IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37I
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php8
unknown
malicious
http://185.215.113.37/;
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
124E000
heap
page read and write
malicious
691000
unkown
page execute and read and write
malicious
5050000
direct allocation
page read and write
malicious
4BC1000
heap
page read and write
1120000
heap
page read and write
1D37F000
stack
page read and write
4BC1000
heap
page read and write
458E000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
1D3CE000
stack
page read and write
1D4CD000
stack
page read and write
1D0DF000
stack
page read and write
10FE000
stack
page read and write
4A4F000
stack
page read and write
4BC1000
heap
page read and write
51D0000
direct allocation
page execute and read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
690000
unkown
page readonly
4BB0000
direct allocation
page read and write
A78000
unkown
page execute and read and write
1D67E000
stack
page read and write
300F000
stack
page read and write
51E0000
direct allocation
page execute and read and write
1CF9F000
stack
page read and write
440F000
stack
page read and write
741000
unkown
page execute and read and write
408E000
stack
page read and write
4BC1000
heap
page read and write
518F000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
328F000
stack
page read and write
D27000
unkown
page execute and read and write
11E0000
heap
page read and write
2E07000
heap
page read and write
4CC0000
trusted library allocation
page read and write
3DCF000
stack
page read and write
4BD0000
heap
page read and write
304E000
stack
page read and write
1D27E000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
B8D000
unkown
page execute and write copy
4BC1000
heap
page read and write
3E0E000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
B54000
unkown
page execute and read and write
1D11E000
stack
page read and write
4BB0000
direct allocation
page read and write
2DEC000
stack
page read and write
340E000
stack
page read and write
4BB0000
direct allocation
page read and write
4BC1000
heap
page read and write
3C8F000
stack
page read and write
404F000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4B90000
heap
page read and write
4BC1000
heap
page read and write
5050000
direct allocation
page read and write
4BC1000
heap
page read and write
1240000
heap
page read and write
318E000
stack
page read and write
4BC1000
heap
page read and write
4BB0000
direct allocation
page read and write
4BC1000
heap
page read and write
3F4E000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
5200000
direct allocation
page execute and read and write
418F000
stack
page read and write
51C0000
direct allocation
page execute and read and write
454F000
stack
page read and write
4BB0000
direct allocation
page read and write
468F000
stack
page read and write
51B0000
direct allocation
page execute and read and write
4BC1000
heap
page read and write
2DAF000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
3A0F000
stack
page read and write
51DE000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
430E000
stack
page read and write
690000
unkown
page read and write
4BC1000
heap
page read and write
390E000
stack
page read and write
4BC1000
heap
page read and write
11DE000
stack
page read and write
4BC1000
heap
page read and write
1110000
heap
page read and write
4B8F000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
3B4F000
stack
page read and write
5050000
direct allocation
page read and write
4BB0000
direct allocation
page read and write
4BC1000
heap
page read and write
691000
unkown
page execute and write copy
4BC1000
heap
page read and write
4BC1000
heap
page read and write
12CF000
heap
page read and write
4BE0000
heap
page read and write
118E000
stack
page read and write
1D780000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
51D0000
direct allocation
page execute and read and write
8EE000
unkown
page execute and read and write
4BB0000
direct allocation
page read and write
51A0000
direct allocation
page execute and read and write
2E00000
heap
page read and write
4BC1000
heap
page read and write
4BB0000
direct allocation
page read and write
123E000
stack
page read and write
4BC1000
heap
page read and write
41CE000
stack
page read and write
4BC1000
heap
page read and write
32CE000
stack
page read and write
B7D000
unkown
page execute and read and write
508E000
stack
page read and write
4A8E000
stack
page read and write
37CE000
stack
page read and write
4BC0000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
314F000
stack
page read and write
12A8000
heap
page read and write
46CE000
stack
page read and write
368E000
stack
page read and write
51F0000
direct allocation
page execute and read and write
378F000
stack
page read and write
490F000
stack
page read and write
150F000
stack
page read and write
38CF000
stack
page read and write
4BC1000
heap
page read and write
47CF000
stack
page read and write
3CCE000
stack
page read and write
4BC1000
heap
page read and write
D28000
unkown
page execute and write copy
4BC1000
heap
page read and write
1D50E000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
1D77F000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BB0000
direct allocation
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BB0000
direct allocation
page read and write
1D21F000
stack
page read and write
4BC1000
heap
page read and write
1292000
heap
page read and write
8DA000
unkown
page execute and read and write
4BC1000
heap
page read and write
B74000
unkown
page execute and read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
74D000
unkown
page execute and read and write
3F0F000
stack
page read and write
10F5000
stack
page read and write
1CFDE000
stack
page read and write
4BC1000
heap
page read and write
3A4E000
stack
page read and write
4BC1000
heap
page read and write
124A000
heap
page read and write
4BB0000
direct allocation
page read and write
3B8E000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
B8C000
unkown
page execute and write copy
350F000
stack
page read and write
4BC1000
heap
page read and write
2F0F000
stack
page read and write
4BB0000
direct allocation
page read and write
772000
unkown
page execute and read and write
480E000
stack
page read and write
4BB0000
direct allocation
page read and write
2DF0000
heap
page read and write
33CF000
stack
page read and write
494E000
stack
page read and write
4BC1000
heap
page read and write
B8C000
unkown
page execute and read and write
364F000
stack
page read and write
4BC1000
heap
page read and write
4BC1000
heap
page read and write
1D60C000
stack
page read and write
11E5000
heap
page read and write
42CF000
stack
page read and write
12C2000
heap
page read and write
4BC1000
heap
page read and write
1D784000
heap
page read and write
444E000
stack
page read and write
4BC1000
heap
page read and write
4BED000
heap
page read and write
4BB0000
direct allocation
page read and write
DBC000
stack
page read and write
4BC1000
heap
page read and write
354E000
stack
page read and write
There are 196 hidden memdumps, click here to show them.