IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php;
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpk
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpx9
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpY
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php65d60108622213
unknown
malicious
http://185.215.113.37S
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
7DE000
heap
page read and write
malicious
4A80000
direct allocation
page read and write
malicious
C51000
unkown
page execute and read and write
malicious
423F000
stack
page read and write
825000
heap
page read and write
4F5000
stack
page read and write
413E000
stack
page read and write
664000
heap
page read and write
664000
heap
page read and write
620000
direct allocation
page read and write
112B000
unkown
page execute and read and write
4601000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
347F000
stack
page read and write
4601000
heap
page read and write
427E000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
4601000
heap
page read and write
1CB4E000
stack
page read and write
664000
heap
page read and write
664000
heap
page read and write
3C3D000
stack
page read and write
664000
heap
page read and write
664000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
4601000
heap
page read and write
44BF000
stack
page read and write
45FF000
stack
page read and write
C50000
unkown
page readonly
664000
heap
page read and write
664000
heap
page read and write
3ABF000
stack
page read and write
3FBF000
stack
page read and write
D32000
unkown
page execute and read and write
2D3E000
stack
page read and write
10C000
stack
page read and write
4610000
heap
page read and write
664000
heap
page read and write
1C8CE000
stack
page read and write
2ABF000
stack
page read and write
1CDDE000
stack
page read and write
620000
direct allocation
page read and write
337E000
stack
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
664000
heap
page read and write
36FF000
stack
page read and write
44FE000
stack
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
664000
heap
page read and write
4601000
heap
page read and write
664000
heap
page read and write
3FFE000
stack
page read and write
437F000
stack
page read and write
610000
heap
page read and write
4601000
heap
page read and write
664000
heap
page read and write
664000
heap
page read and write
EAE000
unkown
page execute and read and write
4601000
heap
page read and write
4601000
heap
page read and write
664000
heap
page read and write
30FE000
stack
page read and write
373E000
stack
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
43BE000
stack
page read and write
818000
heap
page read and write
7C0000
direct allocation
page execute and read and write
1CC8E000
stack
page read and write
34BE000
stack
page read and write
64B000
heap
page read and write
640000
heap
page read and write
1169000
unkown
page execute and read and write
1CD8F000
stack
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
C50000
unkown
page read and write
664000
heap
page read and write
4601000
heap
page read and write
116A000
unkown
page execute and write copy
3E7F000
stack
page read and write
4BD0000
direct allocation
page execute and read and write
2BFE000
stack
page read and write
620000
direct allocation
page read and write
664000
heap
page read and write
664000
heap
page read and write
4600000
heap
page read and write
4601000
heap
page read and write
1CA0E000
stack
page read and write
4601000
heap
page read and write
620000
direct allocation
page read and write
4601000
heap
page read and write
323E000
stack
page read and write
30BF000
stack
page read and write
664000
heap
page read and write
4ABE000
stack
page read and write
4601000
heap
page read and write
660000
heap
page read and write
664000
heap
page read and write
29BF000
stack
page read and write
620000
direct allocation
page read and write
853000
heap
page read and write
4601000
heap
page read and write
664000
heap
page read and write
4601000
heap
page read and write
7B0000
direct allocation
page execute and read and write
4601000
heap
page read and write
C51000
unkown
page execute and write copy
650000
direct allocation
page read and write
620000
direct allocation
page read and write
4601000
heap
page read and write
2CFF000
stack
page read and write
1CEDC000
stack
page read and write
D0D000
unkown
page execute and read and write
4700000
trusted library allocation
page read and write
664000
heap
page read and write
664000
heap
page read and write
1152000
unkown
page execute and read and write
76F000
stack
page read and write
31FF000
stack
page read and write
664000
heap
page read and write
4601000
heap
page read and write
60E000
stack
page read and write
7D8000
heap
page read and write
1316000
unkown
page execute and write copy
387E000
stack
page read and write
2BBF000
stack
page read and write
664000
heap
page read and write
1315000
unkown
page execute and read and write
4A40000
heap
page read and write
35BF000
stack
page read and write
4601000
heap
page read and write
1DE000
stack
page read and write
4601000
heap
page read and write
2FBE000
stack
page read and write
1CF1D000
stack
page read and write
664000
heap
page read and write
620000
direct allocation
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
4FE000
stack
page read and write
1040000
unkown
page execute and read and write
4601000
heap
page read and write
383F000
stack
page read and write
4601000
heap
page read and write
837000
heap
page read and write
4601000
heap
page read and write
3AFE000
stack
page read and write
4607000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
3D3F000
stack
page read and write
4601000
heap
page read and write
3BFF000
stack
page read and write
4601000
heap
page read and write
2F7F000
stack
page read and write
3EBE000
stack
page read and write
C0C000
stack
page read and write
160000
heap
page read and write
650000
direct allocation
page read and write
9CF000
stack
page read and write
4601000
heap
page read and write
620000
direct allocation
page read and write
4601000
heap
page read and write
664000
heap
page read and write
115B000
unkown
page execute and read and write
7D0000
heap
page read and write
647000
heap
page read and write
664000
heap
page read and write
4601000
heap
page read and write
664000
heap
page read and write
7AE000
stack
page read and write
4601000
heap
page read and write
1C9CF000
stack
page read and write
620000
direct allocation
page read and write
4601000
heap
page read and write
E9A000
unkown
page execute and read and write
664000
heap
page read and write
1CB0F000
stack
page read and write
397F000
stack
page read and write
1CC4F000
stack
page read and write
4601000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
3D7E000
stack
page read and write
4601000
heap
page read and write
2E7E000
stack
page read and write
4601000
heap
page read and write
620000
direct allocation
page read and write
851000
heap
page read and write
4601000
heap
page read and write
664000
heap
page read and write
4601000
heap
page read and write
620000
direct allocation
page read and write
4601000
heap
page read and write
620000
direct allocation
page read and write
39BE000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
4601000
heap
page read and write
C4E000
stack
page read and write
D01000
unkown
page execute and read and write
664000
heap
page read and write
333F000
stack
page read and write
4601000
heap
page read and write
1169000
unkown
page execute and write copy
664000
heap
page read and write
664000
heap
page read and write
664000
heap
page read and write
4620000
heap
page read and write
35FE000
stack
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
620000
direct allocation
page read and write
620000
direct allocation
page read and write
664000
heap
page read and write
4601000
heap
page read and write
4601000
heap
page read and write
40FF000
stack
page read and write
846000
heap
page read and write
2E3F000
stack
page read and write
4BBF000
stack
page read and write
170000
heap
page read and write
1D01E000
stack
page read and write
664000
heap
page read and write
There are 220 hidden memdumps, click here to show them.