IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37_
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpot:j
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpo
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpWHjj
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpc
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpw
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4AC0000
direct allocation
page read and write
malicious
E2E000
heap
page read and write
malicious
6D1000
unkown
page execute and read and write
malicious
4C30000
direct allocation
page execute and read and write
38BE000
stack
page read and write
4641000
heap
page read and write
5B0000
direct allocation
page read and write
4C00000
direct allocation
page execute and read and write
4641000
heap
page read and write
BD8000
unkown
page execute and read and write
4641000
heap
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
5B0000
direct allocation
page read and write
1C90E000
stack
page read and write
DBE000
stack
page read and write
4641000
heap
page read and write
5B0000
direct allocation
page read and write
5B0000
direct allocation
page read and write
463F000
stack
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
3D7F000
stack
page read and write
6D0000
unkown
page readonly
4641000
heap
page read and write
E72000
heap
page read and write
30FE000
stack
page read and write
2D3F000
stack
page read and write
5A7000
heap
page read and write
4641000
heap
page read and write
5B0000
direct allocation
page read and write
373F000
stack
page read and write
1CE0E000
stack
page read and write
6D0000
unkown
page read and write
4C00000
direct allocation
page execute and read and write
34FE000
stack
page read and write
2FBF000
stack
page read and write
4641000
heap
page read and write
377E000
stack
page read and write
4641000
heap
page read and write
3C7E000
stack
page read and write
42BE000
stack
page read and write
403E000
stack
page read and write
413F000
stack
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
BC9000
unkown
page execute and read and write
5AB000
heap
page read and write
4641000
heap
page read and write
453E000
stack
page read and write
781000
unkown
page execute and read and write
1CB8D000
stack
page read and write
111E000
stack
page read and write
4F5000
stack
page read and write
3FFF000
stack
page read and write
4641000
heap
page read and write
BD8000
unkown
page execute and write copy
4641000
heap
page read and write
4641000
heap
page read and write
ABC000
unkown
page execute and read and write
BD9000
unkown
page execute and write copy
DFC000
stack
page read and write
4641000
heap
page read and write
4645000
heap
page read and write
3AFF000
stack
page read and write
4640000
heap
page read and write
43FE000
stack
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
1CF0D000
stack
page read and write
4641000
heap
page read and write
337F000
stack
page read and write
2C3E000
stack
page read and write
57E000
stack
page read and write
33BE000
stack
page read and write
53D000
stack
page read and write
5B0000
direct allocation
page read and write
4641000
heap
page read and write
387F000
stack
page read and write
580000
heap
page read and write
4641000
heap
page read and write
E96000
heap
page read and write
4641000
heap
page read and write
78D000
unkown
page execute and read and write
4641000
heap
page read and write
2E7F000
stack
page read and write
3B3E000
stack
page read and write
1CF4E000
stack
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
4BFF000
stack
page read and write
E88000
heap
page read and write
5A0000
heap
page read and write
2FFE000
stack
page read and write
6B0000
direct allocation
page read and write
EA6000
heap
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
5B0000
direct allocation
page read and write
1F0000
heap
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
5B0000
direct allocation
page read and write
4C10000
direct allocation
page execute and read and write
3C3F000
stack
page read and write
4641000
heap
page read and write
5B0000
direct allocation
page read and write
5B0000
direct allocation
page read and write
1CCCE000
stack
page read and write
92E000
unkown
page execute and read and write
4641000
heap
page read and write
4641000
heap
page read and write
4C20000
direct allocation
page execute and read and write
E10000
direct allocation
page execute and read and write
4641000
heap
page read and write
4650000
heap
page read and write
1A0000
heap
page read and write
43BF000
stack
page read and write
29BF000
stack
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
1CDCF000
stack
page read and write
1CA0F000
stack
page read and write
4FE000
stack
page read and write
1CB4F000
stack
page read and write
4660000
heap
page read and write
34BF000
stack
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
E20000
heap
page read and write
190000
heap
page read and write
4641000
heap
page read and write
2BFF000
stack
page read and write
5B0000
direct allocation
page read and write
4641000
heap
page read and write
5B0000
direct allocation
page read and write
35FF000
stack
page read and write
4641000
heap
page read and write
1CC8E000
stack
page read and write
D7B000
unkown
page execute and read and write
4641000
heap
page read and write
5B0000
direct allocation
page read and write
417E000
stack
page read and write
6C0000
direct allocation
page execute and read and write
3EBF000
stack
page read and write
4A80000
trusted library allocation
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
1CA4E000
stack
page read and write
4641000
heap
page read and write
2D7E000
stack
page read and write
4641000
heap
page read and write
4AFE000
stack
page read and write
5C0000
heap
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
2ABF000
stack
page read and write
4641000
heap
page read and write
363E000
stack
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
313E000
stack
page read and write
4641000
heap
page read and write
6B0000
direct allocation
page read and write
6D1000
unkown
page execute and write copy
4641000
heap
page read and write
44FF000
stack
page read and write
7B2000
unkown
page execute and read and write
5C5000
heap
page read and write
4641000
heap
page read and write
5B0000
direct allocation
page read and write
1D04C000
stack
page read and write
4641000
heap
page read and write
2AFE000
stack
page read and write
4641000
heap
page read and write
13C000
stack
page read and write
BC2000
unkown
page execute and read and write
4641000
heap
page read and write
D7C000
unkown
page execute and write copy
4641000
heap
page read and write
323F000
stack
page read and write
427F000
stack
page read and write
4641000
heap
page read and write
3DBE000
stack
page read and write
E28000
heap
page read and write
E00000
direct allocation
page execute and read and write
4641000
heap
page read and write
101E000
stack
page read and write
2EBE000
stack
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
327E000
stack
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
39FE000
stack
page read and write
B9C000
unkown
page execute and read and write
91A000
unkown
page execute and read and write
3EFE000
stack
page read and write
4641000
heap
page read and write
39BF000
stack
page read and write
There are 191 hidden memdumps, click here to show them.