IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/e2b1563c6670f193.php-
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php/
unknown
malicious
http://185.215.113.37/X
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpU
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4AE0000
direct allocation
page read and write
malicious
E2E000
heap
page read and write
malicious
561000
unkown
page execute and read and write
malicious
E10000
direct allocation
page read and write
4C40000
direct allocation
page execute and read and write
4C60000
direct allocation
page execute and read and write
E20000
heap
page read and write
378E000
stack
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
7AA000
unkown
page execute and read and write
2ECE000
stack
page read and write
4AE0000
direct allocation
page read and write
1CF9D000
stack
page read and write
43CF000
stack
page read and write
A2F000
unkown
page execute and read and write
4651000
heap
page read and write
4C30000
direct allocation
page execute and read and write
4651000
heap
page read and write
4651000
heap
page read and write
A53000
unkown
page execute and read and write
4651000
heap
page read and write
2947000
heap
page read and write
1CA2F000
stack
page read and write
400F000
stack
page read and write
E10000
direct allocation
page read and write
42CE000
stack
page read and write
1CA6E000
stack
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
E10000
direct allocation
page read and write
4651000
heap
page read and write
3A0E000
stack
page read and write
4651000
heap
page read and write
CD5000
heap
page read and write
4651000
heap
page read and write
E10000
direct allocation
page read and write
4651000
heap
page read and write
2FCF000
stack
page read and write
1CCAF000
stack
page read and write
C8E000
stack
page read and write
4651000
heap
page read and write
61D000
unkown
page execute and read and write
4750000
trusted library allocation
page read and write
4B1E000
stack
page read and write
4651000
heap
page read and write
611000
unkown
page execute and read and write
E10000
direct allocation
page read and write
4651000
heap
page read and write
4650000
heap
page read and write
E10000
direct allocation
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
E10000
direct allocation
page read and write
E10000
direct allocation
page read and write
1CF5C000
stack
page read and write
4651000
heap
page read and write
328E000
stack
page read and write
4651000
heap
page read and write
34CF000
stack
page read and write
4C6E000
stack
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
101E000
stack
page read and write
111E000
stack
page read and write
4651000
heap
page read and write
414F000
stack
page read and write
3C4F000
stack
page read and write
C0C000
unkown
page execute and write copy
4651000
heap
page read and write
4651000
heap
page read and write
DF0000
heap
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
C4E000
stack
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
4AE0000
direct allocation
page read and write
4FE000
stack
page read and write
38CE000
stack
page read and write
2C4F000
stack
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
2E8F000
stack
page read and write
E87000
heap
page read and write
1CD0E000
stack
page read and write
4C80000
direct allocation
page execute and read and write
94E000
unkown
page execute and read and write
374F000
stack
page read and write
3D8F000
stack
page read and write
CD0000
heap
page read and write
1F0000
heap
page read and write
4664000
heap
page read and write
E28000
heap
page read and write
28FE000
stack
page read and write
4C60000
direct allocation
page execute and read and write
338F000
stack
page read and write
4651000
heap
page read and write
4660000
heap
page read and write
500000
heap
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
E10000
direct allocation
page read and write
4C1F000
stack
page read and write
DEC000
stack
page read and write
310F000
stack
page read and write
C0B000
unkown
page execute and read and write
4651000
heap
page read and write
4F5000
stack
page read and write
4651000
heap
page read and write
1D09E000
stack
page read and write
4C70000
direct allocation
page execute and read and write
4651000
heap
page read and write
4651000
heap
page read and write
EA2000
heap
page read and write
A5B000
unkown
page execute and read and write
4C90000
direct allocation
page execute and read and write
440E000
stack
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
3B0F000
stack
page read and write
4651000
heap
page read and write
3DCE000
stack
page read and write
2940000
heap
page read and write
324F000
stack
page read and write
A6A000
unkown
page execute and read and write
4651000
heap
page read and write
E10000
direct allocation
page read and write
2B4F000
stack
page read and write
364E000
stack
page read and write
A6A000
unkown
page execute and write copy
3F0E000
stack
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
454E000
stack
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
1CE0F000
stack
page read and write
E10000
direct allocation
page read and write
E75000
heap
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
642000
unkown
page execute and read and write
4651000
heap
page read and write
360F000
stack
page read and write
39CF000
stack
page read and write
2D4F000
stack
page read and write
561000
unkown
page execute and write copy
CCE000
stack
page read and write
4651000
heap
page read and write
3ECF000
stack
page read and write
4651000
heap
page read and write
350E000
stack
page read and write
2A4F000
stack
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
418E000
stack
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
3C8E000
stack
page read and write
560000
unkown
page readonly
33CE000
stack
page read and write
293E000
stack
page read and write
2D8E000
stack
page read and write
4651000
heap
page read and write
4C50000
direct allocation
page execute and read and write
550000
heap
page read and write
4651000
heap
page read and write
E10000
direct allocation
page read and write
428F000
stack
page read and write
300E000
stack
page read and write
4651000
heap
page read and write
19C000
stack
page read and write
450F000
stack
page read and write
464F000
stack
page read and write
1CBAE000
stack
page read and write
4651000
heap
page read and write
314E000
stack
page read and write
1CE5E000
stack
page read and write
560000
unkown
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
7BE000
unkown
page execute and read and write
4651000
heap
page read and write
A6B000
unkown
page execute and write copy
4670000
heap
page read and write
294B000
heap
page read and write
404E000
stack
page read and write
1CB6E000
stack
page read and write
4651000
heap
page read and write
3B4E000
stack
page read and write
4651000
heap
page read and write
388F000
stack
page read and write
E10000
direct allocation
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
E10000
direct allocation
page read and write
There are 192 hidden memdumps, click here to show them.