IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpHRPb
unknown
malicious
http://185.215.113.37v
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpS
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php7b0923665da6f1
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
120E000
heap
page read and write
malicious
E1000
unkown
page execute and read and write
malicious
5130000
direct allocation
page read and write
malicious
13D4000
heap
page read and write
4C8F000
stack
page read and write
13D4000
heap
page read and write
373F000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CB0000
heap
page read and write
13D0000
heap
page read and write
4CA1000
heap
page read and write
39BF000
stack
page read and write
13D4000
heap
page read and write
35FF000
stack
page read and write
1D0BF000
stack
page read and write
5B6000
unkown
page execute and read and write
13D4000
heap
page read and write
1208000
heap
page read and write
4C90000
direct allocation
page read and write
453E000
stack
page read and write
4B8E000
stack
page read and write
1D37E000
stack
page read and write
5130000
direct allocation
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
1200000
heap
page read and write
4C90000
direct allocation
page read and write
1320000
heap
page read and write
13D4000
heap
page read and write
33BE000
stack
page read and write
403E000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
13D4000
heap
page read and write
1269000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
13D4000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
34BF000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
387F000
stack
page read and write
43BF000
stack
page read and write
4CA1000
heap
page read and write
2E77000
heap
page read and write
4A0F000
stack
page read and write
13D4000
heap
page read and write
FBE000
stack
page read and write
48CF000
stack
page read and write
4640000
heap
page read and write
2FFB000
stack
page read and write
4CA0000
heap
page read and write
13CE000
stack
page read and write
468E000
stack
page read and write
4CA1000
heap
page read and write
3DBE000
stack
page read and write
2E7B000
heap
page read and write
323F000
stack
page read and write
52E0000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
138E000
stack
page read and write
3C3F000
stack
page read and write
4CA1000
heap
page read and write
13D4000
heap
page read and write
5F4000
unkown
page execute and write copy
5130000
direct allocation
page read and write
4C90000
direct allocation
page read and write
47CE000
stack
page read and write
4CA1000
heap
page read and write
13D4000
heap
page read and write
13D4000
heap
page read and write
4C90000
direct allocation
page read and write
4CA1000
heap
page read and write
13D4000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
13D4000
heap
page read and write
52B0000
direct allocation
page execute and read and write
327E000
stack
page read and write
4C90000
direct allocation
page read and write
4CA1000
heap
page read and write
52C0000
direct allocation
page execute and read and write
50E0000
trusted library allocation
page read and write
1253000
heap
page read and write
3B3E000
stack
page read and write
4CA1000
heap
page read and write
2E70000
heap
page read and write
427F000
stack
page read and write
13D4000
heap
page read and write
1D0FE000
stack
page read and write
5F3000
unkown
page execute and write copy
4C90000
direct allocation
page read and write
52D0000
direct allocation
page execute and read and write
5280000
direct allocation
page execute and read and write
42BE000
stack
page read and write
526F000
stack
page read and write
13D4000
heap
page read and write
1D5CE000
stack
page read and write
1D1FF000
stack
page read and write
337F000
stack
page read and write
5F3000
unkown
page execute and read and write
516E000
stack
page read and write
490E000
stack
page read and write
3FFF000
stack
page read and write
3AFF000
stack
page read and write
13D4000
heap
page read and write
13D4000
heap
page read and write
4CB000
unkown
page execute and read and write
13D4000
heap
page read and write
38BE000
stack
page read and write
478F000
stack
page read and write
1CFBE000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
FB5000
stack
page read and write
13D4000
heap
page read and write
2EBE000
stack
page read and write
4CA1000
heap
page read and write
4C90000
direct allocation
page read and write
13D4000
heap
page read and write
417E000
stack
page read and write
313E000
stack
page read and write
33E000
unkown
page execute and read and write
1289000
heap
page read and write
4CA1000
heap
page read and write
3D7F000
stack
page read and write
E1000
unkown
page execute and write copy
4CA1000
heap
page read and write
1D47F000
stack
page read and write
39FE000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
3C7E000
stack
page read and write
13D4000
heap
page read and write
3EFE000
stack
page read and write
13D4000
heap
page read and write
4C90000
direct allocation
page read and write
13D4000
heap
page read and write
1D70C000
stack
page read and write
4CA1000
heap
page read and write
1C2000
unkown
page execute and read and write
413F000
stack
page read and write
1D4CD000
stack
page read and write
13D4000
heap
page read and write
4CA1000
heap
page read and write
1D23E000
stack
page read and write
4CA1000
heap
page read and write
15AF000
stack
page read and write
4C90000
direct allocation
page read and write
4CA1000
heap
page read and write
13D4000
heap
page read and write
13D4000
heap
page read and write
4C90000
direct allocation
page read and write
E0000
unkown
page read and write
463F000
stack
page read and write
363E000
stack
page read and write
52B0000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
5E4000
unkown
page execute and read and write
EBC000
stack
page read and write
13D4000
heap
page read and write
13D4000
heap
page read and write
4C90000
direct allocation
page read and write
34FE000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
13D4000
heap
page read and write
4CC0000
heap
page read and write
1310000
heap
page read and write
79D000
unkown
page execute and write copy
52A0000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
13D4000
heap
page read and write
4CA1000
heap
page read and write
377E000
stack
page read and write
79C000
unkown
page execute and read and write
13D4000
heap
page read and write
4A4E000
stack
page read and write
191000
unkown
page execute and read and write
4CA1000
heap
page read and write
13D4000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
3EBF000
stack
page read and write
2FBF000
stack
page read and write
5290000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
13D4000
heap
page read and write
5DB000
unkown
page execute and read and write
5110000
heap
page read and write
13D4000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
13D4000
heap
page read and write
4C90000
direct allocation
page read and write
4CA1000
heap
page read and write
32A000
unkown
page execute and read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
13D4000
heap
page read and write
E0000
unkown
page readonly
44FF000
stack
page read and write
16AF000
stack
page read and write
4C90000
direct allocation
page read and write
19D000
unkown
page execute and read and write
1D33E000
stack
page read and write
1280000
heap
page read and write
4CA1000
heap
page read and write
13D4000
heap
page read and write
43FE000
stack
page read and write
30FF000
stack
page read and write
4CA4000
heap
page read and write
4C90000
direct allocation
page read and write
4CA1000
heap
page read and write
1D60D000
stack
page read and write
4B4F000
stack
page read and write
There are 218 hidden memdumps, click here to show them.