IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/E
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/2
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpy
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4E60000
direct allocation
page read and write
malicious
100E000
heap
page read and write
malicious
131000
unkown
page execute and read and write
malicious
2C10000
direct allocation
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
3AEE000
stack
page read and write
2D2F000
stack
page read and write
FEE000
stack
page read and write
40EF000
stack
page read and write
2C20000
heap
page read and write
346F000
stack
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
1D17F000
stack
page read and write
4FEE000
stack
page read and write
462E000
stack
page read and write
49AF000
stack
page read and write
131000
unkown
page execute and write copy
49D1000
heap
page read and write
382F000
stack
page read and write
4FB0000
direct allocation
page execute and read and write
1D2CE000
stack
page read and write
130000
unkown
page read and write
2E2F000
stack
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
1051000
heap
page read and write
49D1000
heap
page read and write
1089000
heap
page read and write
436F000
stack
page read and write
2C10000
direct allocation
page read and write
5FB000
unkown
page execute and read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
476E000
stack
page read and write
100A000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
F20000
heap
page read and write
2C10000
direct allocation
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
1CD9F000
stack
page read and write
49D1000
heap
page read and write
2C10000
direct allocation
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
12CF000
stack
page read and write
49D1000
heap
page read and write
30EE000
stack
page read and write
1D5B2000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
1CF1E000
stack
page read and write
1053000
heap
page read and write
FAE000
stack
page read and write
49D1000
heap
page read and write
2FAE000
stack
page read and write
2BBE000
stack
page read and write
107A000
heap
page read and write
BCC000
stack
page read and write
49D0000
heap
page read and write
386E000
stack
page read and write
49D1000
heap
page read and write
35EE000
stack
page read and write
49D1000
heap
page read and write
1D07E000
stack
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
3D6E000
stack
page read and write
7D4000
unkown
page execute and read and write
49D1000
heap
page read and write
2C27000
heap
page read and write
30AF000
stack
page read and write
486F000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
49D1000
heap
page read and write
3AAF000
stack
page read and write
3EAE000
stack
page read and write
1068000
heap
page read and write
332F000
stack
page read and write
1D01F000
stack
page read and write
44EE000
stack
page read and write
4E10000
trusted library allocation
page read and write
61D000
unkown
page execute and read and write
625000
unkown
page execute and read and write
49D1000
heap
page read and write
4E60000
direct allocation
page read and write
49D1000
heap
page read and write
1000000
heap
page read and write
4F9F000
stack
page read and write
37A000
unkown
page execute and read and write
2F6F000
stack
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
F50000
heap
page read and write
49D1000
heap
page read and write
422E000
stack
page read and write
7D5000
unkown
page execute and write copy
396F000
stack
page read and write
51C000
unkown
page execute and read and write
49D1000
heap
page read and write
1CEDF000
stack
page read and write
336E000
stack
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
2C10000
direct allocation
page read and write
35AF000
stack
page read and write
49D1000
heap
page read and write
49D6000
heap
page read and write
2E6E000
stack
page read and write
2BFE000
stack
page read and write
44AF000
stack
page read and write
4FC0000
direct allocation
page execute and read and write
EF5000
stack
page read and write
F30000
heap
page read and write
1ED000
unkown
page execute and read and write
49D1000
heap
page read and write
1D5AF000
stack
page read and write
38E000
unkown
page execute and read and write
635000
unkown
page execute and write copy
49D1000
heap
page read and write
49D1000
heap
page read and write
2C10000
direct allocation
page read and write
4FE0000
direct allocation
page execute and read and write
1D5B0000
heap
page read and write
1E1000
unkown
page execute and read and write
45EF000
stack
page read and write
3C2E000
stack
page read and write
13CF000
stack
page read and write
49D1000
heap
page read and write
472F000
stack
page read and write
34AE000
stack
page read and write
3FEE000
stack
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
2C10000
direct allocation
page read and write
2C10000
direct allocation
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
5000000
direct allocation
page execute and read and write
2C10000
direct allocation
page read and write
F55000
heap
page read and write
EFE000
stack
page read and write
49F0000
heap
page read and write
31EF000
stack
page read and write
49D1000
heap
page read and write
2C10000
direct allocation
page read and write
4FF0000
direct allocation
page execute and read and write
3FAF000
stack
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
2C10000
direct allocation
page read and write
1CDDE000
stack
page read and write
43AE000
stack
page read and write
49E0000
heap
page read and write
4E9E000
stack
page read and write
1D30D000
stack
page read and write
3BEF000
stack
page read and write
39AE000
stack
page read and write
49D1000
heap
page read and write
426E000
stack
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
322E000
stack
page read and write
4E60000
direct allocation
page read and write
2C10000
direct allocation
page read and write
2C10000
direct allocation
page read and write
2C00000
heap
page read and write
49D1000
heap
page read and write
2C2B000
heap
page read and write
49D1000
heap
page read and write
212000
unkown
page execute and read and write
48AE000
stack
page read and write
634000
unkown
page execute and write copy
634000
unkown
page execute and read and write
130000
unkown
page readonly
4FE0000
direct allocation
page execute and read and write
2C10000
direct allocation
page read and write
36EF000
stack
page read and write
1D1CD000
stack
page read and write
49B0000
heap
page read and write
49D1000
heap
page read and write
3E6F000
stack
page read and write
49D1000
heap
page read and write
1D40C000
stack
page read and write
1094000
heap
page read and write
1D4AE000
stack
page read and write
412E000
stack
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
372E000
stack
page read and write
3D2F000
stack
page read and write
There are 198 hidden memdumps, click here to show them.