IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php5
unknown
malicious
http://185.215.113.3793
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phps
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpYG
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpW
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
851000
unkown
page execute and read and write
malicious
15AE000
heap
page read and write
malicious
5200000
direct allocation
page read and write
malicious
13E4000
heap
page read and write
D18000
unkown
page execute and read and write
4D81000
heap
page read and write
3E7F000
stack
page read and write
1D18F000
stack
page read and write
F8C000
stack
page read and write
3090000
direct allocation
page read and write
1D6DE000
stack
page read and write
C3B000
unkown
page execute and read and write
3090000
direct allocation
page read and write
4D81000
heap
page read and write
3ABF000
stack
page read and write
4D81000
heap
page read and write
D3C000
unkown
page execute and read and write
53A0000
direct allocation
page execute and read and write
1D1CE000
stack
page read and write
4D81000
heap
page read and write
4D81000
heap
page read and write
4D81000
heap
page read and write
4D81000
heap
page read and write
4D81000
heap
page read and write
4D81000
heap
page read and write
30B0000
heap
page read and write
4C3F000
stack
page read and write
13E4000
heap
page read and write
4D81000
heap
page read and write
51E0000
heap
page read and write
13E4000
heap
page read and write
4D81000
heap
page read and write
4D81000
heap
page read and write
1D97F000
stack
page read and write
4D81000
heap
page read and write
3090000
direct allocation
page read and write
45FF000
stack
page read and write
13E4000
heap
page read and write
4D81000
heap
page read and write
13E4000
heap
page read and write
3D3F000
stack
page read and write
12FE000
stack
page read and write
4D81000
heap
page read and write
4D81000
heap
page read and write
13E4000
heap
page read and write
1D08E000
stack
page read and write
4D81000
heap
page read and write
D58000
unkown
page execute and write copy
143E000
stack
page read and write
5200000
direct allocation
page read and write
13E4000
heap
page read and write
383F000
stack
page read and write
A9A000
unkown
page execute and read and write
3090000
direct allocation
page read and write
4D81000
heap
page read and write
4D81000
heap
page read and write
1D40E000
stack
page read and write
15F7000
heap
page read and write
13E4000
heap
page read and write
4D81000
heap
page read and write
49BF000
stack
page read and write
49FE000
stack
page read and write
13E4000
heap
page read and write
4D81000
heap
page read and write
FF0000
heap
page read and write
4B3E000
stack
page read and write
387E000
stack
page read and write
3090000
direct allocation
page read and write
3090000
direct allocation
page read and write
4D81000
heap
page read and write
43BE000
stack
page read and write
1D87E000
stack
page read and write
4D81000
heap
page read and write
D49000
unkown
page execute and read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
4D81000
heap
page read and write
5380000
direct allocation
page execute and read and write
4D81000
heap
page read and write
323E000
stack
page read and write
4C7E000
stack
page read and write
4D81000
heap
page read and write
347F000
stack
page read and write
4D81000
heap
page read and write
413E000
stack
page read and write
4D7F000
stack
page read and write
13E4000
heap
page read and write
4D81000
heap
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
4D81000
heap
page read and write
53B0000
direct allocation
page execute and read and write
D57000
unkown
page execute and write copy
13E4000
heap
page read and write
D57000
unkown
page execute and read and write
13E4000
heap
page read and write
487F000
stack
page read and write
4D81000
heap
page read and write
473F000
stack
page read and write
4D81000
heap
page read and write
35BF000
stack
page read and write
13E4000
heap
page read and write
337E000
stack
page read and write
4D81000
heap
page read and write
533F000
stack
page read and write
850000
unkown
page read and write
3FBF000
stack
page read and write
4D80000
heap
page read and write
FE0000
heap
page read and write
30B7000
heap
page read and write
35FE000
stack
page read and write
3080000
heap
page read and write
EFC000
unkown
page execute and write copy
1609000
heap
page read and write
4D81000
heap
page read and write
4D81000
heap
page read and write
373E000
stack
page read and write
15A0000
heap
page read and write
4D81000
heap
page read and write
13E4000
heap
page read and write
153E000
stack
page read and write
4D81000
heap
page read and write
157D000
stack
page read and write
3FFE000
stack
page read and write
333F000
stack
page read and write
13E4000
heap
page read and write
463E000
stack
page read and write
3090000
direct allocation
page read and write
4D81000
heap
page read and write
30FC000
stack
page read and write
13E4000
heap
page read and write
4D81000
heap
page read and write
3090000
direct allocation
page read and write
5370000
direct allocation
page execute and read and write
423F000
stack
page read and write
13E4000
heap
page read and write
4D81000
heap
page read and write
4D81000
heap
page read and write
5350000
direct allocation
page execute and read and write
1D980000
heap
page read and write
13E4000
heap
page read and write
15F1000
heap
page read and write
4E80000
trusted library allocation
page read and write
40FF000
stack
page read and write
4AFF000
stack
page read and write
1D45E000
stack
page read and write
437F000
stack
page read and write
4D81000
heap
page read and write
13E4000
heap
page read and write
901000
unkown
page execute and read and write
4D81000
heap
page read and write
3D7E000
stack
page read and write
179F000
stack
page read and write
850000
unkown
page readonly
4D81000
heap
page read and write
3090000
direct allocation
page read and write
12F5000
stack
page read and write
4D81000
heap
page read and write
3090000
direct allocation
page read and write
3AFE000
stack
page read and write
4D81000
heap
page read and write
4D81000
heap
page read and write
3090000
direct allocation
page read and write
851000
unkown
page execute and write copy
932000
unkown
page execute and read and write
13E4000
heap
page read and write
1D69D000
stack
page read and write
1D55F000
stack
page read and write
3BFF000
stack
page read and write
4D81000
heap
page read and write
4D81000
heap
page read and write
5380000
direct allocation
page execute and read and write
AAE000
unkown
page execute and read and write
523C000
stack
page read and write
5200000
direct allocation
page read and write
13E4000
heap
page read and write
3090000
direct allocation
page read and write
1D7DC000
stack
page read and write
90D000
unkown
page execute and read and write
48BE000
stack
page read and write
13E4000
heap
page read and write
477E000
stack
page read and write
4D81000
heap
page read and write
3090000
direct allocation
page read and write
4D81000
heap
page read and write
13E4000
heap
page read and write
5360000
direct allocation
page execute and read and write
44BF000
stack
page read and write
EFB000
unkown
page execute and read and write
13E4000
heap
page read and write
34BE000
stack
page read and write
4D81000
heap
page read and write
1625000
heap
page read and write
1D59D000
stack
page read and write
4D81000
heap
page read and write
15AA000
heap
page read and write
3090000
direct allocation
page read and write
36FF000
stack
page read and write
2F7E000
stack
page read and write
4D81000
heap
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
427E000
stack
page read and write
13E4000
heap
page read and write
4D81000
heap
page read and write
4D81000
heap
page read and write
13E0000
heap
page read and write
44FE000
stack
page read and write
4D81000
heap
page read and write
13E4000
heap
page read and write
4D81000
heap
page read and write
13E4000
heap
page read and write
30BB000
heap
page read and write
39BE000
stack
page read and write
1D30E000
stack
page read and write
4D81000
heap
page read and write
4D81000
heap
page read and write
4D81000
heap
page read and write
3C3E000
stack
page read and write
31FF000
stack
page read and write
307F000
stack
page read and write
3EBE000
stack
page read and write
1D2CF000
stack
page read and write
13E4000
heap
page read and write
397F000
stack
page read and write
4D81000
heap
page read and write
4D81000
heap
page read and write
4D81000
heap
page read and write
13E4000
heap
page read and write
5390000
direct allocation
page execute and read and write
4D81000
heap
page read and write
There are 223 hidden memdumps, click here to show them.