IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/e2b1563c6670f193.php?M9
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpRL
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php-
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/rosoft
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37e
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpy
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1C1000
unkown
page execute and read and write
malicious
148E000
heap
page read and write
malicious
50F0000
direct allocation
page read and write
malicious
4C61000
heap
page read and write
1334000
heap
page read and write
4C50000
direct allocation
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
1D57C000
stack
page read and write
4C61000
heap
page read and write
464E000
stack
page read and write
348F000
stack
page read and write
1D47D000
stack
page read and write
1334000
heap
page read and write
49CF000
stack
page read and write
400E000
stack
page read and write
6B9000
unkown
page execute and write copy
3C4E000
stack
page read and write
48CE000
stack
page read and write
1334000
heap
page read and write
4C61000
heap
page read and write
50F0000
direct allocation
page read and write
4C61000
heap
page read and write
1D6BE000
stack
page read and write
35CF000
stack
page read and write
4C61000
heap
page read and write
1334000
heap
page read and write
131E000
stack
page read and write
488F000
stack
page read and write
1334000
heap
page read and write
360E000
stack
page read and write
1334000
heap
page read and write
398F000
stack
page read and write
4C50000
direct allocation
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
107C000
stack
page read and write
1334000
heap
page read and write
3E8F000
stack
page read and write
1334000
heap
page read and write
4C50000
direct allocation
page read and write
410F000
stack
page read and write
1334000
heap
page read and write
41E000
unkown
page execute and read and write
14E7000
heap
page read and write
3D4F000
stack
page read and write
1D06F000
stack
page read and write
1334000
heap
page read and write
4C61000
heap
page read and write
4C50000
direct allocation
page read and write
4C4F000
stack
page read and write
50D0000
heap
page read and write
4C50000
direct allocation
page read and write
3000000
heap
page read and write
324E000
stack
page read and write
4A0E000
stack
page read and write
84F000
unkown
page execute and read and write
1D0AE000
stack
page read and write
3FCF000
stack
page read and write
4C50000
direct allocation
page read and write
384F000
stack
page read and write
522F000
stack
page read and write
414E000
stack
page read and write
1330000
heap
page read and write
4C50000
direct allocation
page read and write
4C61000
heap
page read and write
167F000
stack
page read and write
6B9000
unkown
page execute and read and write
1334000
heap
page read and write
1334000
heap
page read and write
300B000
heap
page read and write
1CF6E000
stack
page read and write
4C61000
heap
page read and write
5250000
direct allocation
page execute and read and write
4C61000
heap
page read and write
1334000
heap
page read and write
4C61000
heap
page read and write
1334000
heap
page read and write
5270000
direct allocation
page execute and read and write
4C61000
heap
page read and write
1334000
heap
page read and write
4C61000
heap
page read and write
474F000
stack
page read and write
512E000
stack
page read and write
4C61000
heap
page read and write
1334000
heap
page read and write
4C61000
heap
page read and write
310F000
stack
page read and write
3C0F000
stack
page read and write
320F000
stack
page read and write
1D1EE000
stack
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
4C61000
heap
page read and write
3D8E000
stack
page read and write
143F000
stack
page read and write
1334000
heap
page read and write
1D5BD000
stack
page read and write
4C61000
heap
page read and write
2FEE000
stack
page read and write
4C80000
heap
page read and write
338E000
stack
page read and write
3ECE000
stack
page read and write
4C50000
direct allocation
page read and write
1334000
heap
page read and write
4C50000
direct allocation
page read and write
4C61000
heap
page read and write
6BA000
unkown
page execute and write copy
4B4E000
stack
page read and write
1D2EF000
stack
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
1334000
heap
page read and write
4C61000
heap
page read and write
334F000
stack
page read and write
1334000
heap
page read and write
1503000
heap
page read and write
3B0E000
stack
page read and write
1D32E000
stack
page read and write
1334000
heap
page read and write
2FAB000
stack
page read and write
39CE000
stack
page read and write
370F000
stack
page read and write
4C61000
heap
page read and write
4C50000
direct allocation
page read and write
11D0000
heap
page read and write
4B0F000
stack
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
4C50000
direct allocation
page read and write
1C1000
unkown
page execute and write copy
4C50000
direct allocation
page read and write
2FF0000
heap
page read and write
4C61000
heap
page read and write
5290000
direct allocation
page execute and read and write
2A2000
unkown
page execute and read and write
1334000
heap
page read and write
478E000
stack
page read and write
4C50000
direct allocation
page read and write
4C61000
heap
page read and write
460F000
stack
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
1D42F000
stack
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
14D5000
heap
page read and write
5270000
direct allocation
page execute and read and write
450E000
stack
page read and write
34CE000
stack
page read and write
1175000
stack
page read and write
4C61000
heap
page read and write
1C0000
unkown
page read and write
44CF000
stack
page read and write
4C61000
heap
page read and write
1D1AE000
stack
page read and write
424F000
stack
page read and write
4C70000
heap
page read and write
1334000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
271000
unkown
page execute and read and write
1334000
heap
page read and write
1C0000
unkown
page readonly
6AB000
unkown
page execute and read and write
147E000
stack
page read and write
40A000
unkown
page execute and read and write
2F6F000
stack
page read and write
5280000
direct allocation
page execute and read and write
4C61000
heap
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
4C61000
heap
page read and write
1334000
heap
page read and write
428D000
stack
page read and write
1334000
heap
page read and write
5240000
direct allocation
page execute and read and write
1334000
heap
page read and write
4C61000
heap
page read and write
1334000
heap
page read and write
5260000
direct allocation
page execute and read and write
4D60000
trusted library allocation
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
4C60000
heap
page read and write
4C61000
heap
page read and write
1334000
heap
page read and write
3007000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
388E000
stack
page read and write
1334000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
850000
unkown
page execute and write copy
4C61000
heap
page read and write
5A8000
unkown
page execute and read and write
67E000
unkown
page execute and read and write
6A0000
unkown
page execute and read and write
27D000
unkown
page execute and read and write
43CE000
stack
page read and write
1334000
heap
page read and write
1334000
heap
page read and write
438F000
stack
page read and write
374E000
stack
page read and write
4C61000
heap
page read and write
2E6E000
stack
page read and write
1480000
heap
page read and write
12B0000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
3ACF000
stack
page read and write
1488000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
1334000
heap
page read and write
4C50000
direct allocation
page read and write
4C61000
heap
page read and write
50F0000
direct allocation
page read and write
117F000
stack
page read and write
150D000
heap
page read and write
4C61000
heap
page read and write
4C65000
heap
page read and write
There are 218 hidden memdumps, click here to show them.