IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/e2b1563c6670f193.phpN
unknown
malicious
http://185.215.113.37/p
unknown
malicious
http://185.215.113.37=
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpy
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
951000
unkown
page execute and read and write
malicious
4B20000
direct allocation
page read and write
malicious
59E000
heap
page read and write
malicious
4691000
heap
page read and write
4691000
heap
page read and write
453F000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
363F000
stack
page read and write
E37000
unkown
page execute and read and write
467F000
stack
page read and write
612000
heap
page read and write
714000
heap
page read and write
2D7F000
stack
page read and write
4691000
heap
page read and write
1CA9F000
stack
page read and write
3EFE000
stack
page read and write
4680000
direct allocation
page read and write
3B7E000
stack
page read and write
4691000
heap
page read and write
4680000
direct allocation
page read and write
4680000
direct allocation
page read and write
4680000
direct allocation
page read and write
714000
heap
page read and write
4680000
direct allocation
page read and write
714000
heap
page read and write
4691000
heap
page read and write
570000
heap
page read and write
4B00000
heap
page read and write
714000
heap
page read and write
4691000
heap
page read and write
6EE000
stack
page read and write
4C80000
direct allocation
page execute and read and write
43C000
stack
page read and write
313F000
stack
page read and write
4691000
heap
page read and write
3CBD000
stack
page read and write
3C7F000
stack
page read and write
714000
heap
page read and write
2B3E000
stack
page read and write
4680000
direct allocation
page read and write
4691000
heap
page read and write
1C99E000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
714000
heap
page read and write
714000
heap
page read and write
951000
unkown
page execute and write copy
1CBDF000
stack
page read and write
32BE000
stack
page read and write
1CEAE000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
417F000
stack
page read and write
4696000
heap
page read and write
4691000
heap
page read and write
580000
heap
page read and write
714000
heap
page read and write
1CD1F000
stack
page read and write
94B000
heap
page read and write
E45000
unkown
page execute and write copy
714000
heap
page read and write
10DE000
stack
page read and write
714000
heap
page read and write
710000
heap
page read and write
407E000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
714000
heap
page read and write
714000
heap
page read and write
42BF000
stack
page read and write
D34000
unkown
page execute and read and write
4691000
heap
page read and write
4C70000
direct allocation
page execute and read and write
714000
heap
page read and write
4680000
direct allocation
page read and write
33BF000
stack
page read and write
4690000
heap
page read and write
1CC1E000
stack
page read and write
E2F000
unkown
page execute and read and write
377F000
stack
page read and write
930000
heap
page read and write
4691000
heap
page read and write
714000
heap
page read and write
5E1000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
535000
stack
page read and write
4680000
direct allocation
page read and write
4691000
heap
page read and write
5F6000
heap
page read and write
4680000
direct allocation
page read and write
940000
heap
page read and write
2C3F000
stack
page read and write
457E000
stack
page read and write
33FE000
stack
page read and write
590000
heap
page read and write
4691000
heap
page read and write
1CADE000
stack
page read and write
BAE000
unkown
page execute and read and write
4CA0000
direct allocation
page execute and read and write
1D0EC000
stack
page read and write
443E000
stack
page read and write
38FE000
stack
page read and write
3B3F000
stack
page read and write
714000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
42FE000
stack
page read and write
4B20000
direct allocation
page read and write
E46000
unkown
page execute and write copy
947000
heap
page read and write
4680000
direct allocation
page read and write
714000
heap
page read and write
2FFF000
stack
page read and write
714000
heap
page read and write
4691000
heap
page read and write
353E000
stack
page read and write
714000
heap
page read and write
FDC000
unkown
page execute and read and write
4691000
heap
page read and write
714000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
41BE000
stack
page read and write
4B5E000
stack
page read and write
714000
heap
page read and write
714000
heap
page read and write
714000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
714000
heap
page read and write
61B000
heap
page read and write
714000
heap
page read and write
714000
heap
page read and write
1CE5F000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
8EE000
stack
page read and write
53E000
stack
page read and write
714000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
714000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
46B0000
heap
page read and write
4691000
heap
page read and write
714000
heap
page read and write
A0D000
unkown
page execute and read and write
92E000
stack
page read and write
714000
heap
page read and write
43FF000
stack
page read and write
4691000
heap
page read and write
29FE000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
3DBF000
stack
page read and write
4691000
heap
page read and write
714000
heap
page read and write
4691000
heap
page read and write
2EFE000
stack
page read and write
4680000
direct allocation
page read and write
4680000
direct allocation
page read and write
3A3E000
stack
page read and write
4790000
trusted library allocation
page read and write
4691000
heap
page read and write
46A0000
heap
page read and write
714000
heap
page read and write
B9A000
unkown
page execute and read and write
4691000
heap
page read and write
E0B000
unkown
page execute and read and write
4680000
direct allocation
page read and write
2AFF000
stack
page read and write
4691000
heap
page read and write
714000
heap
page read and write
714000
heap
page read and write
4691000
heap
page read and write
2DBE000
stack
page read and write
2C7E000
stack
page read and write
1CFAE000
stack
page read and write
4B20000
direct allocation
page read and write
950000
unkown
page readonly
4691000
heap
page read and write
303E000
stack
page read and write
4691000
heap
page read and write
FDD000
unkown
page execute and write copy
4691000
heap
page read and write
38BF000
stack
page read and write
403F000
stack
page read and write
4C5F000
stack
page read and write
4680000
direct allocation
page read and write
3DFE000
stack
page read and write
34FF000
stack
page read and write
A32000
unkown
page execute and read and write
598000
heap
page read and write
4691000
heap
page read and write
1CD5E000
stack
page read and write
39FF000
stack
page read and write
4691000
heap
page read and write
29BF000
stack
page read and write
1CFED000
stack
page read and write
4691000
heap
page read and write
28BE000
stack
page read and write
714000
heap
page read and write
2EBF000
stack
page read and write
327F000
stack
page read and write
317E000
stack
page read and write
A01000
unkown
page execute and read and write
4CB0000
direct allocation
page execute and read and write
4691000
heap
page read and write
714000
heap
page read and write
37BE000
stack
page read and write
714000
heap
page read and write
367E000
stack
page read and write
4691000
heap
page read and write
3F3E000
stack
page read and write
E45000
unkown
page execute and read and write
714000
heap
page read and write
4691000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
950000
unkown
page read and write
4C90000
direct allocation
page execute and read and write
There are 218 hidden memdumps, click here to show them.