IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpva=T
unknown
malicious
http://185.215.113.37/4D
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phph
unknown
malicious
http://185.215.113.37/01
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpBa
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
381000
unkown
page execute and read and write
malicious
4D40000
direct allocation
page read and write
malicious
113E000
heap
page read and write
malicious
48B1000
heap
page read and write
48B1000
heap
page read and write
107E000
stack
page read and write
48B1000
heap
page read and write
1120000
direct allocation
page read and write
4EE0000
direct allocation
page execute and read and write
48B1000
heap
page read and write
1120000
direct allocation
page read and write
3C0F000
stack
page read and write
10D7000
heap
page read and write
48B1000
heap
page read and write
3D4F000
stack
page read and write
1CF0E000
stack
page read and write
4E90000
direct allocation
page execute and read and write
1CCCE000
stack
page read and write
48B1000
heap
page read and write
3FCF000
stack
page read and write
48B1000
heap
page read and write
3B0E000
stack
page read and write
428E000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
2E4F000
stack
page read and write
478E000
stack
page read and write
A18000
unkown
page execute and read and write
87B000
unkown
page execute and read and write
414E000
stack
page read and write
48D0000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
F4D000
stack
page read and write
39CE000
stack
page read and write
43D000
unkown
page execute and read and write
438F000
stack
page read and write
BA5000
stack
page read and write
48B1000
heap
page read and write
87C000
unkown
page execute and write copy
48B1000
heap
page read and write
48B1000
heap
page read and write
1120000
direct allocation
page read and write
BAF000
stack
page read and write
4D40000
direct allocation
page read and write
380000
unkown
page readonly
2ACE000
stack
page read and write
4ECE000
stack
page read and write
11A5000
heap
page read and write
424F000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
431000
unkown
page execute and read and write
1120000
direct allocation
page read and write
4E7F000
stack
page read and write
488F000
stack
page read and write
1138000
heap
page read and write
48B1000
heap
page read and write
48C2000
heap
page read and write
1120000
direct allocation
page read and write
3E8F000
stack
page read and write
A19000
unkown
page execute and write copy
2BCF000
stack
page read and write
11BA000
heap
page read and write
1CE0E000
stack
page read and write
48B1000
heap
page read and write
2E8E000
stack
page read and write
48B1000
heap
page read and write
86D000
unkown
page execute and read and write
841000
unkown
page execute and read and write
48B1000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
35CF000
stack
page read and write
48B1000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
1D1FD000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
EE0000
heap
page read and write
F70000
heap
page read and write
4890000
heap
page read and write
5CA000
unkown
page execute and read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
3ECD000
stack
page read and write
48B1000
heap
page read and write
1120000
direct allocation
page read and write
381000
unkown
page execute and write copy
360E000
stack
page read and write
E00000
heap
page read and write
48C0000
heap
page read and write
30CF000
stack
page read and write
11AA000
heap
page read and write
48B1000
heap
page read and write
380000
unkown
page read and write
310E000
stack
page read and write
48B1000
heap
page read and write
338E000
stack
page read and write
1D0BD000
stack
page read and write
48B1000
heap
page read and write
10BE000
stack
page read and write
48B1000
heap
page read and write
1120000
direct allocation
page read and write
1D1BD000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
1130000
heap
page read and write
43CE000
stack
page read and write
3C4E000
stack
page read and write
4EC0000
direct allocation
page execute and read and write
4D40000
direct allocation
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
460F000
stack
page read and write
1197000
heap
page read and write
10C0000
heap
page read and write
48B1000
heap
page read and write
1CF6E000
stack
page read and write
4CF0000
trusted library allocation
page read and write
48B1000
heap
page read and write
767000
unkown
page execute and read and write
2F8F000
stack
page read and write
48B1000
heap
page read and write
334F000
stack
page read and write
1D06F000
stack
page read and write
48B1000
heap
page read and write
374E000
stack
page read and write
1CDCF000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
1180000
heap
page read and write
48B1000
heap
page read and write
474F000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
2C0B000
stack
page read and write
48B1000
heap
page read and write
87B000
unkown
page execute and write copy
F75000
heap
page read and write
462000
unkown
page execute and read and write
48B1000
heap
page read and write
2D0F000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
320F000
stack
page read and write
1120000
direct allocation
page read and write
3ACF000
stack
page read and write
1120000
direct allocation
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
5DE000
unkown
page execute and read and write
464E000
stack
page read and write
1120000
direct allocation
page read and write
48B1000
heap
page read and write
34CE000
stack
page read and write
2FCE000
stack
page read and write
384F000
stack
page read and write
1120000
direct allocation
page read and write
1120000
direct allocation
page read and write
410F000
stack
page read and write
48B1000
heap
page read and write
400E000
stack
page read and write
48B1000
heap
page read and write
324E000
stack
page read and write
398F000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
111E000
stack
page read and write
48B1000
heap
page read and write
450E000
stack
page read and write
1D2FD000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
865000
unkown
page execute and read and write
1CC8F000
stack
page read and write
48B1000
heap
page read and write
388E000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
1120000
direct allocation
page read and write
AAC000
stack
page read and write
48B1000
heap
page read and write
44CF000
stack
page read and write
4EA0000
direct allocation
page execute and read and write
4D7E000
stack
page read and write
48B0000
heap
page read and write
10D0000
heap
page read and write
3D8E000
stack
page read and write
48B1000
heap
page read and write
370F000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
2D4E000
stack
page read and write
1120000
direct allocation
page read and write
1184000
heap
page read and write
348F000
stack
page read and write
4ED0000
direct allocation
page execute and read and write
10DB000
heap
page read and write
There are 195 hidden memdumps, click here to show them.