IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php0
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpW
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C6E000
heap
page read and write
malicious
4EF0000
direct allocation
page read and write
malicious
FB1000
unkown
page execute and read and write
malicious
4A71000
heap
page read and write
33EF000
stack
page read and write
1D09E000
stack
page read and write
46AF000
stack
page read and write
456F000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
C50000
direct allocation
page read and write
F20000
heap
page read and write
146E000
unkown
page execute and read and write
4A71000
heap
page read and write
432E000
stack
page read and write
1CE1F000
stack
page read and write
5040000
direct allocation
page execute and read and write
2EEF000
stack
page read and write
1D34D000
stack
page read and write
4A71000
heap
page read and write
1643000
unkown
page execute and read and write
4A71000
heap
page read and write
3CAF000
stack
page read and write
5060000
direct allocation
page execute and read and write
4A71000
heap
page read and write
30EF000
stack
page read and write
42EF000
stack
page read and write
482E000
stack
page read and write
3F2F000
stack
page read and write
38EF000
stack
page read and write
E5E000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
1CF5F000
stack
page read and write
47EF000
stack
page read and write
506E000
stack
page read and write
496E000
stack
page read and write
4A71000
heap
page read and write
C50000
direct allocation
page read and write
F40000
heap
page read and write
1061000
unkown
page execute and read and write
1CE5E000
stack
page read and write
F47000
heap
page read and write
9E0000
heap
page read and write
5050000
direct allocation
page execute and read and write
C50000
direct allocation
page read and write
14A9000
unkown
page execute and write copy
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
EDE000
stack
page read and write
4A71000
heap
page read and write
8F5000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
CB2000
heap
page read and write
4A71000
heap
page read and write
F1E000
stack
page read and write
4F2E000
stack
page read and write
C68000
heap
page read and write
4A71000
heap
page read and write
900000
heap
page read and write
4A71000
heap
page read and write
392E000
stack
page read and write
4A90000
heap
page read and write
5AC000
stack
page read and write
4A71000
heap
page read and write
3A2F000
stack
page read and write
4A71000
heap
page read and write
C50000
direct allocation
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
C50000
direct allocation
page read and write
C50000
direct allocation
page read and write
3E2E000
stack
page read and write
342E000
stack
page read and write
4A71000
heap
page read and write
CF1000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
C50000
direct allocation
page read and write
1D0FE000
stack
page read and write
14A8000
unkown
page execute and write copy
46EE000
stack
page read and write
40AE000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
FB0000
unkown
page readonly
37AF000
stack
page read and write
5030000
direct allocation
page execute and read and write
3F6E000
stack
page read and write
5070000
direct allocation
page execute and read and write
C50000
direct allocation
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
FB1000
unkown
page execute and write copy
4A71000
heap
page read and write
3A6E000
stack
page read and write
5080000
direct allocation
page execute and read and write
106D000
unkown
page execute and read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
CC7000
heap
page read and write
C50000
direct allocation
page read and write
4A71000
heap
page read and write
A8E000
stack
page read and write
8FE000
stack
page read and write
41AF000
stack
page read and write
4A71000
heap
page read and write
406F000
stack
page read and write
1D48C000
stack
page read and write
1644000
unkown
page execute and write copy
C40000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A70000
heap
page read and write
4A71000
heap
page read and write
4A73000
heap
page read and write
1D38D000
stack
page read and write
4B70000
trusted library allocation
page read and write
4A71000
heap
page read and write
FB0000
unkown
page read and write
4A71000
heap
page read and write
BBE000
stack
page read and write
2FEF000
stack
page read and write
37EE000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
F4B000
heap
page read and write
3DEF000
stack
page read and write
446E000
stack
page read and write
F8E000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
A4E000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
3BAE000
stack
page read and write
1499000
unkown
page execute and read and write
4A71000
heap
page read and write
C50000
direct allocation
page read and write
4A71000
heap
page read and write
C60000
heap
page read and write
4A71000
heap
page read and write
3B6F000
stack
page read and write
4A71000
heap
page read and write
C50000
direct allocation
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
1D24D000
stack
page read and write
356E000
stack
page read and write
4A6F000
stack
page read and write
366F000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
C50000
direct allocation
page read and write
4A71000
heap
page read and write
352F000
stack
page read and write
32EF000
stack
page read and write
1CF9E000
stack
page read and write
AB0000
heap
page read and write
45AE000
stack
page read and write
1398000
unkown
page execute and read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A80000
heap
page read and write
AB5000
heap
page read and write
1492000
unkown
page execute and read and write
5060000
direct allocation
page execute and read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
1092000
unkown
page execute and read and write
C3B000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
1D1FF000
stack
page read and write
41EE000
stack
page read and write
492F000
stack
page read and write
3CEE000
stack
page read and write
31EF000
stack
page read and write
4A71000
heap
page read and write
C50000
direct allocation
page read and write
14A8000
unkown
page execute and read and write
11FA000
unkown
page execute and read and write
CE5000
heap
page read and write
E9E000
stack
page read and write
C50000
direct allocation
page read and write
120E000
unkown
page execute and read and write
BFE000
stack
page read and write
442F000
stack
page read and write
4A71000
heap
page read and write
502F000
stack
page read and write
4A71000
heap
page read and write
36AE000
stack
page read and write
FA0000
direct allocation
page read and write
4A71000
heap
page read and write
FA0000
direct allocation
page read and write
There are 192 hidden memdumps, click here to show them.