IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/e2b1563c6670f193.phpn
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php=
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpR
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php)
unknown
malicious
http://185.215.113.37/K
unknown
malicious
http://185.215.113.37D
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
D8E000
heap
page read and write
malicious
EC1000
unkown
page execute and read and write
malicious
50D0000
direct allocation
page read and write
malicious
4B0F000
stack
page read and write
CB4000
heap
page read and write
4C51000
heap
page read and write
CB4000
heap
page read and write
13C3000
unkown
page execute and read and write
3D4F000
stack
page read and write
CB4000
heap
page read and write
1D2AF000
stack
page read and write
CFE000
stack
page read and write
384F000
stack
page read and write
13C3000
unkown
page execute and write copy
CB4000
heap
page read and write
4C51000
heap
page read and write
2FCE000
stack
page read and write
4C51000
heap
page read and write
D88000
heap
page read and write
1D43E000
stack
page read and write
CB4000
heap
page read and write
350F000
stack
page read and write
4C51000
heap
page read and write
C90000
direct allocation
page read and write
13AA000
unkown
page execute and read and write
374E000
stack
page read and write
EC0000
unkown
page read and write
1D1AE000
stack
page read and write
12A6000
unkown
page execute and read and write
CB4000
heap
page read and write
4C51000
heap
page read and write
C90000
direct allocation
page read and write
400E000
stack
page read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
CB4000
heap
page read and write
5210000
direct allocation
page execute and read and write
464E000
stack
page read and write
CB0000
heap
page read and write
7E0000
heap
page read and write
5250000
direct allocation
page execute and read and write
2F0E000
stack
page read and write
4C51000
heap
page read and write
C6E000
stack
page read and write
C90000
direct allocation
page read and write
510E000
stack
page read and write
3C4E000
stack
page read and write
1D06E000
stack
page read and write
1D800000
heap
page read and write
460F000
stack
page read and write
3ECE000
stack
page read and write
2F4E000
stack
page read and write
320F000
stack
page read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
1D2EE000
stack
page read and write
CB4000
heap
page read and write
330F000
stack
page read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
410F000
stack
page read and write
C90000
direct allocation
page read and write
4C51000
heap
page read and write
4C50000
heap
page read and write
4C51000
heap
page read and write
1D53C000
stack
page read and write
488F000
stack
page read and write
3B0E000
stack
page read and write
C90000
direct allocation
page read and write
1D57D000
stack
page read and write
1385000
unkown
page execute and read and write
340F000
stack
page read and write
C80000
heap
page read and write
4C51000
heap
page read and write
CB4000
heap
page read and write
CB4000
heap
page read and write
5220000
direct allocation
page execute and read and write
1D67E000
stack
page read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
2FE0000
direct allocation
page execute and read and write
398F000
stack
page read and write
414E000
stack
page read and write
CB4000
heap
page read and write
CB4000
heap
page read and write
CB4000
heap
page read and write
CB4000
heap
page read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
CB4000
heap
page read and write
5230000
direct allocation
page execute and read and write
4C51000
heap
page read and write
C90000
direct allocation
page read and write
CB4000
heap
page read and write
3ACF000
stack
page read and write
49CF000
stack
page read and write
4C51000
heap
page read and write
2F8E000
stack
page read and write
3D8E000
stack
page read and write
1566000
unkown
page execute and write copy
1D7FF000
stack
page read and write
7D0000
heap
page read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
44CF000
stack
page read and write
C90000
direct allocation
page read and write
39CE000
stack
page read and write
CB4000
heap
page read and write
13B5000
unkown
page execute and read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
4B4E000
stack
page read and write
4C51000
heap
page read and write
CB4000
heap
page read and write
CB4000
heap
page read and write
5240000
direct allocation
page execute and read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
48CE000
stack
page read and write
CB4000
heap
page read and write
310F000
stack
page read and write
F7D000
unkown
page execute and read and write
4A0E000
stack
page read and write
13C4000
unkown
page execute and write copy
111E000
unkown
page execute and read and write
478E000
stack
page read and write
DD3000
heap
page read and write
370F000
stack
page read and write
110A000
unkown
page execute and read and write
D3E000
stack
page read and write
43CE000
stack
page read and write
5090000
trusted library allocation
page read and write
360F000
stack
page read and write
4C51000
heap
page read and write
C90000
direct allocation
page read and write
CB4000
heap
page read and write
3E8F000
stack
page read and write
4C51000
heap
page read and write
428D000
stack
page read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
5090000
heap
page read and write
4C51000
heap
page read and write
AFE000
stack
page read and write
1565000
unkown
page execute and read and write
CB4000
heap
page read and write
C90000
direct allocation
page read and write
1D16F000
stack
page read and write
CB4000
heap
page read and write
E02000
heap
page read and write
3000000
heap
page read and write
FA2000
unkown
page execute and read and write
AF5000
stack
page read and write
4C4F000
stack
page read and write
CB4000
heap
page read and write
F71000
unkown
page execute and read and write
4C51000
heap
page read and write
D7E000
stack
page read and write
388E000
stack
page read and write
4C51000
heap
page read and write
DE7000
heap
page read and write
4C70000
heap
page read and write
1D3EF000
stack
page read and write
1CF2E000
stack
page read and write
450E000
stack
page read and write
CB4000
heap
page read and write
438E000
stack
page read and write
1D6FE000
stack
page read and write
CB4000
heap
page read and write
CB4000
heap
page read and write
300B000
heap
page read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
CB4000
heap
page read and write
77C000
stack
page read and write
1D02F000
stack
page read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
520F000
stack
page read and write
EC1000
unkown
page execute and write copy
4C51000
heap
page read and write
C1E000
stack
page read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
474F000
stack
page read and write
4C51000
heap
page read and write
CB4000
heap
page read and write
4C62000
heap
page read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
CB4000
heap
page read and write
2FF0000
direct allocation
page execute and read and write
C90000
direct allocation
page read and write
CB4000
heap
page read and write
CB4000
heap
page read and write
1D802000
heap
page read and write
2FD0000
direct allocation
page read and write
5220000
direct allocation
page execute and read and write
C90000
direct allocation
page read and write
3C0F000
stack
page read and write
C90000
direct allocation
page read and write
4C51000
heap
page read and write
3FCF000
stack
page read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
424F000
stack
page read and write
4C51000
heap
page read and write
D80000
heap
page read and write
4C51000
heap
page read and write
166F000
stack
page read and write
4C60000
heap
page read and write
4C51000
heap
page read and write
C90000
direct allocation
page read and write
EC0000
unkown
page readonly
CB4000
heap
page read and write
CB4000
heap
page read and write
4C51000
heap
page read and write
4C51000
heap
page read and write
2FD0000
direct allocation
page read and write
C90000
direct allocation
page read and write
4C51000
heap
page read and write
CB4000
heap
page read and write
3007000
heap
page read and write
EBE000
stack
page read and write
CB4000
heap
page read and write
4C51000
heap
page read and write
CB4000
heap
page read and write
There are 221 hidden memdumps, click here to show them.