IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpTI
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpXI
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpLI
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5E1000
unkown
page execute and read and write
malicious
4FE0000
direct allocation
page read and write
malicious
113E000
heap
page read and write
malicious
1CF0F000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
3D9F000
stack
page read and write
441E000
stack
page read and write
4B61000
heap
page read and write
3F1E000
stack
page read and write
9C2000
unkown
page execute and read and write
4B61000
heap
page read and write
DC4000
heap
page read and write
361F000
stack
page read and write
4B5F000
stack
page read and write
3B1F000
stack
page read and write
4B61000
heap
page read and write
465F000
stack
page read and write
D1C000
stack
page read and write
43DF000
stack
page read and write
1184000
heap
page read and write
39DF000
stack
page read and write
401F000
stack
page read and write
143F000
stack
page read and write
4B61000
heap
page read and write
11C1000
heap
page read and write
4B61000
heap
page read and write
6C2000
unkown
page execute and read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
491E000
stack
page read and write
4B61000
heap
page read and write
1D18E000
stack
page read and write
1D1CE000
stack
page read and write
4B61000
heap
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
4B61000
heap
page read and write
419D000
stack
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
4B61000
heap
page read and write
2D57000
heap
page read and write
69D000
unkown
page execute and read and write
4B61000
heap
page read and write
1D31D000
stack
page read and write
4B61000
heap
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
4B61000
heap
page read and write
DE0000
heap
page read and write
147E000
stack
page read and write
DC4000
heap
page read and write
DF0000
direct allocation
page read and write
4B61000
heap
page read and write
D80000
heap
page read and write
4B61000
heap
page read and write
DC4000
heap
page read and write
1130000
heap
page read and write
5130000
direct allocation
page execute and read and write
325F000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
501E000
stack
page read and write
5120000
direct allocation
page execute and read and write
DC4000
heap
page read and write
4B61000
heap
page read and write
DC4000
heap
page read and write
AA4000
unkown
page execute and read and write
375F000
stack
page read and write
2D9E000
stack
page read and write
D70000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
5E0000
unkown
page readonly
329E000
stack
page read and write
DC4000
heap
page read and write
351E000
stack
page read and write
11B2000
heap
page read and write
47DE000
stack
page read and write
1178000
heap
page read and write
DC4000
heap
page read and write
429F000
stack
page read and write
1D04F000
stack
page read and write
10FE000
stack
page read and write
AE2000
unkown
page execute and write copy
469E000
stack
page read and write
311F000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
1D41D000
stack
page read and write
2E9F000
stack
page read and write
1D55C000
stack
page read and write
4A5E000
stack
page read and write
DC0000
heap
page read and write
2FDF000
stack
page read and write
405E000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
11A7000
heap
page read and write
339F000
stack
page read and write
AC7000
unkown
page execute and read and write
455E000
stack
page read and write
DC4000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
11A4000
heap
page read and write
4FA0000
trusted library allocation
page read and write
4B61000
heap
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
1110000
direct allocation
page read and write
5E0000
unkown
page read and write
82A000
unkown
page execute and read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
365E000
stack
page read and write
10F5000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
DC4000
heap
page read and write
DF0000
direct allocation
page read and write
DC4000
heap
page read and write
2D30000
direct allocation
page execute and read and write
DC4000
heap
page read and write
315E000
stack
page read and write
1138000
heap
page read and write
691000
unkown
page execute and read and write
48DF000
stack
page read and write
DC4000
heap
page read and write
4B61000
heap
page read and write
DF0000
direct allocation
page read and write
4B61000
heap
page read and write
DC4000
heap
page read and write
1196000
heap
page read and write
2D30000
heap
page read and write
157F000
stack
page read and write
DC4000
heap
page read and write
301E000
stack
page read and write
DC4000
heap
page read and write
AD3000
unkown
page execute and read and write
5E1000
unkown
page execute and write copy
2D5B000
heap
page read and write
DC4000
heap
page read and write
1D08E000
stack
page read and write
2D40000
direct allocation
page execute and read and write
C83000
unkown
page execute and read and write
DC4000
heap
page read and write
1D2CF000
stack
page read and write
4B60000
heap
page read and write
4B70000
heap
page read and write
4A1F000
stack
page read and write
42DE000
stack
page read and write
4B61000
heap
page read and write
3DDE000
stack
page read and write
1CF4E000
stack
page read and write
2EDC000
stack
page read and write
511F000
stack
page read and write
3C9E000
stack
page read and write
4B61000
heap
page read and write
389F000
stack
page read and write
4B61000
heap
page read and write
DF0000
direct allocation
page read and write
DC4000
heap
page read and write
1110000
direct allocation
page read and write
DC4000
heap
page read and write
3C5F000
stack
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
4B61000
heap
page read and write
DF0000
direct allocation
page read and write
4B61000
heap
page read and write
DF0000
direct allocation
page read and write
DF0000
direct allocation
page read and write
451F000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
DC4000
heap
page read and write
4B61000
heap
page read and write
DC4000
heap
page read and write
AE1000
unkown
page execute and write copy
4B61000
heap
page read and write
1120000
direct allocation
page execute and read and write
DF0000
direct allocation
page read and write
3A1E000
stack
page read and write
DC4000
heap
page read and write
83E000
unkown
page execute and read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
2D50000
heap
page read and write
133E000
stack
page read and write
DF0000
direct allocation
page read and write
3EDF000
stack
page read and write
2D20000
direct allocation
page execute and read and write
DC4000
heap
page read and write
C84000
unkown
page execute and write copy
33DE000
stack
page read and write
117E000
heap
page read and write
DF0000
direct allocation
page read and write
4B61000
heap
page read and write
1D45D000
stack
page read and write
1CE0E000
stack
page read and write
479F000
stack
page read and write
DC4000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
DF0000
direct allocation
page read and write
415F000
stack
page read and write
3B5E000
stack
page read and write
2D40000
direct allocation
page execute and read and write
DF0000
direct allocation
page read and write
AE1000
unkown
page execute and read and write
DC4000
heap
page read and write
4B61000
heap
page read and write
38DE000
stack
page read and write
DF0000
direct allocation
page read and write
DC4000
heap
page read and write
34DF000
stack
page read and write
4B61000
heap
page read and write
DC4000
heap
page read and write
379E000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
DF0000
direct allocation
page read and write
There are 220 hidden memdumps, click here to show them.