IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37I
unknown
malicious
http://185.215.113.37/5
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpI
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4EF0000
direct allocation
page read and write
malicious
861000
unkown
page execute and read and write
malicious
114E000
heap
page read and write
malicious
496E000
stack
page read and write
3B6F000
stack
page read and write
4A71000
heap
page read and write
D21000
unkown
page execute and read and write
4A70000
heap
page read and write
3A6E000
stack
page read and write
482E000
stack
page read and write
5090000
direct allocation
page execute and read and write
942000
unkown
page execute and read and write
11C3000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
1D39D000
stack
page read and write
1130000
direct allocation
page read and write
5060000
direct allocation
page execute and read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
140E000
stack
page read and write
4A71000
heap
page read and write
37EE000
stack
page read and write
306E000
stack
page read and write
1D0AF000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
5050000
direct allocation
page execute and read and write
10EE000
stack
page read and write
1130000
direct allocation
page read and write
4A71000
heap
page read and write
1130000
direct allocation
page read and write
2DE7000
heap
page read and write
3A2F000
stack
page read and write
4A71000
heap
page read and write
1D49D000
stack
page read and write
3F6E000
stack
page read and write
150E000
stack
page read and write
2DAF000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
3CAF000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
114A000
heap
page read and write
46AF000
stack
page read and write
4A71000
heap
page read and write
38EF000
stack
page read and write
1130000
direct allocation
page read and write
40AE000
stack
page read and write
36AE000
stack
page read and write
4A76000
heap
page read and write
4A71000
heap
page read and write
2F2E000
stack
page read and write
91D000
unkown
page execute and read and write
4A71000
heap
page read and write
4EB0000
trusted library allocation
page read and write
4A71000
heap
page read and write
1D35E000
stack
page read and write
2DE0000
heap
page read and write
456F000
stack
page read and write
366F000
stack
page read and write
4A71000
heap
page read and write
406F000
stack
page read and write
1130000
direct allocation
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
5070000
direct allocation
page execute and read and write
492F000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
41EE000
stack
page read and write
3F2F000
stack
page read and write
316F000
stack
page read and write
1130000
direct allocation
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
392E000
stack
page read and write
EF2000
unkown
page execute and read and write
352F000
stack
page read and write
37AF000
stack
page read and write
1CF6F000
stack
page read and write
4A71000
heap
page read and write
10A0000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
1D20F000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
FFF000
stack
page read and write
4A71000
heap
page read and write
4EF0000
direct allocation
page read and write
4A71000
heap
page read and write
31AE000
stack
page read and write
2DB0000
heap
page read and write
432E000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
820000
heap
page read and write
107D000
stack
page read and write
1130000
direct allocation
page read and write
911000
unkown
page execute and read and write
2EEF000
stack
page read and write
502F000
stack
page read and write
302F000
stack
page read and write
10A5000
heap
page read and write
4A71000
heap
page read and write
FF5000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
1130000
direct allocation
page read and write
4A71000
heap
page read and write
11A8000
heap
page read and write
103E000
stack
page read and write
2DEB000
heap
page read and write
861000
unkown
page execute and write copy
32EE000
stack
page read and write
1CFAE000
stack
page read and write
810000
heap
page read and write
1193000
heap
page read and write
D5A000
unkown
page execute and write copy
1CE2F000
stack
page read and write
356E000
stack
page read and write
4A71000
heap
page read and write
D59000
unkown
page execute and write copy
4A71000
heap
page read and write
4A71000
heap
page read and write
5080000
direct allocation
page execute and read and write
3E2E000
stack
page read and write
41AF000
stack
page read and write
860000
unkown
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
1130000
direct allocation
page read and write
4A80000
heap
page read and write
3DEF000
stack
page read and write
3CEE000
stack
page read and write
D4B000
unkown
page execute and read and write
4A71000
heap
page read and write
C48000
unkown
page execute and read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A6F000
stack
page read and write
32AF000
stack
page read and write
860000
unkown
page readonly
1130000
direct allocation
page read and write
1D25E000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
1130000
direct allocation
page read and write
442F000
stack
page read and write
1191000
heap
page read and write
1090000
heap
page read and write
42EF000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
1130000
direct allocation
page read and write
EF3000
unkown
page execute and write copy
1130000
direct allocation
page read and write
4A90000
heap
page read and write
1140000
heap
page read and write
112B000
stack
page read and write
507E000
stack
page read and write
5BC000
stack
page read and write
446E000
stack
page read and write
4A71000
heap
page read and write
47EF000
stack
page read and write
1130000
direct allocation
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
D59000
unkown
page execute and read and write
46EE000
stack
page read and write
4A71000
heap
page read and write
33EF000
stack
page read and write
4F2E000
stack
page read and write
1CE6E000
stack
page read and write
4A71000
heap
page read and write
AAA000
unkown
page execute and read and write
3BAE000
stack
page read and write
ABE000
unkown
page execute and read and write
4EF0000
direct allocation
page read and write
342E000
stack
page read and write
5040000
direct allocation
page execute and read and write
45AE000
stack
page read and write
5070000
direct allocation
page execute and read and write
D41000
unkown
page execute and read and write
4A71000
heap
page read and write
1D10E000
stack
page read and write
4A71000
heap
page read and write
There are 192 hidden memdumps, click here to show them.