IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/rsonation
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php%
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpi
unknown
malicious
http://185.215.113.37/k
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C01000
unkown
page execute and read and write
malicious
55E0000
direct allocation
page read and write
malicious
177E000
heap
page read and write
malicious
5161000
heap
page read and write
5161000
heap
page read and write
13C4000
heap
page read and write
5161000
heap
page read and write
515F000
stack
page read and write
429E000
stack
page read and write
3397000
heap
page read and write
5750000
direct allocation
page execute and read and write
4B1F000
stack
page read and write
13C4000
heap
page read and write
13C0000
heap
page read and write
1740000
direct allocation
page read and write
E4A000
unkown
page execute and read and write
5160000
heap
page read and write
17E4000
heap
page read and write
5161000
heap
page read and write
5161000
heap
page read and write
1390000
heap
page read and write
55A0000
trusted library allocation
page read and write
13C4000
heap
page read and write
1740000
direct allocation
page read and write
5161000
heap
page read and write
5161000
heap
page read and write
5161000
heap
page read and write
5161000
heap
page read and write
13C4000
heap
page read and write
13C4000
heap
page read and write
5161000
heap
page read and write
1D56E000
stack
page read and write
13C4000
heap
page read and write
13C4000
heap
page read and write
1D7AF000
stack
page read and write
415E000
stack
page read and write
5161000
heap
page read and write
17C3000
heap
page read and write
1740000
direct allocation
page read and write
13C4000
heap
page read and write
1DB7D000
stack
page read and write
3380000
direct allocation
page execute and read and write
5161000
heap
page read and write
1740000
direct allocation
page read and write
13C4000
heap
page read and write
13C4000
heap
page read and write
17DB000
heap
page read and write
5161000
heap
page read and write
17F6000
heap
page read and write
4EDF000
stack
page read and write
1D42E000
stack
page read and write
3B1E000
stack
page read and write
5161000
heap
page read and write
173E000
stack
page read and write
44DF000
stack
page read and write
5161000
heap
page read and write
571F000
stack
page read and write
13C4000
heap
page read and write
5720000
direct allocation
page execute and read and write
E5E000
unkown
page execute and read and write
10EE000
unkown
page execute and read and write
17E6000
heap
page read and write
5161000
heap
page read and write
5161000
heap
page read and write
1740000
direct allocation
page read and write
451E000
stack
page read and write
5161000
heap
page read and write
5740000
direct allocation
page execute and read and write
16F5000
stack
page read and write
1D93E000
stack
page read and write
5161000
heap
page read and write
425F000
stack
page read and write
3360000
direct allocation
page execute and read and write
13C4000
heap
page read and write
13C4000
heap
page read and write
5161000
heap
page read and write
5161000
heap
page read and write
1D66F000
stack
page read and write
5161000
heap
page read and write
475F000
stack
page read and write
5161000
heap
page read and write
5161000
heap
page read and write
401E000
stack
page read and write
5161000
heap
page read and write
3E9F000
stack
page read and write
4C9E000
stack
page read and write
43DE000
stack
page read and write
399F000
stack
page read and write
5161000
heap
page read and write
13C4000
heap
page read and write
1B7E000
stack
page read and write
5161000
heap
page read and write
48DE000
stack
page read and write
5161000
heap
page read and write
13C4000
heap
page read and write
5161000
heap
page read and write
10FD000
unkown
page execute and read and write
16FE000
stack
page read and write
10FE000
unkown
page execute and write copy
5161000
heap
page read and write
3ADF000
stack
page read and write
5161000
heap
page read and write
5161000
heap
page read and write
375E000
stack
page read and write
5161000
heap
page read and write
132C000
stack
page read and write
3C5E000
stack
page read and write
479D000
stack
page read and write
1D52E000
stack
page read and write
5161000
heap
page read and write
13C4000
heap
page read and write
4F1E000
stack
page read and write
13C4000
heap
page read and write
5161000
heap
page read and write
5161000
heap
page read and write
4C5F000
stack
page read and write
13C4000
heap
page read and write
13C4000
heap
page read and write
5171000
heap
page read and write
13C4000
heap
page read and write
13C4000
heap
page read and write
4B5E000
stack
page read and write
5161000
heap
page read and write
C00000
unkown
page read and write
461F000
stack
page read and write
1A7E000
stack
page read and write
361E000
stack
page read and write
5161000
heap
page read and write
5720000
direct allocation
page execute and read and write
5161000
heap
page read and write
17BF000
heap
page read and write
1740000
direct allocation
page read and write
13F0000
heap
page read and write
4D9F000
stack
page read and write
501F000
stack
page read and write
55A0000
heap
page read and write
1740000
direct allocation
page read and write
1770000
heap
page read and write
13C4000
heap
page read and write
5730000
direct allocation
page execute and read and write
13C4000
heap
page read and write
5161000
heap
page read and write
3390000
heap
page read and write
411F000
stack
page read and write
5161000
heap
page read and write
505E000
stack
page read and write
CBD000
unkown
page execute and read and write
FE2000
unkown
page execute and read and write
13C4000
heap
page read and write
35DF000
stack
page read and write
4DDE000
stack
page read and write
3D5F000
stack
page read and write
13C4000
heap
page read and write
39DE000
stack
page read and write
489E000
stack
page read and write
13C4000
heap
page read and write
5161000
heap
page read and write
5161000
heap
page read and write
349F000
stack
page read and write
1380000
heap
page read and write
5161000
heap
page read and write
1740000
direct allocation
page read and write
1A3E000
stack
page read and write
3D9E000
stack
page read and write
10C4000
unkown
page execute and read and write
5161000
heap
page read and write
13C4000
heap
page read and write
335E000
stack
page read and write
3C1F000
stack
page read and write
1740000
direct allocation
page read and write
1740000
direct allocation
page read and write
5161000
heap
page read and write
10E7000
unkown
page execute and read and write
1DA3E000
stack
page read and write
5161000
heap
page read and write
439F000
stack
page read and write
34DB000
stack
page read and write
5161000
heap
page read and write
5161000
heap
page read and write
5161000
heap
page read and write
371F000
stack
page read and write
CB1000
unkown
page execute and read and write
5161000
heap
page read and write
13C4000
heap
page read and write
C00000
unkown
page readonly
13C4000
heap
page read and write
5161000
heap
page read and write
1778000
heap
page read and write
1740000
direct allocation
page read and write
3FDF000
stack
page read and write
5161000
heap
page read and write
5161000
heap
page read and write
1740000
direct allocation
page read and write
CE2000
unkown
page execute and read and write
5161000
heap
page read and write
13C4000
heap
page read and write
561E000
stack
page read and write
13C4000
heap
page read and write
1760000
direct allocation
page read and write
1D6AE000
stack
page read and write
10FD000
unkown
page execute and write copy
1D8EF000
stack
page read and write
1D7EE000
stack
page read and write
4A1E000
stack
page read and write
385F000
stack
page read and write
1DA7D000
stack
page read and write
13C4000
heap
page read and write
49DF000
stack
page read and write
13C4000
heap
page read and write
3EDE000
stack
page read and write
5161000
heap
page read and write
13C4000
heap
page read and write
1740000
direct allocation
page read and write
13C4000
heap
page read and write
13C4000
heap
page read and write
389E000
stack
page read and write
465E000
stack
page read and write
1760000
direct allocation
page read and write
3370000
direct allocation
page execute and read and write
13C4000
heap
page read and write
5161000
heap
page read and write
5161000
heap
page read and write
5161000
heap
page read and write
C01000
unkown
page execute and write copy
129A000
unkown
page execute and read and write
339B000
heap
page read and write
1740000
direct allocation
page read and write
There are 217 hidden memdumps, click here to show them.