocation
page read and write
4611000
heap
page read and write
6F4000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
382F000
stack
page read and write
29AF000
stack
page read and write
45F0000
heap
page read and write
4611000
heap
page read and write
3C2D000
stack
page read and write
6D7000
heap
page read and write
35AF000
stack
page read and write
1D1F2000
heap
page read and write
62C000
stack
page read and write
4611000
heap
page read and write
1D1F0000
heap
page read and write
66A000
heap
page read and write
1D0EE000
stack
page read and write
F6E000
unkown
page execute and read and write
B21000
unkown
page execute and read and write
4611000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
4C30000
direct allocation
page execute and read and write
3E6F000
stack
page read and write
6C8000
heap
page read and write
3EAE000
stack
page read and write
44EE000
stack
page read and write
4611000
heap
page read and write
3BEF000
stack
page read and write
6B3000
heap
page read and write
2FAE000
stack
page read and write
1C9DF000
stack
page read and write
16C000
stack
page read and write
650000
direct allocation
page read and write
4F5000
stack
page read and write
B2D000
unkown
page execute and read and write
F5F000
unkown
page execute and read and write
34AE000
stack
page read and write
4611000
heap
page read and write
A70000
unkown
page readonly
A70000
unkown
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
1CE0D000
stack
page read and write
386E000
stack
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
53E000
stack
page read and write
4611000
heap
page read and write
30EE000
stack
page read and write
4611000
heap
page read and write
F6F000
unkown
page execute and write copy
650000
direct allocation
page read and write
346F000
stack
page read and write
4C20000
direct allocation
page execute and read and write
4611000
heap
page read and write
4611000
heap
page read and write
332F000
stack
page read and write
4611000
heap
page read and write
3D6E000
stack
page read and write
422F000
stack
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
3FAF000
stack
page read and write
3AEE000
stack
page read and write
F6E000
unkown
page execute and write copy
4611000
heap
page read and write
CBA000
unkown
page execute and read and write
4611000
heap
page read and write
1C0000
heap
page read and write
4611000
heap
page read and write
2BAF000
stack
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
There are 199 hidden memdumps, click here to show them.