IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37O
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php&8
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpDWF
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php#
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phps
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C41000
unkown
page execute and read and write
malicious
87E000
heap
page read and write
malicious
4D90000
direct allocation
page read and write
malicious
4911000
heap
page read and write
834000
heap
page read and write
458E000
stack
page read and write
4911000
heap
page read and write
4920000
heap
page read and write
364F000
stack
page read and write
4ECF000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
7A0000
heap
page read and write
112A000
unkown
page execute and read and write
42CF000
stack
page read and write
C00000
direct allocation
page read and write
38CF000
stack
page read and write
354E000
stack
page read and write
37CE000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
2D8F000
stack
page read and write
32CE000
stack
page read and write
480E000
stack
page read and write
350F000
stack
page read and write
1D0FD000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
8C5000
heap
page read and write
2ECF000
stack
page read and write
1CCEE000
stack
page read and write
CFD000
unkown
page execute and read and write
4911000
heap
page read and write
1106000
unkown
page execute and read and write
D22000
unkown
page execute and read and write
318E000
stack
page read and write
4911000
heap
page read and write
834000
heap
page read and write
C1B000
heap
page read and write
C10000
heap
page read and write
834000
heap
page read and write
834000
heap
page read and write
790000
heap
page read and write
4911000
heap
page read and write
1143000
unkown
page execute and read and write
3F4E000
stack
page read and write
4911000
heap
page read and write
3A4E000
stack
page read and write
4911000
heap
page read and write
840000
heap
page read and write
4911000
heap
page read and write
430E000
stack
page read and write
4911000
heap
page read and write
3B4F000
stack
page read and write
4910000
heap
page read and write
314F000
stack
page read and write
4911000
heap
page read and write
850000
direct allocation
page read and write
834000
heap
page read and write
870000
heap
page read and write
E9E000
unkown
page execute and read and write
1CF6F000
stack
page read and write
4911000
heap
page read and write
1D33C000
stack
page read and write
B7E000
stack
page read and write
4930000
heap
page read and write
4911000
heap
page read and write
1CD2E000
stack
page read and write
834000
heap
page read and write
4D50000
trusted library allocation
page read and write
834000
heap
page read and write
878000
heap
page read and write
2F0E000
stack
page read and write
4912000
heap
page read and write
1CBEE000
stack
page read and write
834000
heap
page read and write
8F7000
heap
page read and write
834000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
834000
heap
page read and write
4D50000
heap
page read and write
4911000
heap
page read and write
13EE000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
850000
direct allocation
page read and write
468F000
stack
page read and write
4911000
heap
page read and write
834000
heap
page read and write
850000
direct allocation
page read and write
834000
heap
page read and write
C40000
unkown
page readonly
4911000
heap
page read and write
4911000
heap
page read and write
3DCF000
stack
page read and write
850000
direct allocation
page read and write
8E5000
heap
page read and write
850000
direct allocation
page read and write
C00000
direct allocation
page read and write
834000
heap
page read and write
CF1000
unkown
page execute and read and write
418F000
stack
page read and write
4911000
heap
page read and write
834000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
4911000
heap
page read and write
4911000
heap
page read and write
834000
heap
page read and write
4911000
heap
page read and write
454F000
stack
page read and write
830000
heap
page read and write
300F000
stack
page read and write
BFB000
stack
page read and write
850000
direct allocation
page read and write
834000
heap
page read and write
440F000
stack
page read and write
3E0E000
stack
page read and write
834000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
3F0F000
stack
page read and write
C17000
heap
page read and write
1CFAE000
stack
page read and write
C30000
direct allocation
page execute and read and write
C20000
direct allocation
page execute and read and write
834000
heap
page read and write
1CE2F000
stack
page read and write
834000
heap
page read and write
850000
direct allocation
page read and write
4911000
heap
page read and write
1144000
unkown
page execute and write copy
444E000
stack
page read and write
4911000
heap
page read and write
304E000
stack
page read and write
4911000
heap
page read and write
850000
direct allocation
page read and write
735000
stack
page read and write
4911000
heap
page read and write
340E000
stack
page read and write
834000
heap
page read and write
4911000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
834000
heap
page read and write
E8A000
unkown
page execute and read and write
850000
direct allocation
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
73F000
stack
page read and write
80E000
stack
page read and write
4911000
heap
page read and write
390E000
stack
page read and write
834000
heap
page read and write
3B8E000
stack
page read and write
4911000
heap
page read and write
834000
heap
page read and write
4911000
heap
page read and write
C41000
unkown
page execute and write copy
1135000
unkown
page execute and read and write
4911000
heap
page read and write
4911000
heap
page read and write
3A0F000
stack
page read and write
408E000
stack
page read and write
850000
direct allocation
page read and write
834000
heap
page read and write
4911000
heap
page read and write
834000
heap
page read and write
834000
heap
page read and write
1D1FE000
stack
page read and write
41CE000
stack
page read and write
834000
heap
page read and write
BBE000
stack
page read and write
850000
direct allocation
page read and write
4911000
heap
page read and write
B3F000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
834000
heap
page read and write
834000
heap
page read and write
102B000
unkown
page execute and read and write
834000
heap
page read and write
1143000
unkown
page execute and write copy
33CF000
stack
page read and write
834000
heap
page read and write
46CE000
stack
page read and write
4911000
heap
page read and write
2DCE000
stack
page read and write
834000
heap
page read and write
1D0AF000
stack
page read and write
4DCE000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
378F000
stack
page read and write
1D23D000
stack
page read and write
328F000
stack
page read and write
834000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
C40000
unkown
page read and write
490F000
stack
page read and write
4911000
heap
page read and write
12E5000
unkown
page execute and read and write
834000
heap
page read and write
4911000
heap
page read and write
368E000
stack
page read and write
1CE6E000
stack
page read and write
2C8F000
stack
page read and write
3C8F000
stack
page read and write
850000
direct allocation
page read and write
4F10000
direct allocation
page execute and read and write
4911000
heap
page read and write
4911000
heap
page read and write
834000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
834000
heap
page read and write
4F00000
direct allocation
page execute and read and write
404F000
stack
page read and write
47CF000
stack
page read and write
834000
heap
page read and write
850000
direct allocation
page read and write
63C000
stack
page read and write
4EF0000
direct allocation
page execute and read and write
8DA000
heap
page read and write
850000
direct allocation
page read and write
12E6000
unkown
page execute and write copy
3CCE000
stack
page read and write
4911000
heap
page read and write
There are 218 hidden memdumps, click here to show them.