IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/U
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpC
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phps
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
ADE000
heap
page read and write
malicious
4D90000
direct allocation
page read and write
malicious
D31000
unkown
page execute and read and write
malicious
974000
heap
page read and write
974000
heap
page read and write
4ECF000
stack
page read and write
3C8F000
stack
page read and write
B5C000
heap
page read and write
4911000
heap
page read and write
1D21D000
stack
page read and write
CCE000
stack
page read and write
13BD000
unkown
page execute and write copy
1D0CF000
stack
page read and write
4911000
heap
page read and write
DED000
unkown
page execute and read and write
4F10000
direct allocation
page execute and read and write
974000
heap
page read and write
D20000
direct allocation
page read and write
4F20000
direct allocation
page execute and read and write
4911000
heap
page read and write
440F000
stack
page read and write
2C9E000
stack
page read and write
974000
heap
page read and write
2CF0000
direct allocation
page read and write
468F000
stack
page read and write
4911000
heap
page read and write
D20000
direct allocation
page read and write
1CF8E000
stack
page read and write
1225000
unkown
page execute and write copy
3A4E000
stack
page read and write
2D0B000
heap
page read and write
3E0E000
stack
page read and write
974000
heap
page read and write
1CFCE000
stack
page read and write
4911000
heap
page read and write
974000
heap
page read and write
4911000
heap
page read and write
E12000
unkown
page execute and read and write
4911000
heap
page read and write
350F000
stack
page read and write
318E000
stack
page read and write
974000
heap
page read and write
D20000
direct allocation
page read and write
4911000
heap
page read and write
95D000
stack
page read and write
404F000
stack
page read and write
1D11D000
stack
page read and write
4911000
heap
page read and write
974000
heap
page read and write
2F0F000
stack
page read and write
974000
heap
page read and write
974000
heap
page read and write
3B8E000
stack
page read and write
3F0F000
stack
page read and write
7D0000
heap
page read and write
91E000
stack
page read and write
AD0000
heap
page read and write
4911000
heap
page read and write
D20000
direct allocation
page read and write
3F4D000
stack
page read and write
974000
heap
page read and write
4911000
heap
page read and write
1217000
unkown
page execute and read and write
1CE8E000
stack
page read and write
304E000
stack
page read and write
4911000
heap
page read and write
D30000
unkown
page read and write
4911000
heap
page read and write
47CF000
stack
page read and write
D20000
direct allocation
page read and write
490F000
stack
page read and write
4911000
heap
page read and write
3A0F000
stack
page read and write
F8E000
unkown
page execute and read and write
4920000
heap
page read and write
B37000
heap
page read and write
974000
heap
page read and write
A7F000
stack
page read and write
F7A000
unkown
page execute and read and write
D20000
direct allocation
page read and write
4911000
heap
page read and write
1225000
unkown
page execute and read and write
4911000
heap
page read and write
1CD0F000
stack
page read and write
2D07000
heap
page read and write
1D35C000
stack
page read and write
340E000
stack
page read and write
480E000
stack
page read and write
4930000
heap
page read and write
4911000
heap
page read and write
D20000
direct allocation
page read and write
974000
heap
page read and write
4911000
heap
page read and write
328F000
stack
page read and write
4F30000
direct allocation
page execute and read and write
378F000
stack
page read and write
4911000
heap
page read and write
974000
heap
page read and write
77E000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
354E000
stack
page read and write
974000
heap
page read and write
D10000
heap
page read and write
974000
heap
page read and write
408E000
stack
page read and write
974000
heap
page read and write
974000
heap
page read and write
1CC0E000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
418F000
stack
page read and write
4DCE000
stack
page read and write
974000
heap
page read and write
4F00000
direct allocation
page execute and read and write
364F000
stack
page read and write
4911000
heap
page read and write
33CF000
stack
page read and write
368E000
stack
page read and write
46CE000
stack
page read and write
4A10000
trusted library allocation
page read and write
974000
heap
page read and write
4911000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
974000
heap
page read and write
4911000
heap
page read and write
974000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
2CF0000
direct allocation
page read and write
38CF000
stack
page read and write
4911000
heap
page read and write
974000
heap
page read and write
D20000
direct allocation
page read and write
974000
heap
page read and write
4911000
heap
page read and write
974000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
1D25D000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
430E000
stack
page read and write
974000
heap
page read and write
D31000
unkown
page execute and write copy
4D70000
heap
page read and write
D20000
direct allocation
page read and write
4911000
heap
page read and write
B22000
heap
page read and write
4911000
heap
page read and write
DE1000
unkown
page execute and read and write
974000
heap
page read and write
11E9000
unkown
page execute and read and write
974000
heap
page read and write
4911000
heap
page read and write
D30000
unkown
page readonly
B55000
heap
page read and write
ACE000
stack
page read and write
974000
heap
page read and write
4911000
heap
page read and write
D20000
direct allocation
page read and write
390E000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
458E000
stack
page read and write
4911000
heap
page read and write
2E0F000
stack
page read and write
4911000
heap
page read and write
454F000
stack
page read and write
41CE000
stack
page read and write
4911000
heap
page read and write
3B4F000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
1CE4F000
stack
page read and write
4911000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
775000
stack
page read and write
4911000
heap
page read and write
110C000
unkown
page execute and read and write
2CDE000
stack
page read and write
4911000
heap
page read and write
2C5F000
stack
page read and write
42CF000
stack
page read and write
D20000
direct allocation
page read and write
4911000
heap
page read and write
37CE000
stack
page read and write
300F000
stack
page read and write
974000
heap
page read and write
8B0000
heap
page read and write
4911000
heap
page read and write
3DCF000
stack
page read and write
D20000
direct allocation
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
AD8000
heap
page read and write
2D00000
heap
page read and write
4F00000
direct allocation
page execute and read and write
1CD4E000
stack
page read and write
120D000
unkown
page execute and read and write
4911000
heap
page read and write
4911000
heap
page read and write
974000
heap
page read and write
444E000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
974000
heap
page read and write
4912000
heap
page read and write
67C000
stack
page read and write
32CE000
stack
page read and write
4910000
heap
page read and write
974000
heap
page read and write
D20000
direct allocation
page read and write
314F000
stack
page read and write
D20000
direct allocation
page read and write
974000
heap
page read and write
4911000
heap
page read and write
D0C000
stack
page read and write
13BC000
unkown
page execute and read and write
974000
heap
page read and write
974000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
974000
heap
page read and write
3CCE000
stack
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
1226000
unkown
page execute and write copy
970000
heap
page read and write
There are 219 hidden memdumps, click here to show them.