IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpWindows
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpc
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpZ
unknown
malicious
http://185.215.113.37/M
unknown
malicious
http://185.215.113.37s
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4E60000
direct allocation
page read and write
malicious
99E000
heap
page read and write
malicious
BE1000
unkown
page execute and read and write
malicious
49E1000
heap
page read and write
49E1000
heap
page read and write
465E000
stack
page read and write
3D5F000
stack
page read and write
49E1000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
5B0000
heap
page read and write
574000
heap
page read and write
1CF2F000
stack
page read and write
44DF000
stack
page read and write
10D8000
unkown
page execute and write copy
574000
heap
page read and write
8F5000
stack
page read and write
574000
heap
page read and write
BE1000
unkown
page execute and write copy
49E1000
heap
page read and write
574000
heap
page read and write
BC0000
direct allocation
page read and write
49E1000
heap
page read and write
49E1000
heap
page read and write
399F000
stack
page read and write
49E1000
heap
page read and write
49E1000
heap
page read and write
49E1000
heap
page read and write
574000
heap
page read and write
BC0000
direct allocation
page read and write
49E1000
heap
page read and write
93E000
stack
page read and write
475F000
stack
page read and write
339E000
stack
page read and write
49E1000
heap
page read and write
574000
heap
page read and write
49E1000
heap
page read and write
2D1F000
stack
page read and write
49E1000
heap
page read and write
3D9E000
stack
page read and write
574000
heap
page read and write
4E60000
direct allocation
page read and write
49E1000
heap
page read and write
A12000
heap
page read and write
49E1000
heap
page read and write
10D7000
unkown
page execute and write copy
49E1000
heap
page read and write
574000
heap
page read and write
B9E000
stack
page read and write
A1A000
heap
page read and write
4E40000
heap
page read and write
49E1000
heap
page read and write
5000000
direct allocation
page execute and read and write
BB0000
heap
page read and write
49E1000
heap
page read and write
BC0000
direct allocation
page read and write
49E1000
heap
page read and write
49E1000
heap
page read and write
FC4000
unkown
page execute and read and write
39DE000
stack
page read and write
49F0000
heap
page read and write
574000
heap
page read and write
574000
heap
page read and write
574000
heap
page read and write
1CF6E000
stack
page read and write
49E1000
heap
page read and write
E2A000
unkown
page execute and read and write
C91000
unkown
page execute and read and write
361E000
stack
page read and write
1D4DE000
stack
page read and write
BC0000
direct allocation
page read and write
BE0000
unkown
page readonly
49E1000
heap
page read and write
49E1000
heap
page read and write
49E1000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
49E1000
heap
page read and write
147E000
stack
page read and write
2F9F000
stack
page read and write
10CA000
unkown
page execute and read and write
49E1000
heap
page read and write
30DF000
stack
page read and write
574000
heap
page read and write
10C1000
unkown
page execute and read and write
401E000
stack
page read and write
311E000
stack
page read and write
3C5E000
stack
page read and write
BC0000
direct allocation
page read and write
1CDEF000
stack
page read and write
574000
heap
page read and write
BC0000
direct allocation
page read and write
49E1000
heap
page read and write
49E1000
heap
page read and write
574000
heap
page read and write
425F000
stack
page read and write
574000
heap
page read and write
54C000
stack
page read and write
3E9F000
stack
page read and write
1D5DF000
stack
page read and write
BC0000
direct allocation
page read and write
1D0BE000
stack
page read and write
49E1000
heap
page read and write
BC0000
direct allocation
page read and write
1D1FD000
stack
page read and write
574000
heap
page read and write
574000
heap
page read and write
BB7000
heap
page read and write
48DE000
stack
page read and write
4F9F000
stack
page read and write
49E1000
heap
page read and write
574000
heap
page read and write
49E1000
heap
page read and write
49E1000
heap
page read and write
439F000
stack
page read and write
489F000
stack
page read and write
49E1000
heap
page read and write
574000
heap
page read and write
1271000
unkown
page execute and read and write
9E4000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
49E1000
heap
page read and write
BC0000
direct allocation
page read and write
49E1000
heap
page read and write
49E1000
heap
page read and write
BC0000
direct allocation
page read and write
1D5E0000
heap
page read and write
451E000
stack
page read and write
2E5F000
stack
page read and write
1D43C000
stack
page read and write
137E000
stack
page read and write
2D5C000
stack
page read and write
349F000
stack
page read and write
574000
heap
page read and write
574000
heap
page read and write
A0A000
heap
page read and write
49E1000
heap
page read and write
570000
heap
page read and write
574000
heap
page read and write
BC0000
direct allocation
page read and write
49E1000
heap
page read and write
BC0000
direct allocation
page read and write
49E1000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
97E000
stack
page read and write
49E1000
heap
page read and write
574000
heap
page read and write
34DE000
stack
page read and write
574000
heap
page read and write
411E000
stack
page read and write
49E1000
heap
page read and write
371F000
stack
page read and write
574000
heap
page read and write
49DF000
stack
page read and write
BA0000
heap
page read and write
1D1BF000
stack
page read and write
574000
heap
page read and write
49E0000
heap
page read and write
574000
heap
page read and write
3FDF000
stack
page read and write
574000
heap
page read and write
3ADF000
stack
page read and write
109E000
unkown
page execute and read and write
49E1000
heap
page read and write
BC0000
direct allocation
page read and write
9FA000
heap
page read and write
49E1000
heap
page read and write
35DF000
stack
page read and write
375E000
stack
page read and write
49E1000
heap
page read and write
574000
heap
page read and write
49E1000
heap
page read and write
574000
heap
page read and write
335F000
stack
page read and write
49E1000
heap
page read and write
2FDE000
stack
page read and write
574000
heap
page read and write
429E000
stack
page read and write
49E1000
heap
page read and write
C9D000
unkown
page execute and read and write
2E9E000
stack
page read and write
49E1000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
BE0000
unkown
page read and write
3C1F000
stack
page read and write
99A000
heap
page read and write
49E1000
heap
page read and write
1CCEE000
stack
page read and write
BBB000
heap
page read and write
461F000
stack
page read and write
49E1000
heap
page read and write
5010000
direct allocation
page execute and read and write
CC2000
unkown
page execute and read and write
49E1000
heap
page read and write
3EDE000
stack
page read and write
49E1000
heap
page read and write
49E1000
heap
page read and write
1D06E000
stack
page read and write
4E60000
direct allocation
page read and write
574000
heap
page read and write
325E000
stack
page read and write
49E1000
heap
page read and write
5C0000
heap
page read and write
574000
heap
page read and write
49E1000
heap
page read and write
385F000
stack
page read and write
BC0000
direct allocation
page read and write
8FF000
stack
page read and write
49E1000
heap
page read and write
3B1E000
stack
page read and write
1D33D000
stack
page read and write
574000
heap
page read and write
1D2FE000
stack
page read and write
990000
heap
page read and write
49E1000
heap
page read and write
574000
heap
page read and write
43DE000
stack
page read and write
49E1000
heap
page read and write
49E1000
heap
page read and write
415E000
stack
page read and write
E3E000
unkown
page execute and read and write
321F000
stack
page read and write
1272000
unkown
page execute and write copy
4E9E000
stack
page read and write
49F5000
heap
page read and write
479E000
stack
page read and write
1CE2E000
stack
page read and write
49E1000
heap
page read and write
10D7000
unkown
page execute and read and write
574000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
49E1000
heap
page read and write
574000
heap
page read and write
4A00000
heap
page read and write
49E1000
heap
page read and write
389E000
stack
page read and write
4E20000
trusted library allocation
page read and write
There are 225 hidden memdumps, click here to show them.