IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpT
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpH
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
15CE000
heap
page read and write
malicious
5480000
direct allocation
page read and write
malicious
9A1000
unkown
page execute and read and write
malicious
4FF1000
heap
page read and write
4FF1000
heap
page read and write
4C4E000
stack
page read and write
4FF1000
heap
page read and write
BFE000
unkown
page execute and read and write
4FF1000
heap
page read and write
5620000
direct allocation
page execute and read and write
55D0000
direct allocation
page execute and read and write
1D4FE000
stack
page read and write
15C0000
heap
page read and write
3D4E000
stack
page read and write
394F000
stack
page read and write
1D3BF000
stack
page read and write
3F8F000
stack
page read and write
4FF1000
heap
page read and write
36CF000
stack
page read and write
11E5000
heap
page read and write
4FF1000
heap
page read and write
100E000
unkown
page execute and read and write
4FD0000
heap
page read and write
E6D000
unkown
page execute and read and write
4FF1000
heap
page read and write
155E000
stack
page read and write
3ACE000
stack
page read and write
4FF1000
heap
page read and write
A51000
unkown
page execute and read and write
11AE000
stack
page read and write
9A1000
unkown
page execute and write copy
1D79F000
stack
page read and write
4FF1000
heap
page read and write
45CF000
stack
page read and write
55E0000
direct allocation
page execute and read and write
4FF1000
heap
page read and write
410E000
stack
page read and write
18BE000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
560E000
stack
page read and write
9A0000
unkown
page readonly
4FF1000
heap
page read and write
4FF1000
heap
page read and write
398E000
stack
page read and write
4FF1000
heap
page read and write
9A0000
unkown
page read and write
5600000
direct allocation
page execute and read and write
31F0000
direct allocation
page read and write
31F0000
direct allocation
page read and write
1410000
heap
page read and write
3BCF000
stack
page read and write
A82000
unkown
page execute and read and write
358F000
stack
page read and write
1636000
heap
page read and write
448F000
stack
page read and write
11A5000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
15C8000
heap
page read and write
E4A000
unkown
page execute and read and write
4FF1000
heap
page read and write
1643000
heap
page read and write
348E000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
424E000
stack
page read and write
4FF1000
heap
page read and write
31F0000
direct allocation
page read and write
3C0E000
stack
page read and write
E83000
unkown
page execute and write copy
4ECE000
stack
page read and write
35CE000
stack
page read and write
4C0F000
stack
page read and write
1DA2C000
stack
page read and write
5480000
direct allocation
page read and write
E73000
unkown
page execute and read and write
11E0000
heap
page read and write
4FF1000
heap
page read and write
31F0000
direct allocation
page read and write
4FF1000
heap
page read and write
5000000
heap
page read and write
1D7EE000
stack
page read and write
4FF1000
heap
page read and write
1628000
heap
page read and write
4FF0000
heap
page read and write
18FE000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
31F0000
direct allocation
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
344F000
stack
page read and write
3D0F000
stack
page read and write
3FCE000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
55F0000
direct allocation
page execute and read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
159D000
stack
page read and write
4FF1000
heap
page read and write
474E000
stack
page read and write
1D53E000
stack
page read and write
334C000
stack
page read and write
3E4F000
stack
page read and write
1D3FE000
stack
page read and write
5480000
direct allocation
page read and write
488E000
stack
page read and write
31F0000
direct allocation
page read and write
484F000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
384E000
stack
page read and write
31E0000
heap
page read and write
4FF1000
heap
page read and write
E82000
unkown
page execute and write copy
4FF1000
heap
page read and write
44CE000
stack
page read and write
4FF1000
heap
page read and write
19FE000
stack
page read and write
4FF1000
heap
page read and write
460E000
stack
page read and write
A5D000
unkown
page execute and read and write
55BF000
stack
page read and write
4FF1000
heap
page read and write
438E000
stack
page read and write
5610000
direct allocation
page execute and read and write
BEA000
unkown
page execute and read and write
1615000
heap
page read and write
17BE000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
1D63F000
stack
page read and write
3A8F000
stack
page read and write
49CE000
stack
page read and write
4FF1000
heap
page read and write
D7B000
unkown
page execute and read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
370E000
stack
page read and write
31F0000
direct allocation
page read and write
5005000
heap
page read and write
1D92D000
stack
page read and write
4FF1000
heap
page read and write
31F0000
direct allocation
page read and write
4FF1000
heap
page read and write
4D8E000
stack
page read and write
3200000
heap
page read and write
4ACF000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
40CF000
stack
page read and write
31DE000
stack
page read and write
4FF1000
heap
page read and write
14F0000
heap
page read and write
1653000
heap
page read and write
3207000
heap
page read and write
380F000
stack
page read and write
4FF1000
heap
page read and write
1D8ED000
stack
page read and write
31F0000
direct allocation
page read and write
50F0000
trusted library allocation
page read and write
31F0000
direct allocation
page read and write
1610000
heap
page read and write
100F000
unkown
page execute and write copy
10AC000
stack
page read and write
320B000
heap
page read and write
4FF1000
heap
page read and write
434F000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
31F0000
direct allocation
page read and write
4D4F000
stack
page read and write
1D69E000
stack
page read and write
4FF1000
heap
page read and write
470F000
stack
page read and write
420F000
stack
page read and write
330F000
stack
page read and write
5010000
heap
page read and write
4FF1000
heap
page read and write
4B0E000
stack
page read and write
31F0000
direct allocation
page read and write
4FF1000
heap
page read and write
498F000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
31F0000
direct allocation
page read and write
4FF1000
heap
page read and write
E82000
unkown
page execute and read and write
4FF1000
heap
page read and write
5600000
direct allocation
page execute and read and write
4E8F000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
54BE000
stack
page read and write
4FCF000
stack
page read and write
3E8E000
stack
page read and write
4FF1000
heap
page read and write
31F0000
direct allocation
page read and write
There are 196 hidden memdumps, click here to show them.