IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37RD
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php=h
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php%hh
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpft
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
161000
unkown
page execute and read and write
malicious
4B20000
direct allocation
page read and write
malicious
CAE000
heap
page read and write
malicious
4C70000
direct allocation
page execute and read and write
4691000
heap
page read and write
42CF000
stack
page read and write
3E0E000
stack
page read and write
10AE000
stack
page read and write
C75000
heap
page read and write
4691000
heap
page read and write
3B4F000
stack
page read and write
4691000
heap
page read and write
1CAAE000
stack
page read and write
160000
unkown
page read and write
F6E000
stack
page read and write
4691000
heap
page read and write
65C000
unkown
page execute and write copy
2ECF000
stack
page read and write
C5E000
stack
page read and write
4691000
heap
page read and write
C70000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
2C8F000
stack
page read and write
B8E000
stack
page read and write
418F000
stack
page read and write
3C8F000
stack
page read and write
4691000
heap
page read and write
3B8E000
stack
page read and write
64B000
unkown
page execute and read and write
3CCD000
stack
page read and write
32CE000
stack
page read and write
4691000
heap
page read and write
354E000
stack
page read and write
38CF000
stack
page read and write
3F4E000
stack
page read and write
4B20000
direct allocation
page read and write
1CBEE000
stack
page read and write
468F000
stack
page read and write
4691000
heap
page read and write
160000
unkown
page readonly
D07000
heap
page read and write
4691000
heap
page read and write
368E000
stack
page read and write
318E000
stack
page read and write
A8C000
stack
page read and write
4691000
heap
page read and write
288E000
stack
page read and write
37CE000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
440F000
stack
page read and write
2A8F000
stack
page read and write
645000
unkown
page execute and read and write
2970000
direct allocation
page read and write
21D000
unkown
page execute and read and write
211000
unkown
page execute and read and write
4691000
heap
page read and write
61D000
unkown
page execute and read and write
242000
unkown
page execute and read and write
4691000
heap
page read and write
4691000
heap
page read and write
28CB000
stack
page read and write
7F7000
unkown
page execute and write copy
4691000
heap
page read and write
3AA000
unkown
page execute and read and write
4CC0000
direct allocation
page execute and read and write
4691000
heap
page read and write
2F0E000
stack
page read and write
4691000
heap
page read and write
2B8F000
stack
page read and write
4690000
heap
page read and write
350F000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
290E000
stack
page read and write
33CF000
stack
page read and write
CAA000
heap
page read and write
340E000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
1D17E000
stack
page read and write
4B5E000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
300F000
stack
page read and write
4C80000
direct allocation
page execute and read and write
4691000
heap
page read and write
2980000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
1CF9E000
stack
page read and write
4691000
heap
page read and write
CEE000
heap
page read and write
304E000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
2970000
direct allocation
page read and write
CF4000
heap
page read and write
4691000
heap
page read and write
390E000
stack
page read and write
4691000
heap
page read and write
2D8F000
stack
page read and write
3A0F000
stack
page read and write
1CFDD000
stack
page read and write
7F6000
unkown
page execute and read and write
4691000
heap
page read and write
3A4E000
stack
page read and write
4691000
heap
page read and write
2970000
direct allocation
page read and write
2970000
direct allocation
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4C5F000
stack
page read and write
B85000
stack
page read and write
CA0000
heap
page read and write
3DCF000
stack
page read and write
1D27F000
stack
page read and write
4691000
heap
page read and write
1CE9E000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
41CE000
stack
page read and write
46A0000
heap
page read and write
4691000
heap
page read and write
3BE000
unkown
page execute and read and write
2970000
direct allocation
page read and write
364F000
stack
page read and write
2950000
heap
page read and write
65B000
unkown
page execute and read and write
4691000
heap
page read and write
328F000
stack
page read and write
4691000
heap
page read and write
D24000
heap
page read and write
2970000
direct allocation
page read and write
4691000
heap
page read and write
2DCE000
stack
page read and write
161000
unkown
page execute and write copy
4CA0000
direct allocation
page execute and read and write
4691000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
4790000
trusted library allocation
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
2970000
direct allocation
page read and write
454F000
stack
page read and write
2970000
direct allocation
page read and write
294E000
stack
page read and write
1CA6F000
stack
page read and write
4691000
heap
page read and write
1D280000
heap
page read and write
2970000
direct allocation
page read and write
1CE5F000
stack
page read and write
65B000
unkown
page execute and write copy
4691000
heap
page read and write
BE0000
heap
page read and write
C90000
heap
page read and write
444E000
stack
page read and write
1D0DD000
stack
page read and write
4691000
heap
page read and write
46B0000
heap
page read and write
4691000
heap
page read and write
430E000
stack
page read and write
298B000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
404F000
stack
page read and write
458E000
stack
page read and write
FAE000
stack
page read and write
3F0F000
stack
page read and write
1CCEF000
stack
page read and write
4691000
heap
page read and write
1CD5E000
stack
page read and write
BF0000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4B20000
direct allocation
page read and write
2970000
direct allocation
page read and write
378F000
stack
page read and write
2970000
direct allocation
page read and write
4691000
heap
page read and write
543000
unkown
page execute and read and write
4691000
heap
page read and write
2970000
direct allocation
page read and write
4697000
heap
page read and write
2987000
heap
page read and write
4CAE000
stack
page read and write
314F000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4C90000
direct allocation
page execute and read and write
408E000
stack
page read and write
2970000
direct allocation
page read and write
2970000
direct allocation
page read and write
1CBAF000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
There are 198 hidden memdumps, click here to show them.