IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpl
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpA
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php0
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37s
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4D60000
direct allocation
page read and write
malicious
3B1000
unkown
page execute and read and write
malicious
106E000
heap
page read and write
malicious
48D1000
heap
page read and write
46D000
unkown
page execute and read and write
4D60000
direct allocation
page read and write
48D1000
heap
page read and write
1CCDE000
stack
page read and write
48D1000
heap
page read and write
335F000
stack
page read and write
E9E000
stack
page read and write
1D0CE000
stack
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
389E000
stack
page read and write
2FDE000
stack
page read and write
48D1000
heap
page read and write
4EEE000
stack
page read and write
48D1000
heap
page read and write
48C0000
direct allocation
page read and write
48C0000
direct allocation
page read and write
48C0000
direct allocation
page read and write
ACC000
stack
page read and write
1060000
heap
page read and write
2E9F000
stack
page read and write
48D1000
heap
page read and write
48C0000
direct allocation
page read and write
101E000
stack
page read and write
125E000
stack
page read and write
48D1000
heap
page read and write
385F000
stack
page read and write
48C0000
direct allocation
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
892000
unkown
page execute and read and write
48D1000
heap
page read and write
48F0000
heap
page read and write
48C0000
direct allocation
page read and write
1CDDF000
stack
page read and write
48C0000
direct allocation
page read and write
48D1000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
3C5E000
stack
page read and write
439F000
stack
page read and write
4EF0000
direct allocation
page execute and read and write
3EDD000
stack
page read and write
35DF000
stack
page read and write
48D1000
heap
page read and write
1068000
heap
page read and write
48D1000
heap
page read and write
5FA000
unkown
page execute and read and write
2D9F000
stack
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
492000
unkown
page execute and read and write
4F00000
direct allocation
page execute and read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
865000
unkown
page execute and read and write
361E000
stack
page read and write
3B0000
unkown
page readonly
1CC9F000
stack
page read and write
2C9F000
stack
page read and write
48D1000
heap
page read and write
10E4000
heap
page read and write
3B1E000
stack
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
375E000
stack
page read and write
2F9F000
stack
page read and write
48C0000
direct allocation
page read and write
889000
unkown
page execute and read and write
39DE000
stack
page read and write
A34000
unkown
page execute and read and write
465E000
stack
page read and write
2B80000
heap
page read and write
EF0000
heap
page read and write
1D30C000
stack
page read and write
48A0000
heap
page read and write
48D1000
heap
page read and write
2B97000
heap
page read and write
371F000
stack
page read and write
311E000
stack
page read and write
790000
unkown
page execute and read and write
1D07F000
stack
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
415E000
stack
page read and write
48D1000
heap
page read and write
4E9F000
stack
page read and write
48D1000
heap
page read and write
48D0000
heap
page read and write
48C0000
direct allocation
page read and write
48D1000
heap
page read and write
E30000
heap
page read and write
105C000
stack
page read and write
489F000
stack
page read and write
48D1000
heap
page read and write
1CE1E000
stack
page read and write
475F000
stack
page read and write
48D1000
heap
page read and write
10B1000
heap
page read and write
479E000
stack
page read and write
1D20D000
stack
page read and write
48D1000
heap
page read and write
399F000
stack
page read and write
3C1F000
stack
page read and write
321F000
stack
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
325E000
stack
page read and write
411F000
stack
page read and write
60E000
unkown
page execute and read and write
10AC000
heap
page read and write
48D1000
heap
page read and write
2B3E000
stack
page read and write
34DE000
stack
page read and write
8A2000
unkown
page execute and write copy
30DF000
stack
page read and write
49D0000
trusted library allocation
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
10C7000
heap
page read and write
48C0000
direct allocation
page read and write
E20000
heap
page read and write
48D2000
heap
page read and write
48D1000
heap
page read and write
43DE000
stack
page read and write
48D1000
heap
page read and write
BC5000
stack
page read and write
48C0000
direct allocation
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
44DF000
stack
page read and write
48D1000
heap
page read and write
451E000
stack
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
BCE000
stack
page read and write
48C0000
direct allocation
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
429E000
stack
page read and write
3E9F000
stack
page read and write
401E000
stack
page read and write
48D1000
heap
page read and write
339E000
stack
page read and write
2B7E000
stack
page read and write
48D1000
heap
page read and write
2B90000
heap
page read and write
4D9E000
stack
page read and write
3B1000
unkown
page execute and write copy
48D1000
heap
page read and write
1D1CD000
stack
page read and write
48D1000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
EF5000
heap
page read and write
4D60000
direct allocation
page read and write
4EE0000
direct allocation
page execute and read and write
8A1000
unkown
page execute and read and write
48C0000
direct allocation
page read and write
461F000
stack
page read and write
4ED0000
direct allocation
page execute and read and write
461000
unkown
page execute and read and write
48D1000
heap
page read and write
3ADF000
stack
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
349F000
stack
page read and write
48C0000
direct allocation
page read and write
3D9E000
stack
page read and write
425F000
stack
page read and write
1CF7E000
stack
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
EDE000
stack
page read and write
8A1000
unkown
page execute and write copy
3B0000
unkown
page read and write
48D1000
heap
page read and write
3D5F000
stack
page read and write
48D1000
heap
page read and write
48E0000
heap
page read and write
A35000
unkown
page execute and write copy
4EE0000
direct allocation
page execute and read and write
135E000
stack
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
2B9B000
heap
page read and write
48D1000
heap
page read and write
1CF1F000
stack
page read and write
3FDE000
stack
page read and write
48D1000
heap
page read and write
48D1000
heap
page read and write
There are 192 hidden memdumps, click here to show them.