IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/e2b1563c6670f193.phpJD
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/U
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/9
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpObL
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
611000
unkown
page execute and read and write
malicious
10FE000
heap
page read and write
malicious
4E90000
direct allocation
page read and write
malicious
4A11000
heap
page read and write
DDE000
stack
page read and write
604000
heap
page read and write
4A11000
heap
page read and write
1D1AF000
stack
page read and write
4A28000
heap
page read and write
478F000
stack
page read and write
4A0F000
stack
page read and write
4A11000
heap
page read and write
611000
unkown
page execute and write copy
604000
heap
page read and write
6CD000
unkown
page execute and read and write
314E000
stack
page read and write
4A11000
heap
page read and write
10E0000
direct allocation
page read and write
4A11000
heap
page read and write
4A11000
heap
page read and write
AF3000
unkown
page execute and write copy
D85000
stack
page read and write
43CF000
stack
page read and write
6F2000
unkown
page execute and read and write
350E000
stack
page read and write
1CDEF000
stack
page read and write
4FE0000
direct allocation
page execute and read and write
4A11000
heap
page read and write
338F000
stack
page read and write
604000
heap
page read and write
3C4F000
stack
page read and write
418E000
stack
page read and write
414F000
stack
page read and write
5000000
direct allocation
page execute and read and write
4A11000
heap
page read and write
604000
heap
page read and write
10E0000
direct allocation
page read and write
1D2FC000
stack
page read and write
604000
heap
page read and write
1D33E000
stack
page read and write
1D43E000
stack
page read and write
4A11000
heap
page read and write
4A11000
heap
page read and write
10E0000
direct allocation
page read and write
604000
heap
page read and write
57C000
stack
page read and write
604000
heap
page read and write
AF2000
unkown
page execute and write copy
ADC000
unkown
page execute and read and write
4A11000
heap
page read and write
132E000
stack
page read and write
2D0F000
stack
page read and write
4A30000
heap
page read and write
2DC0000
heap
page read and write
5E0000
heap
page read and write
4A11000
heap
page read and write
4A11000
heap
page read and write
2D8E000
stack
page read and write
1CCEE000
stack
page read and write
AE3000
unkown
page execute and read and write
4A11000
heap
page read and write
34CF000
stack
page read and write
47CE000
stack
page read and write
400F000
stack
page read and write
374F000
stack
page read and write
10E0000
direct allocation
page read and write
300E000
stack
page read and write
4A11000
heap
page read and write
4A11000
heap
page read and write
3A0E000
stack
page read and write
490E000
stack
page read and write
604000
heap
page read and write
10E0000
direct allocation
page read and write
4A11000
heap
page read and write
85A000
unkown
page execute and read and write
4A11000
heap
page read and write
604000
heap
page read and write
4A11000
heap
page read and write
2DCB000
heap
page read and write
39CF000
stack
page read and write
4A11000
heap
page read and write
4A11000
heap
page read and write
4A11000
heap
page read and write
2D4C000
stack
page read and write
4A11000
heap
page read and write
10E0000
direct allocation
page read and write
4FCF000
stack
page read and write
C82000
unkown
page execute and read and write
4A11000
heap
page read and write
604000
heap
page read and write
1157000
heap
page read and write
604000
heap
page read and write
4A11000
heap
page read and write
4A20000
heap
page read and write
2FCF000
stack
page read and write
4E60000
heap
page read and write
604000
heap
page read and write
404E000
stack
page read and write
328E000
stack
page read and write
4A11000
heap
page read and write
4A11000
heap
page read and write
604000
heap
page read and write
360F000
stack
page read and write
5010000
direct allocation
page execute and read and write
142F000
stack
page read and write
4A11000
heap
page read and write
4A11000
heap
page read and write
4A11000
heap
page read and write
604000
heap
page read and write
9E3000
unkown
page execute and read and write
604000
heap
page read and write
604000
heap
page read and write
1CF2F000
stack
page read and write
4A11000
heap
page read and write
4A11000
heap
page read and write
3B4E000
stack
page read and write
10F8000
heap
page read and write
4A11000
heap
page read and write
4A11000
heap
page read and write
5D0000
heap
page read and write
604000
heap
page read and write
1D06F000
stack
page read and write
388F000
stack
page read and write
4A11000
heap
page read and write
324F000
stack
page read and write
1D0AE000
stack
page read and write
4A11000
heap
page read and write
3ECF000
stack
page read and write
4A11000
heap
page read and write
1CE2E000
stack
page read and write
2ECF000
stack
page read and write
4A11000
heap
page read and write
AF2000
unkown
page execute and read and write
3C8E000
stack
page read and write
604000
heap
page read and write
604000
heap
page read and write
10E0000
direct allocation
page read and write
4A11000
heap
page read and write
464F000
stack
page read and write
4A11000
heap
page read and write
604000
heap
page read and write
454E000
stack
page read and write
113F000
heap
page read and write
604000
heap
page read and write
4A11000
heap
page read and write
610000
unkown
page read and write
D8E000
stack
page read and write
4FF0000
direct allocation
page execute and read and write
4A11000
heap
page read and write
450F000
stack
page read and write
468E000
stack
page read and write
604000
heap
page read and write
604000
heap
page read and write
2C0E000
stack
page read and write
604000
heap
page read and write
48CF000
stack
page read and write
2DA0000
direct allocation
page read and write
4A11000
heap
page read and write
42CE000
stack
page read and write
604000
heap
page read and write
604000
heap
page read and write
4A11000
heap
page read and write
1CF6E000
stack
page read and write
10E0000
direct allocation
page read and write
4A11000
heap
page read and write
378E000
stack
page read and write
2DB0000
direct allocation
page execute and read and write
4FD0000
direct allocation
page execute and read and write
604000
heap
page read and write
4ECE000
stack
page read and write
604000
heap
page read and write
604000
heap
page read and write
4A11000
heap
page read and write
4A11000
heap
page read and write
4A11000
heap
page read and write
10E0000
direct allocation
page read and write
604000
heap
page read and write
4A11000
heap
page read and write
604000
heap
page read and write
4A11000
heap
page read and write
600000
heap
page read and write
86E000
unkown
page execute and read and write
4A11000
heap
page read and write
6C1000
unkown
page execute and read and write
604000
heap
page read and write
3D8F000
stack
page read and write
4A11000
heap
page read and write
604000
heap
page read and write
604000
heap
page read and write
4A11000
heap
page read and write
10E0000
direct allocation
page read and write
10E0000
direct allocation
page read and write
4A11000
heap
page read and write
4A11000
heap
page read and write
2DA0000
direct allocation
page read and write
33CE000
stack
page read and write
C83000
unkown
page execute and write copy
12EF000
stack
page read and write
10E0000
direct allocation
page read and write
604000
heap
page read and write
10D0000
heap
page read and write
310F000
stack
page read and write
4A11000
heap
page read and write
4A11000
heap
page read and write
604000
heap
page read and write
4A11000
heap
page read and write
3B0F000
stack
page read and write
1145000
heap
page read and write
1D1FE000
stack
page read and write
440E000
stack
page read and write
1166000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
4A11000
heap
page read and write
4B10000
trusted library allocation
page read and write
610000
unkown
page readonly
3DCE000
stack
page read and write
ABB000
unkown
page execute and read and write
3F0E000
stack
page read and write
10E0000
direct allocation
page read and write
364E000
stack
page read and write
4A10000
heap
page read and write
604000
heap
page read and write
10E0000
direct allocation
page read and write
4A11000
heap
page read and write
1173000
heap
page read and write
10F0000
heap
page read and write
38CE000
stack
page read and write
2DC7000
heap
page read and write
428F000
stack
page read and write
There are 219 hidden memdumps, click here to show them.