IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.370
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3B1000
unkown
page execute and read and write
malicious
4D60000
direct allocation
page read and write
malicious
116E000
heap
page read and write
malicious
11C9000
heap
page read and write
48E0000
heap
page read and write
48E1000
heap
page read and write
3B5E000
stack
page read and write
1CFAE000
stack
page read and write
48E1000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
2EDE000
stack
page read and write
48E1000
heap
page read and write
1004000
heap
page read and write
48E1000
heap
page read and write
441E000
stack
page read and write
1150000
direct allocation
page read and write
48E1000
heap
page read and write
4D40000
heap
page read and write
351E000
stack
page read and write
48E1000
heap
page read and write
2FDF000
stack
page read and write
1150000
direct allocation
page read and write
48E1000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
1004000
heap
page read and write
48E1000
heap
page read and write
492000
unkown
page execute and read and write
1004000
heap
page read and write
8B1000
unkown
page execute and write copy
1004000
heap
page read and write
48E1000
heap
page read and write
47DE000
stack
page read and write
2B50000
heap
page read and write
1004000
heap
page read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
405E000
stack
page read and write
FF0000
heap
page read and write
11AD000
heap
page read and write
1D22D000
stack
page read and write
38DE000
stack
page read and write
1CE1F000
stack
page read and write
F20000
heap
page read and write
1150000
direct allocation
page read and write
461000
unkown
page execute and read and write
1004000
heap
page read and write
48E1000
heap
page read and write
379E000
stack
page read and write
48E1000
heap
page read and write
1004000
heap
page read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
1150000
direct allocation
page read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
3B0000
unkown
page readonly
1004000
heap
page read and write
48E1000
heap
page read and write
46D000
unkown
page execute and read and write
455E000
stack
page read and write
1004000
heap
page read and write
1150000
direct allocation
page read and write
1004000
heap
page read and write
48E1000
heap
page read and write
1D32C000
stack
page read and write
1004000
heap
page read and write
1004000
heap
page read and write
1D4D0000
heap
page read and write
3B1F000
stack
page read and write
315E000
stack
page read and write
48E1000
heap
page read and write
339F000
stack
page read and write
1D1ED000
stack
page read and write
48E1000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
8B2000
unkown
page execute and write copy
1004000
heap
page read and write
48E1000
heap
page read and write
874000
unkown
page execute and read and write
365E000
stack
page read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
1004000
heap
page read and write
A4E000
unkown
page execute and read and write
48E1000
heap
page read and write
4D60000
direct allocation
page read and write
1CCDE000
stack
page read and write
48E1000
heap
page read and write
1004000
heap
page read and write
48E1000
heap
page read and write
1004000
heap
page read and write
8B1000
unkown
page execute and read and write
1150000
direct allocation
page read and write
48E1000
heap
page read and write
1004000
heap
page read and write
1150000
direct allocation
page read and write
48E1000
heap
page read and write
389F000
stack
page read and write
1CE5E000
stack
page read and write
48E1000
heap
page read and write
795000
unkown
page execute and read and write
48E1000
heap
page read and write
1004000
heap
page read and write
43DF000
stack
page read and write
4D9E000
stack
page read and write
48F0000
heap
page read and write
3B0000
unkown
page read and write
1150000
direct allocation
page read and write
415F000
stack
page read and write
48E1000
heap
page read and write
1004000
heap
page read and write
2E9F000
stack
page read and write
48E1000
heap
page read and write
429F000
stack
page read and write
469E000
stack
page read and write
329E000
stack
page read and write
48E1000
heap
page read and write
2C5F000
stack
page read and write
AEC000
stack
page read and write
1004000
heap
page read and write
48E1000
heap
page read and write
311F000
stack
page read and write
48E1000
heap
page read and write
11E6000
heap
page read and write
4F00000
direct allocation
page execute and read and write
FCE000
stack
page read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
1D0ED000
stack
page read and write
2B57000
heap
page read and write
3B1000
unkown
page execute and write copy
375F000
stack
page read and write
1004000
heap
page read and write
48E1000
heap
page read and write
2D5F000
stack
page read and write
135F000
stack
page read and write
8A3000
unkown
page execute and read and write
1CF5F000
stack
page read and write
1150000
direct allocation
page read and write
325F000
stack
page read and write
1D0AF000
stack
page read and write
465F000
stack
page read and write
3C5F000
stack
page read and write
48E1000
heap
page read and write
1CD1E000
stack
page read and write
4ED0000
direct allocation
page execute and read and write
48E1000
heap
page read and write
3DDE000
stack
page read and write
1CBDE000
stack
page read and write
48E1000
heap
page read and write
2D9E000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
48E1000
heap
page read and write
F8E000
stack
page read and write
48E1000
heap
page read and write
2B5B000
heap
page read and write
451F000
stack
page read and write
48E1000
heap
page read and write
1D3CE000
stack
page read and write
4D60000
direct allocation
page read and write
1004000
heap
page read and write
1150000
direct allocation
page read and write
11B4000
heap
page read and write
39DF000
stack
page read and write
42DE000
stack
page read and write
2B3C000
stack
page read and write
1004000
heap
page read and write
1004000
heap
page read and write
4D20000
trusted library allocation
page read and write
48E1000
heap
page read and write
1004000
heap
page read and write
1004000
heap
page read and write
3EDF000
stack
page read and write
110E000
stack
page read and write
1D4CE000
stack
page read and write
1004000
heap
page read and write
3F1E000
stack
page read and write
361F000
stack
page read and write
1150000
direct allocation
page read and write
60E000
unkown
page execute and read and write
1004000
heap
page read and write
114E000
stack
page read and write
1004000
heap
page read and write
1150000
direct allocation
page read and write
48E1000
heap
page read and write
1004000
heap
page read and write
E40000
heap
page read and write
3D9F000
stack
page read and write
1160000
heap
page read and write
48E1000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
48E1000
heap
page read and write
1004000
heap
page read and write
48E1000
heap
page read and write
5FA000
unkown
page execute and read and write
1004000
heap
page read and write
899000
unkown
page execute and read and write
419E000
stack
page read and write
401F000
stack
page read and write
48E1000
heap
page read and write
1004000
heap
page read and write
3C9E000
stack
page read and write
48E1000
heap
page read and write
3A1E000
stack
page read and write
4900000
heap
page read and write
48E1000
heap
page read and write
BE5000
stack
page read and write
48E1000
heap
page read and write
1150000
direct allocation
page read and write
1004000
heap
page read and write
301E000
stack
page read and write
33DE000
stack
page read and write
1004000
heap
page read and write
34DF000
stack
page read and write
116A000
heap
page read and write
1000000
heap
page read and write
48E1000
heap
page read and write
48DF000
stack
page read and write
BEE000
stack
page read and write
1004000
heap
page read and write
1004000
heap
page read and write
48E1000
heap
page read and write
4E9F000
stack
page read and write
479F000
stack
page read and write
48E1000
heap
page read and write
48E1000
heap
page read and write
1150000
direct allocation
page read and write
There are 221 hidden memdumps, click here to show them.