IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpO
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37t
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5000000
direct allocation
page read and write
malicious
142E000
heap
page read and write
malicious
631000
unkown
page execute and read and write
malicious
712000
unkown
page execute and read and write
14A5000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
31BF000
stack
page read and write
4B81000
heap
page read and write
37BE000
stack
page read and write
353E000
stack
page read and write
4B81000
heap
page read and write
503E000
stack
page read and write
367E000
stack
page read and write
AEC000
unkown
page execute and read and write
4B81000
heap
page read and write
4B90000
heap
page read and write
10FE000
stack
page read and write
4B81000
heap
page read and write
38BF000
stack
page read and write
2EFE000
stack
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
493E000
stack
page read and write
5180000
direct allocation
page execute and read and write
33FE000
stack
page read and write
87A000
unkown
page execute and read and write
4BA0000
heap
page read and write
33BF000
stack
page read and write
407E000
stack
page read and write
2F80000
direct allocation
page read and write
4B81000
heap
page read and write
517E000
stack
page read and write
48FF000
stack
page read and write
1D0AE000
stack
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
5170000
direct allocation
page execute and read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
1D1AF000
stack
page read and write
D5C000
stack
page read and write
4B81000
heap
page read and write
B2D000
unkown
page execute and write copy
457E000
stack
page read and write
5160000
direct allocation
page execute and read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
4A7E000
stack
page read and write
32BF000
stack
page read and write
2F80000
direct allocation
page read and write
1473000
heap
page read and write
4B81000
heap
page read and write
2F80000
direct allocation
page read and write
2F80000
direct allocation
page read and write
4B80000
heap
page read and write
4B81000
heap
page read and write
2FB0000
heap
page read and write
2FB7000
heap
page read and write
403F000
stack
page read and write
2F80000
direct allocation
page read and write
631000
unkown
page execute and write copy
4B81000
heap
page read and write
1D06F000
stack
page read and write
47BF000
stack
page read and write
6ED000
unkown
page execute and read and write
2EBF000
stack
page read and write
1270000
heap
page read and write
4B81000
heap
page read and write
3C7F000
stack
page read and write
46BE000
stack
page read and write
B2C000
unkown
page execute and write copy
4B81000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
88E000
unkown
page execute and read and write
3DFE000
stack
page read and write
2F80000
direct allocation
page read and write
4B81000
heap
page read and write
DB0000
heap
page read and write
4B81000
heap
page read and write
120D000
stack
page read and write
2FA0000
direct allocation
page read and write
5170000
direct allocation
page execute and read and write
4B81000
heap
page read and write
1400000
heap
page read and write
3CBE000
stack
page read and write
4B81000
heap
page read and write
13BE000
stack
page read and write
1260000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
2F80000
direct allocation
page read and write
4B81000
heap
page read and write
A17000
unkown
page execute and read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
3B3F000
stack
page read and write
630000
unkown
page readonly
124E000
stack
page read and write
417F000
stack
page read and write
38FE000
stack
page read and write
1CF6E000
stack
page read and write
4B81000
heap
page read and write
377F000
stack
page read and write
13FC000
stack
page read and write
4B81000
heap
page read and write
B14000
unkown
page execute and read and write
2F7E000
stack
page read and write
1D59D000
stack
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
161E000
stack
page read and write
5150000
direct allocation
page execute and read and write
B1E000
unkown
page execute and read and write
2F80000
direct allocation
page read and write
4B81000
heap
page read and write
2FBB000
heap
page read and write
1488000
heap
page read and write
1CF2F000
stack
page read and write
2F80000
direct allocation
page read and write
4B81000
heap
page read and write
2FA0000
direct allocation
page read and write
3A3E000
stack
page read and write
4B81000
heap
page read and write
42BE000
stack
page read and write
2F80000
direct allocation
page read and write
3EFF000
stack
page read and write
CCA000
unkown
page execute and write copy
4B81000
heap
page read and write
4B81000
heap
page read and write
30BF000
stack
page read and write
4B81000
heap
page read and write
2F80000
direct allocation
page read and write
4B81000
heap
page read and write
2F3E000
stack
page read and write
4B81000
heap
page read and write
6E1000
unkown
page execute and read and write
4B81000
heap
page read and write
41BE000
stack
page read and write
B2C000
unkown
page execute and read and write
1D49E000
stack
page read and write
1275000
heap
page read and write
4FC0000
trusted library allocation
page read and write
4B81000
heap
page read and write
1D45D000
stack
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
47FE000
stack
page read and write
5140000
direct allocation
page execute and read and write
1D35D000
stack
page read and write
2F80000
direct allocation
page read and write
CC9000
unkown
page execute and read and write
467F000
stack
page read and write
4B81000
heap
page read and write
453F000
stack
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
3F3E000
stack
page read and write
4A3F000
stack
page read and write
4B81000
heap
page read and write
137E000
stack
page read and write
363F000
stack
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
443E000
stack
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
1D20E000
stack
page read and write
3B7E000
stack
page read and write
42FE000
stack
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
1428000
heap
page read and write
4B81000
heap
page read and write
3DBF000
stack
page read and write
2F80000
direct allocation
page read and write
1D30F000
stack
page read and write
5190000
direct allocation
page execute and read and write
4B7F000
stack
page read and write
2F80000
direct allocation
page read and write
43FF000
stack
page read and write
4B81000
heap
page read and write
39FF000
stack
page read and write
1420000
heap
page read and write
34FF000
stack
page read and write
10F5000
stack
page read and write
513F000
stack
page read and write
4B81000
heap
page read and write
630000
unkown
page read and write
DC0000
heap
page read and write
There are 190 hidden memdumps, click here to show them.