IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpTW
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpxv
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
F01000
unkown
page execute and read and write
malicious
88E000
heap
page read and write
malicious
4AF0000
direct allocation
page read and write
malicious
8D2000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
3DEE000
stack
page read and write
4671000
heap
page read and write
ED0000
direct allocation
page read and write
6F4000
heap
page read and write
F00000
unkown
page readonly
6F4000
heap
page read and write
157A000
unkown
page execute and write copy
6F4000
heap
page read and write
442E000
stack
page read and write
1CCDF000
stack
page read and write
2AA7000
heap
page read and write
12DB000
unkown
page execute and read and write
6F4000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
4C50000
direct allocation
page execute and read and write
2AAB000
heap
page read and write
6F4000
heap
page read and write
1DC000
stack
page read and write
4671000
heap
page read and write
6F4000
heap
page read and write
ED0000
direct allocation
page read and write
ED0000
direct allocation
page read and write
6F4000
heap
page read and write
4671000
heap
page read and write
13EA000
unkown
page execute and write copy
ED0000
direct allocation
page read and write
456E000
stack
page read and write
6E0000
heap
page read and write
1D14E000
stack
page read and write
8E6000
heap
page read and write
6F4000
heap
page read and write
2EEE000
stack
page read and write
88A000
heap
page read and write
33AF000
stack
page read and write
ED0000
direct allocation
page read and write
6F4000
heap
page read and write
7FE000
stack
page read and write
4671000
heap
page read and write
4670000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
466F000
stack
page read and write
4FE000
stack
page read and write
4671000
heap
page read and write
3EEF000
stack
page read and write
4671000
heap
page read and write
2A90000
direct allocation
page execute and read and write
6F4000
heap
page read and write
2CAF000
stack
page read and write
ED0000
direct allocation
page read and write
38AF000
stack
page read and write
4671000
heap
page read and write
1D250000
heap
page read and write
6F4000
heap
page read and write
3A2E000
stack
page read and write
37AE000
stack
page read and write
4F5000
stack
page read and write
ED0000
direct allocation
page read and write
6F4000
heap
page read and write
ED0000
direct allocation
page read and write
4671000
heap
page read and write
ED0000
direct allocation
page read and write
3CAE000
stack
page read and write
1CB9F000
stack
page read and write
13E9000
unkown
page execute and write copy
1C95E000
stack
page read and write
6F4000
heap
page read and write
376F000
stack
page read and write
4671000
heap
page read and write
42AF000
stack
page read and write
4671000
heap
page read and write
ED0000
direct allocation
page read and write
530000
heap
page read and write
13D3000
unkown
page execute and read and write
4671000
heap
page read and write
4AC0000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
114A000
unkown
page execute and read and write
4671000
heap
page read and write
4671000
heap
page read and write
3C6F000
stack
page read and write
1D0AC000
stack
page read and write
6F4000
heap
page read and write
312F000
stack
page read and write
362F000
stack
page read and write
6F4000
heap
page read and write
6F4000
heap
page read and write
E4E000
stack
page read and write
4671000
heap
page read and write
4C30000
direct allocation
page execute and read and write
42EE000
stack
page read and write
4671000
heap
page read and write
2A8F000
stack
page read and write
316E000
stack
page read and write
FB1000
unkown
page execute and read and write
6F4000
heap
page read and write
ED0000
direct allocation
page read and write
4671000
heap
page read and write
4C2F000
stack
page read and write
E8E000
stack
page read and write
1D24E000
stack
page read and write
4671000
heap
page read and write
452F000
stack
page read and write
6F4000
heap
page read and write
3B2F000
stack
page read and write
A7F000
stack
page read and write
4671000
heap
page read and write
34EF000
stack
page read and write
4671000
heap
page read and write
6F4000
heap
page read and write
6F4000
heap
page read and write
6F4000
heap
page read and write
87B000
stack
page read and write
1CF6E000
stack
page read and write
3F2E000
stack
page read and write
4671000
heap
page read and write
3B6E000
stack
page read and write
4671000
heap
page read and write
6BE000
stack
page read and write
EF0000
direct allocation
page read and write
6F4000
heap
page read and write
610000
heap
page read and write
FE2000
unkown
page execute and read and write
6F4000
heap
page read and write
ED0000
direct allocation
page read and write
4C60000
direct allocation
page execute and read and write
ECE000
stack
page read and write
FBD000
unkown
page execute and read and write
302E000
stack
page read and write
4671000
heap
page read and write
366E000
stack
page read and write
416F000
stack
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
13E9000
unkown
page execute and read and write
4671000
heap
page read and write
1CE1F000
stack
page read and write
6F4000
heap
page read and write
13DA000
unkown
page execute and read and write
2BAF000
stack
page read and write
115E000
unkown
page execute and read and write
1CBDE000
stack
page read and write
39EF000
stack
page read and write
1CD1E000
stack
page read and write
1CE6D000
stack
page read and write
38EE000
stack
page read and write
ED0000
direct allocation
page read and write
4B2E000
stack
page read and write
406E000
stack
page read and write
F00000
unkown
page read and write
1CA5F000
stack
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
6F4000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
1579000
unkown
page execute and read and write
1CFAD000
stack
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
4C80000
direct allocation
page execute and read and write
4671000
heap
page read and write
4671000
heap
page read and write
13B1000
unkown
page execute and read and write
903000
heap
page read and write
6F4000
heap
page read and write
3DAF000
stack
page read and write
2DAF000
stack
page read and write
2FEF000
stack
page read and write
4690000
heap
page read and write
6F0000
heap
page read and write
4C50000
direct allocation
page execute and read and write
4671000
heap
page read and write
6F4000
heap
page read and write
6F4000
heap
page read and write
2AA0000
heap
page read and write
4671000
heap
page read and write
402F000
stack
page read and write
90F000
heap
page read and write
41AE000
stack
page read and write
EF0000
direct allocation
page read and write
4671000
heap
page read and write
6F4000
heap
page read and write
4671000
heap
page read and write
6F4000
heap
page read and write
4680000
heap
page read and write
4671000
heap
page read and write
326F000
stack
page read and write
32AE000
stack
page read and write
4671000
heap
page read and write
6F4000
heap
page read and write
4671000
heap
page read and write
2EAF000
stack
page read and write
33EE000
stack
page read and write
4675000
heap
page read and write
4671000
heap
page read and write
4671000
heap
page read and write
6F4000
heap
page read and write
67D000
stack
page read and write
F01000
unkown
page execute and write copy
83E000
stack
page read and write
43EF000
stack
page read and write
4671000
heap
page read and write
4C70000
direct allocation
page execute and read and write
880000
heap
page read and write
4AB0000
trusted library allocation
page read and write
4671000
heap
page read and write
6F4000
heap
page read and write
1CA9E000
stack
page read and write
6F4000
heap
page read and write
352E000
stack
page read and write
ED0000
direct allocation
page read and write
4C40000
direct allocation
page execute and read and write
There are 218 hidden memdumps, click here to show them.