IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpuL
unknown
malicious
http://185.215.113.37L
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious

Domains

Name
IP
Malicious
198.187.3.20.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5C1000
unkown
page execute and read and write
malicious
52F0000
direct allocation
page read and write
malicious
148E000
heap
page read and write
malicious
A87000
unkown
page execute and read and write
13B0000
heap
page read and write
4E61000
heap
page read and write
67D000
unkown
page execute and read and write
1355000
stack
page read and write
4E61000
heap
page read and write
1DA50000
heap
page read and write
1470000
direct allocation
page read and write
40BE000
stack
page read and write
5490000
direct allocation
page execute and read and write
4E61000
heap
page read and write
1470000
direct allocation
page read and write
125C000
stack
page read and write
353F000
stack
page read and write
4E61000
heap
page read and write
1470000
direct allocation
page read and write
4E61000
heap
page read and write
4E60000
heap
page read and write
3CFE000
stack
page read and write
4E61000
heap
page read and write
13C0000
heap
page read and write
1D8AD000
stack
page read and write
4E61000
heap
page read and write
1470000
direct allocation
page read and write
178E000
stack
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
3F7E000
stack
page read and write
443F000
stack
page read and write
1470000
direct allocation
page read and write
30AB000
stack
page read and write
1512000
heap
page read and write
1470000
direct allocation
page read and write
671000
unkown
page execute and read and write
4E61000
heap
page read and write
5460000
direct allocation
page execute and read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
1470000
direct allocation
page read and write
1D23F000
stack
page read and write
4E61000
heap
page read and write
493F000
stack
page read and write
3A7E000
stack
page read and write
1470000
direct allocation
page read and write
33FF000
stack
page read and write
4E61000
heap
page read and write
45BE000
stack
page read and write
148A000
heap
page read and write
38FF000
stack
page read and write
4E61000
heap
page read and write
32FF000
stack
page read and write
4E61000
heap
page read and write
5C1000
unkown
page execute and write copy
497E000
stack
page read and write
41FE000
stack
page read and write
AA9000
unkown
page execute and read and write
1D62F000
stack
page read and write
4E61000
heap
page read and write
1D27E000
stack
page read and write
4E61000
heap
page read and write
5470000
direct allocation
page execute and read and write
4E61000
heap
page read and write
C60000
unkown
page execute and read and write
1470000
direct allocation
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
46BF000
stack
page read and write
3B7F000
stack
page read and write
1470000
direct allocation
page read and write
4E61000
heap
page read and write
1D76D000
stack
page read and write
1460000
heap
page read and write
4E61000
heap
page read and write
5450000
direct allocation
page execute and read and write
4E61000
heap
page read and write
1470000
direct allocation
page read and write
6A2000
unkown
page execute and read and write
144E000
stack
page read and write
357E000
stack
page read and write
30F7000
heap
page read and write
46FE000
stack
page read and write
1D4BE000
stack
page read and write
4E61000
heap
page read and write
52F0000
direct allocation
page read and write
1400000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
14D4000
heap
page read and write
3E3E000
stack
page read and write
4E61000
heap
page read and write
30F0000
heap
page read and write
447D000
stack
page read and write
4E61000
heap
page read and write
9A6000
unkown
page execute and read and write
3F3F000
stack
page read and write
1470000
direct allocation
page read and write
4F60000
trusted library allocation
page read and write
1D3BE000
stack
page read and write
1DA4E000
stack
page read and write
4E61000
heap
page read and write
1D66D000
stack
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
1470000
direct allocation
page read and write
4E61000
heap
page read and write
5480000
direct allocation
page execute and read and write
5440000
direct allocation
page execute and read and write
483E000
stack
page read and write
4E61000
heap
page read and write
31FF000
stack
page read and write
4E61000
heap
page read and write
174F000
stack
page read and write
3BBE000
stack
page read and write
AC1000
unkown
page execute and write copy
4E70000
heap
page read and write
4E61000
heap
page read and write
80A000
unkown
page execute and read and write
4E61000
heap
page read and write
532E000
stack
page read and write
4E61000
heap
page read and write
306E000
stack
page read and write
343E000
stack
page read and write
542F000
stack
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
547E000
stack
page read and write
4E61000
heap
page read and write
5C0000
unkown
page readonly
4E61000
heap
page read and write
4E61000
heap
page read and write
4E80000
heap
page read and write
14FC000
heap
page read and write
37BF000
stack
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
5470000
direct allocation
page execute and read and write
4BFE000
stack
page read and write
135E000
stack
page read and write
367F000
stack
page read and write
4A7F000
stack
page read and write
81E000
unkown
page execute and read and write
4E61000
heap
page read and write
433E000
stack
page read and write
4E61000
heap
page read and write
1405000
heap
page read and write
36BE000
stack
page read and write
14E9000
heap
page read and write
1505000
heap
page read and write
3CBF000
stack
page read and write
3A3F000
stack
page read and write
188E000
stack
page read and write
42FF000
stack
page read and write
4E61000
heap
page read and write
47FF000
stack
page read and write
4E61000
heap
page read and write
1D7AE000
stack
page read and write
407F000
stack
page read and write
4E61000
heap
page read and write
AC2000
unkown
page execute and write copy
4E61000
heap
page read and write
4E61000
heap
page read and write
54A0000
direct allocation
page execute and read and write
4BBF000
stack
page read and write
52F0000
direct allocation
page read and write
30EE000
stack
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
AB3000
unkown
page execute and read and write
1470000
direct allocation
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
30FB000
heap
page read and write
1480000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
457F000
stack
page read and write
41BF000
stack
page read and write
5C0000
unkown
page read and write
4ABE000
stack
page read and write
4CFF000
stack
page read and write
4E61000
heap
page read and write
1D52E000
stack
page read and write
AC1000
unkown
page execute and read and write
4E61000
heap
page read and write
4E40000
heap
page read and write
1D94E000
stack
page read and write
4E61000
heap
page read and write
3DFF000
stack
page read and write
4E61000
heap
page read and write
37FE000
stack
page read and write
1D37F000
stack
page read and write
393E000
stack
page read and write
4E3F000
stack
page read and write
4D3E000
stack
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
There are 197 hidden memdumps, click here to show them.