IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpW
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpg
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
EE1000
unkown
page execute and read and write
malicious
53C0000
direct allocation
page read and write
malicious
166E000
heap
page read and write
malicious
4F41000
heap
page read and write
E74000
heap
page read and write
EBE000
stack
page read and write
1650000
direct allocation
page read and write
5380000
trusted library allocation
page read and write
403F000
stack
page read and write
5520000
direct allocation
page execute and read and write
4F41000
heap
page read and write
E74000
heap
page read and write
EE1000
unkown
page execute and write copy
E74000
heap
page read and write
4F41000
heap
page read and write
E74000
heap
page read and write
E74000
heap
page read and write
3DFE000
stack
page read and write
4F3F000
stack
page read and write
4F41000
heap
page read and write
F9D000
unkown
page execute and read and write
42FE000
stack
page read and write
4F41000
heap
page read and write
47BF000
stack
page read and write
1650000
direct allocation
page read and write
E74000
heap
page read and write
E74000
heap
page read and write
1D46F000
stack
page read and write
E74000
heap
page read and write
1650000
direct allocation
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
53FE000
stack
page read and write
D85000
stack
page read and write
4F41000
heap
page read and write
E74000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
54FF000
stack
page read and write
4F41000
heap
page read and write
E74000
heap
page read and write
4BBE000
stack
page read and write
317B000
heap
page read and write
4CFE000
stack
page read and write
5530000
direct allocation
page execute and read and write
EE0000
unkown
page read and write
4F40000
heap
page read and write
4F41000
heap
page read and write
EE0000
unkown
page readonly
E74000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
E74000
heap
page read and write
4F41000
heap
page read and write
16EF000
heap
page read and write
DF0000
heap
page read and write
ED0000
heap
page read and write
47FE000
stack
page read and write
1D4AE000
stack
page read and write
39FF000
stack
page read and write
4F41000
heap
page read and write
1650000
direct allocation
page read and write
DE0000
heap
page read and write
16B3000
heap
page read and write
3B3F000
stack
page read and write
4F41000
heap
page read and write
38FE000
stack
page read and write
D8E000
stack
page read and write
16E6000
heap
page read and write
1572000
unkown
page execute and write copy
1D97C000
stack
page read and write
4F41000
heap
page read and write
1650000
direct allocation
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
1660000
heap
page read and write
4F41000
heap
page read and write
E74000
heap
page read and write
4F41000
heap
page read and write
E74000
heap
page read and write
4F41000
heap
page read and write
3170000
heap
page read and write
E74000
heap
page read and write
457E000
stack
page read and write
4DFF000
stack
page read and write
4F41000
heap
page read and write
13C9000
unkown
page execute and read and write
353E000
stack
page read and write
4F41000
heap
page read and write
E74000
heap
page read and write
4F41000
heap
page read and write
4CBF000
stack
page read and write
E74000
heap
page read and write
12C5000
unkown
page execute and read and write
4F41000
heap
page read and write
E74000
heap
page read and write
327F000
stack
page read and write
FC2000
unkown
page execute and read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
38BF000
stack
page read and write
4F41000
heap
page read and write
43FF000
stack
page read and write
E74000
heap
page read and write
4F41000
heap
page read and write
363F000
stack
page read and write
453F000
stack
page read and write
E74000
heap
page read and write
3F3E000
stack
page read and write
E74000
heap
page read and write
1D87D000
stack
page read and write
E74000
heap
page read and write
185E000
stack
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
E74000
heap
page read and write
E74000
heap
page read and write
4F41000
heap
page read and write
3150000
direct allocation
page read and write
1650000
direct allocation
page read and write
4A3F000
stack
page read and write
1D83E000
stack
page read and write
4F41000
heap
page read and write
467F000
stack
page read and write
13D8000
unkown
page execute and write copy
4F41000
heap
page read and write
4F41000
heap
page read and write
113E000
unkown
page execute and read and write
E5E000
stack
page read and write
1650000
direct allocation
page read and write
46BE000
stack
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
1D32F000
stack
page read and write
3EFF000
stack
page read and write
33FE000
stack
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
E74000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
E74000
heap
page read and write
195E000
stack
page read and write
3CBE000
stack
page read and write
1D73D000
stack
page read and write
3C7F000
stack
page read and write
32BB000
stack
page read and write
4F41000
heap
page read and write
1650000
direct allocation
page read and write
1D6FF000
stack
page read and write
E74000
heap
page read and write
E74000
heap
page read and write
E74000
heap
page read and write
E74000
heap
page read and write
1650000
direct allocation
page read and write
5520000
direct allocation
page execute and read and write
4F41000
heap
page read and write
E74000
heap
page read and write
37BE000
stack
page read and write
166A000
heap
page read and write
E74000
heap
page read and write
C8C000
stack
page read and write
5390000
heap
page read and write
4A7E000
stack
page read and write
34FF000
stack
page read and write
1650000
direct allocation
page read and write
1650000
direct allocation
page read and write
E74000
heap
page read and write
E74000
heap
page read and write
13C2000
unkown
page execute and read and write
5510000
direct allocation
page execute and read and write
4F60000
heap
page read and write
E70000
heap
page read and write
407E000
stack
page read and write
1650000
direct allocation
page read and write
1650000
direct allocation
page read and write
5550000
direct allocation
page execute and read and write
1D22E000
stack
page read and write
13D8000
unkown
page execute and read and write
E74000
heap
page read and write
313E000
stack
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F50000
heap
page read and write
4F41000
heap
page read and write
417F000
stack
page read and write
3B7E000
stack
page read and write
F91000
unkown
page execute and read and write
3A3E000
stack
page read and write
3177000
heap
page read and write
1D36E000
stack
page read and write
3DBF000
stack
page read and write
33BF000
stack
page read and write
5540000
direct allocation
page execute and read and write
48FF000
stack
page read and write
1650000
direct allocation
page read and write
42BF000
stack
page read and write
1D5AE000
stack
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
4F41000
heap
page read and write
5500000
direct allocation
page execute and read and write
3150000
direct allocation
page read and write
E74000
heap
page read and write
4B7F000
stack
page read and write
13D9000
unkown
page execute and write copy
4F41000
heap
page read and write
4F41000
heap
page read and write
377F000
stack
page read and write
4E3E000
stack
page read and write
1D5FE000
stack
page read and write
139F000
unkown
page execute and read and write
4F41000
heap
page read and write
112A000
unkown
page execute and read and write
4F41000
heap
page read and write
41BE000
stack
page read and write
16CB000
heap
page read and write
367E000
stack
page read and write
493E000
stack
page read and write
443E000
stack
page read and write
4F41000
heap
page read and write
1571000
unkown
page execute and read and write
3160000
direct allocation
page execute and read and write
4F41000
heap
page read and write
E74000
heap
page read and write
4F41000
heap
page read and write
There are 220 hidden memdumps, click here to show them.