IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37a
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
461000
unkown
page execute and read and write
malicious
4BB0000
direct allocation
page read and write
malicious
E6E000
heap
page read and write
malicious
4710000
direct allocation
page read and write
4D30000
direct allocation
page execute and read and write
4721000
heap
page read and write
438E000
stack
page read and write
394F000
stack
page read and write
4710000
direct allocation
page read and write
1CEEF000
stack
page read and write
3ACE000
stack
page read and write
4721000
heap
page read and write
4721000
heap
page read and write
3E4E000
stack
page read and write
4721000
heap
page read and write
4721000
heap
page read and write
4721000
heap
page read and write
954000
unkown
page execute and read and write
4721000
heap
page read and write
3AE000
stack
page read and write
3D4000
heap
page read and write
4710000
direct allocation
page read and write
4721000
heap
page read and write
29BE000
stack
page read and write
4BB0000
direct allocation
page read and write
3D4000
heap
page read and write
115E000
stack
page read and write
4B90000
heap
page read and write
4721000
heap
page read and write
3D4000
heap
page read and write
4721000
heap
page read and write
420F000
stack
page read and write
330F000
stack
page read and write
45CF000
stack
page read and write
4721000
heap
page read and write
3D4000
heap
page read and write
3D4000
heap
page read and write
40CF000
stack
page read and write
398E000
stack
page read and write
2CCF000
stack
page read and write
1CCAE000
stack
page read and write
4721000
heap
page read and write
EE1000
heap
page read and write
4721000
heap
page read and write
4721000
heap
page read and write
3D0F000
stack
page read and write
348E000
stack
page read and write
4BB0000
direct allocation
page read and write
AE6000
unkown
page execute and read and write
4721000
heap
page read and write
3A5000
stack
page read and write
3D4000
heap
page read and write
380F000
stack
page read and write
4721000
heap
page read and write
4721000
heap
page read and write
4721000
heap
page read and write
4710000
direct allocation
page read and write
1CF3D000
stack
page read and write
3D4000
heap
page read and write
384E000
stack
page read and write
4721000
heap
page read and write
358F000
stack
page read and write
3F8F000
stack
page read and write
3D4000
heap
page read and write
105E000
stack
page read and write
4710000
direct allocation
page read and write
919000
unkown
page execute and read and write
EB2000
heap
page read and write
3D4000
heap
page read and write
1CB2F000
stack
page read and write
4721000
heap
page read and write
35CE000
stack
page read and write
4721000
heap
page read and write
3D4000
heap
page read and write
4721000
heap
page read and write
AE7000
unkown
page execute and write copy
410000
heap
page read and write
2D0E000
stack
page read and write
334E000
stack
page read and write
3D4000
heap
page read and write
E9B000
heap
page read and write
344F000
stack
page read and write
29C0000
heap
page read and write
4721000
heap
page read and write
E6A000
heap
page read and write
542000
unkown
page execute and read and write
4D30000
direct allocation
page execute and read and write
29CB000
heap
page read and write
4721000
heap
page read and write
3D4000
heap
page read and write
4CEF000
stack
page read and write
4721000
heap
page read and write
4721000
heap
page read and write
3D4000
heap
page read and write
4721000
heap
page read and write
3D4000
heap
page read and write
2BCF000
stack
page read and write
1D17C000
stack
page read and write
320E000
stack
page read and write
3D4000
heap
page read and write
844000
unkown
page execute and read and write
460000
unkown
page readonly
4721000
heap
page read and write
ECF000
heap
page read and write
4710000
direct allocation
page read and write
3D4000
heap
page read and write
4721000
heap
page read and write
3D4000
heap
page read and write
297C000
stack
page read and write
4721000
heap
page read and write
4721000
heap
page read and write
4721000
heap
page read and write
1D03E000
stack
page read and write
4721000
heap
page read and write
36CF000
stack
page read and write
4740000
heap
page read and write
511000
unkown
page execute and read and write
1CB6E000
stack
page read and write
1CDEE000
stack
page read and write
4721000
heap
page read and write
E60000
heap
page read and write
293E000
stack
page read and write
4721000
heap
page read and write
434F000
stack
page read and write
3D4000
heap
page read and write
448F000
stack
page read and write
4D40000
direct allocation
page execute and read and write
3D4000
heap
page read and write
1CA2E000
stack
page read and write
BFE000
stack
page read and write
4721000
heap
page read and write
460000
unkown
page read and write
1CC6F000
stack
page read and write
4721000
heap
page read and write
3D4000
heap
page read and write
29C7000
heap
page read and write
3D4000
heap
page read and write
4721000
heap
page read and write
93D000
unkown
page execute and read and write
2E0F000
stack
page read and write
4710000
direct allocation
page read and write
308F000
stack
page read and write
947000
unkown
page execute and read and write
4722000
heap
page read and write
4710000
direct allocation
page read and write
370E000
stack
page read and write
3D4000
heap
page read and write
4721000
heap
page read and write
4721000
heap
page read and write
4D50000
direct allocation
page execute and read and write
3BCF000
stack
page read and write
4721000
heap
page read and write
1CDAE000
stack
page read and write
954000
unkown
page execute and write copy
4710000
direct allocation
page read and write
3D4000
heap
page read and write
4721000
heap
page read and write
424E000
stack
page read and write
4D00000
direct allocation
page execute and read and write
4721000
heap
page read and write
461000
unkown
page execute and write copy
4710000
direct allocation
page read and write
3E8E000
stack
page read and write
3D4000
heap
page read and write
3D4000
heap
page read and write
4721000
heap
page read and write
4710000
direct allocation
page read and write
4710000
direct allocation
page read and write
2F8E000
stack
page read and write
470F000
stack
page read and write
4710000
direct allocation
page read and write
4721000
heap
page read and write
3D4000
heap
page read and write
3D4000
heap
page read and write
4721000
heap
page read and write
3FCE000
stack
page read and write
4721000
heap
page read and write
6AA000
unkown
page execute and read and write
3D4000
heap
page read and write
4721000
heap
page read and write
3D4000
heap
page read and write
4721000
heap
page read and write
3D4000
heap
page read and write
44CE000
stack
page read and write
4710000
direct allocation
page read and write
2E4E000
stack
page read and write
460E000
stack
page read and write
3D4000
heap
page read and write
4721000
heap
page read and write
E3D000
stack
page read and write
4721000
heap
page read and write
4721000
heap
page read and write
4820000
trusted library allocation
page read and write
1D07D000
stack
page read and write
2ACF000
stack
page read and write
420000
heap
page read and write
4730000
heap
page read and write
4D10000
direct allocation
page execute and read and write
3D4000
heap
page read and write
4721000
heap
page read and write
3D4000
heap
page read and write
3D4000
heap
page read and write
3D0000
heap
page read and write
4721000
heap
page read and write
410E000
stack
page read and write
31CF000
stack
page read and write
4721000
heap
page read and write
30CE000
stack
page read and write
2F4F000
stack
page read and write
4D20000
direct allocation
page execute and read and write
4720000
heap
page read and write
4721000
heap
page read and write
955000
unkown
page execute and write copy
4BEE000
stack
page read and write
6BE000
unkown
page execute and read and write
3D4000
heap
page read and write
3C0E000
stack
page read and write
4721000
heap
page read and write
2AC000
stack
page read and write
3D4E000
stack
page read and write
4721000
heap
page read and write
3D4000
heap
page read and write
4721000
heap
page read and write
E50000
heap
page read and write
3D4000
heap
page read and write
EC6000
heap
page read and write
51D000
unkown
page execute and read and write
4721000
heap
page read and write
3A8F000
stack
page read and write
There are 219 hidden memdumps, click here to show them.