IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/2
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpDH
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php=k
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
159E000
heap
page read and write
malicious
991000
unkown
page execute and read and write
malicious
50D0000
direct allocation
page read and write
malicious
4C41000
heap
page read and write
4C41000
heap
page read and write
990000
unkown
page readonly
4C41000
heap
page read and write
4C41000
heap
page read and write
525E000
stack
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
383F000
stack
page read and write
4C41000
heap
page read and write
35FE000
stack
page read and write
A72000
unkown
page execute and read and write
34BE000
stack
page read and write
1D68E000
stack
page read and write
5240000
direct allocation
page execute and read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
4AFF000
stack
page read and write
BEE000
unkown
page execute and read and write
5250000
direct allocation
page execute and read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
3BFF000
stack
page read and write
3E7F000
stack
page read and write
8E0000
heap
page read and write
4C41000
heap
page read and write
3077000
heap
page read and write
4C41000
heap
page read and write
3D3F000
stack
page read and write
4C41000
heap
page read and write
14FE000
stack
page read and write
35BF000
stack
page read and write
3070000
heap
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
178E000
stack
page read and write
347F000
stack
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
1D3FF000
stack
page read and write
991000
unkown
page execute and write copy
4C41000
heap
page read and write
11DB000
stack
page read and write
4C41000
heap
page read and write
104A000
unkown
page execute and write copy
1D05E000
stack
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
15F7000
heap
page read and write
A41000
unkown
page execute and read and write
4C41000
heap
page read and write
3EBE000
stack
page read and write
3D7E000
stack
page read and write
4C41000
heap
page read and write
44BF000
stack
page read and write
5220000
direct allocation
page execute and read and write
306E000
stack
page read and write
1D44D000
stack
page read and write
1580000
direct allocation
page read and write
4C41000
heap
page read and write
115E000
stack
page read and write
EA0000
unkown
page execute and read and write
5250000
direct allocation
page execute and read and write
4C41000
heap
page read and write
1580000
direct allocation
page read and write
5080000
trusted library allocation
page read and write
44FE000
stack
page read and write
E92000
unkown
page execute and read and write
5230000
direct allocation
page execute and read and write
387E000
stack
page read and write
1D15F000
stack
page read and write
1580000
direct allocation
page read and write
49FE000
stack
page read and write
437F000
stack
page read and write
4C41000
heap
page read and write
1580000
direct allocation
page read and write
E66000
unkown
page execute and read and write
1580000
direct allocation
page read and write
1580000
direct allocation
page read and write
4C41000
heap
page read and write
49BF000
stack
page read and write
1580000
direct allocation
page read and write
40FF000
stack
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
875000
stack
page read and write
1D29E000
stack
page read and write
1580000
direct allocation
page read and write
4C41000
heap
page read and write
48BE000
stack
page read and write
3ABF000
stack
page read and write
153E000
stack
page read and write
EA1000
unkown
page execute and write copy
4C41000
heap
page read and write
4C41000
heap
page read and write
8A5000
heap
page read and write
477E000
stack
page read and write
463E000
stack
page read and write
BDA000
unkown
page execute and read and write
397F000
stack
page read and write
11E0000
heap
page read and write
302F000
stack
page read and write
1D7CD000
stack
page read and write
337F000
stack
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
3C3E000
stack
page read and write
4C41000
heap
page read and write
50D0000
direct allocation
page read and write
423F000
stack
page read and write
5260000
direct allocation
page execute and read and write
4C41000
heap
page read and write
5280000
direct allocation
page execute and read and write
4C41000
heap
page read and write
990000
unkown
page read and write
4C41000
heap
page read and write
1D54E000
stack
page read and write
4C41000
heap
page read and write
413E000
stack
page read and write
510E000
stack
page read and write
1580000
direct allocation
page read and write
8F0000
heap
page read and write
8A0000
heap
page read and write
1D2FE000
stack
page read and write
1580000
direct allocation
page read and write
4C41000
heap
page read and write
119E000
stack
page read and write
43BE000
stack
page read and write
1580000
direct allocation
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
1604000
heap
page read and write
1580000
direct allocation
page read and write
4C41000
heap
page read and write
473F000
stack
page read and write
50D0000
direct allocation
page read and write
95E000
stack
page read and write
159A000
heap
page read and write
E89000
unkown
page execute and read and write
487F000
stack
page read and write
77C000
stack
page read and write
D7F000
unkown
page execute and read and write
4C3F000
stack
page read and write
4C60000
heap
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
EA0000
unkown
page execute and write copy
87E000
stack
page read and write
1D19E000
stack
page read and write
4C41000
heap
page read and write
1D58D000
stack
page read and write
3FBF000
stack
page read and write
4C50000
heap
page read and write
1590000
heap
page read and write
4C41000
heap
page read and write
1580000
direct allocation
page read and write
36FF000
stack
page read and write
4C41000
heap
page read and write
3AFE000
stack
page read and write
4C57000
heap
page read and write
373E000
stack
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
317F000
stack
page read and write
1D01F000
stack
page read and write
4C41000
heap
page read and write
327F000
stack
page read and write
4C41000
heap
page read and write
15E4000
heap
page read and write
4C40000
heap
page read and write
1613000
heap
page read and write
39BE000
stack
page read and write
4C41000
heap
page read and write
A4D000
unkown
page execute and read and write
4C41000
heap
page read and write
157E000
stack
page read and write
4C41000
heap
page read and write
1D7E4000
heap
page read and write
4C41000
heap
page read and write
1D6CD000
stack
page read and write
427D000
stack
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
4B3E000
stack
page read and write
4C41000
heap
page read and write
4C41000
heap
page read and write
980000
heap
page read and write
4C41000
heap
page read and write
1580000
direct allocation
page read and write
1049000
unkown
page execute and read and write
5270000
direct allocation
page execute and read and write
45FF000
stack
page read and write
3FFE000
stack
page read and write
520F000
stack
page read and write
1D7E0000
heap
page read and write
There are 196 hidden memdumps, click here to show them.