IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37m
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/$(
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php#
unknown
malicious
http://185.215.113.37/:(
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1001000
unkown
page execute and read and write
malicious
54D0000
direct allocation
page read and write
malicious
187E000
heap
page read and write
malicious
5650000
direct allocation
page execute and read and write
5051000
heap
page read and write
F34000
heap
page read and write
360F000
stack
page read and write
32E0000
direct allocation
page read and write
32CE000
stack
page read and write
F34000
heap
page read and write
F34000
heap
page read and write
5051000
heap
page read and write
414F000
stack
page read and write
5051000
heap
page read and write
5051000
heap
page read and write
1D84E000
stack
page read and write
1860000
direct allocation
page read and write
5051000
heap
page read and write
5051000
heap
page read and write
F8E000
stack
page read and write
5070000
heap
page read and write
5051000
heap
page read and write
5051000
heap
page read and write
38CE000
stack
page read and write
504F000
stack
page read and write
1870000
heap
page read and write
F34000
heap
page read and write
5630000
direct allocation
page execute and read and write
5066000
heap
page read and write
5051000
heap
page read and write
468E000
stack
page read and write
32E0000
direct allocation
page read and write
3C8E000
stack
page read and write
F34000
heap
page read and write
F34000
heap
page read and write
1D6BF000
stack
page read and write
428F000
stack
page read and write
EFE000
stack
page read and write
4A4E000
stack
page read and write
5051000
heap
page read and write
5051000
heap
page read and write
1D94C000
stack
page read and write
5051000
heap
page read and write
F34000
heap
page read and write
3307000
heap
page read and write
4C8F000
stack
page read and write
3B0F000
stack
page read and write
374F000
stack
page read and write
5640000
direct allocation
page execute and read and write
F34000
heap
page read and write
39CF000
stack
page read and write
54A0000
heap
page read and write
F34000
heap
page read and write
185F000
stack
page read and write
F34000
heap
page read and write
F34000
heap
page read and write
125E000
unkown
page execute and read and write
3ECF000
stack
page read and write
F34000
heap
page read and write
FCD000
stack
page read and write
18DA000
heap
page read and write
5051000
heap
page read and write
F34000
heap
page read and write
400F000
stack
page read and write
4E0E000
stack
page read and write
5490000
trusted library allocation
page read and write
42CE000
stack
page read and write
13E1000
unkown
page execute and read and write
1D47E000
stack
page read and write
5051000
heap
page read and write
3A0E000
stack
page read and write
5051000
heap
page read and write
1000000
unkown
page readonly
1860000
direct allocation
page read and write
1D98E000
stack
page read and write
4B8E000
stack
page read and write
124A000
unkown
page execute and read and write
5610000
direct allocation
page execute and read and write
5051000
heap
page read and write
3300000
heap
page read and write
1860000
direct allocation
page read and write
4F4E000
stack
page read and write
5051000
heap
page read and write
F10000
heap
page read and write
1860000
direct allocation
page read and write
F34000
heap
page read and write
1A6E000
stack
page read and write
5051000
heap
page read and write
418E000
stack
page read and write
F34000
heap
page read and write
5051000
heap
page read and write
1860000
direct allocation
page read and write
1D5BE000
stack
page read and write
14B8000
unkown
page execute and read and write
1860000
direct allocation
page read and write
10E2000
unkown
page execute and read and write
1D6FE000
stack
page read and write
F34000
heap
page read and write
5051000
heap
page read and write
1000000
unkown
page read and write
F34000
heap
page read and write
1D33E000
stack
page read and write
5051000
heap
page read and write
14F5000
unkown
page execute and write copy
18C2000
heap
page read and write
5051000
heap
page read and write
324E000
stack
page read and write
5051000
heap
page read and write
328C000
stack
page read and write
F34000
heap
page read and write
1D43F000
stack
page read and write
4A0F000
stack
page read and write
F34000
heap
page read and write
F34000
heap
page read and write
5051000
heap
page read and write
350F000
stack
page read and write
5051000
heap
page read and write
3DCE000
stack
page read and write
F34000
heap
page read and write
5051000
heap
page read and write
5051000
heap
page read and write
5051000
heap
page read and write
4DCF000
stack
page read and write
5051000
heap
page read and write
364E000
stack
page read and write
5051000
heap
page read and write
5620000
direct allocation
page execute and read and write
5051000
heap
page read and write
5051000
heap
page read and write
F34000
heap
page read and write
48CF000
stack
page read and write
F34000
heap
page read and write
3B4E000
stack
page read and write
560F000
stack
page read and write
1860000
direct allocation
page read and write
14F4000
unkown
page execute and write copy
5051000
heap
page read and write
5051000
heap
page read and write
F34000
heap
page read and write
5051000
heap
page read and write
5051000
heap
page read and write
478E000
stack
page read and write
F34000
heap
page read and write
5051000
heap
page read and write
1860000
direct allocation
page read and write
5051000
heap
page read and write
5051000
heap
page read and write
1860000
direct allocation
page read and write
F34000
heap
page read and write
5051000
heap
page read and write
454E000
stack
page read and write
47CE000
stack
page read and write
1D7FF000
stack
page read and write
5630000
direct allocation
page execute and read and write
378E000
stack
page read and write
3F0E000
stack
page read and write
F30000
heap
page read and write
1D57F000
stack
page read and write
5051000
heap
page read and write
5051000
heap
page read and write
5051000
heap
page read and write
330B000
heap
page read and write
440E000
stack
page read and write
388F000
stack
page read and write
F34000
heap
page read and write
550E000
stack
page read and write
10B1000
unkown
page execute and read and write
5051000
heap
page read and write
1689000
unkown
page execute and write copy
10BD000
unkown
page execute and read and write
F34000
heap
page read and write
340F000
stack
page read and write
FF0000
heap
page read and write
5051000
heap
page read and write
EF5000
stack
page read and write
450F000
stack
page read and write
18F2000
heap
page read and write
1860000
direct allocation
page read and write
4CCE000
stack
page read and write
14D8000
unkown
page execute and read and write
5051000
heap
page read and write
BAC000
stack
page read and write
F34000
heap
page read and write
43CF000
stack
page read and write
490E000
stack
page read and write
464F000
stack
page read and write
32F0000
direct allocation
page execute and read and write
5050000
heap
page read and write
1878000
heap
page read and write
1001000
unkown
page execute and write copy
5051000
heap
page read and write
1688000
unkown
page execute and read and write
F34000
heap
page read and write
F34000
heap
page read and write
5051000
heap
page read and write
F34000
heap
page read and write
4F0F000
stack
page read and write
F34000
heap
page read and write
3D8F000
stack
page read and write
5051000
heap
page read and write
F34000
heap
page read and write
F34000
heap
page read and write
14F4000
unkown
page execute and read and write
5051000
heap
page read and write
5051000
heap
page read and write
3C4F000
stack
page read and write
5051000
heap
page read and write
1DA8E000
stack
page read and write
1860000
direct allocation
page read and write
F34000
heap
page read and write
5051000
heap
page read and write
5051000
heap
page read and write
14E6000
unkown
page execute and read and write
5051000
heap
page read and write
1860000
direct allocation
page read and write
5051000
heap
page read and write
5660000
direct allocation
page execute and read and write
18FB000
heap
page read and write
F34000
heap
page read and write
1860000
direct allocation
page read and write
4B4F000
stack
page read and write
1860000
direct allocation
page read and write
5051000
heap
page read and write
F00000
heap
page read and write
404E000
stack
page read and write
5051000
heap
page read and write
5051000
heap
page read and write
18BF000
heap
page read and write
There are 218 hidden memdumps, click here to show them.