IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phphS)
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpi
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
50F0000
direct allocation
page read and write
malicious
13CE000
heap
page read and write
malicious
731000
unkown
page execute and read and write
malicious
5270000
direct allocation
page execute and read and write
730000
unkown
page readonly
C2B000
unkown
page execute and read and write
731000
unkown
page execute and write copy
C1C000
unkown
page execute and read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
11B0000
heap
page read and write
2EA0000
heap
page read and write
2E9C000
stack
page read and write
401E000
stack
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
812000
unkown
page execute and read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
429D000
stack
page read and write
48DE000
stack
page read and write
1D06E000
stack
page read and write
98E000
unkown
page execute and read and write
4C61000
heap
page read and write
1D55D000
stack
page read and write
1D30E000
stack
page read and write
4C61000
heap
page read and write
C2C000
unkown
page execute and write copy
3B1E000
stack
page read and write
335F000
stack
page read and write
4C61000
heap
page read and write
3ADF000
stack
page read and write
4C61000
heap
page read and write
132D000
stack
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
1D02F000
stack
page read and write
4C61000
heap
page read and write
13B0000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
7ED000
unkown
page execute and read and write
4C61000
heap
page read and write
4C70000
heap
page read and write
5250000
direct allocation
page execute and read and write
12E5000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
50F0000
direct allocation
page read and write
2EC0000
direct allocation
page read and write
2ED0000
heap
page read and write
389E000
stack
page read and write
3EDE000
stack
page read and write
2EC0000
direct allocation
page read and write
30DF000
stack
page read and write
1D840000
heap
page read and write
2EC0000
direct allocation
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
321F000
stack
page read and write
4C61000
heap
page read and write
1155000
stack
page read and write
2EC0000
direct allocation
page read and write
49DF000
stack
page read and write
44DE000
stack
page read and write
3FDF000
stack
page read and write
4C60000
heap
page read and write
2ED7000
heap
page read and write
3C5E000
stack
page read and write
4C5F000
stack
page read and write
1D45D000
stack
page read and write
411F000
stack
page read and write
4C61000
heap
page read and write
371F000
stack
page read and write
4C64000
heap
page read and write
4C61000
heap
page read and write
7E1000
unkown
page execute and read and write
4C61000
heap
page read and write
1413000
heap
page read and write
489F000
stack
page read and write
1D16F000
stack
page read and write
4C61000
heap
page read and write
311E000
stack
page read and write
439F000
stack
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
475F000
stack
page read and write
1D1AE000
stack
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
2EC0000
direct allocation
page read and write
2EC0000
direct allocation
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
5240000
direct allocation
page execute and read and write
3C1F000
stack
page read and write
1D40F000
stack
page read and write
2EC0000
direct allocation
page read and write
339E000
stack
page read and write
2EC0000
direct allocation
page read and write
730000
unkown
page read and write
4C61000
heap
page read and write
BF1000
unkown
page execute and read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
C2B000
unkown
page execute and write copy
5260000
direct allocation
page execute and read and write
349F000
stack
page read and write
2EC0000
direct allocation
page read and write
4C61000
heap
page read and write
2EC0000
direct allocation
page read and write
35DF000
stack
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
415E000
stack
page read and write
4C61000
heap
page read and write
13AE000
stack
page read and write
4C61000
heap
page read and write
1D69C000
stack
page read and write
4B5E000
stack
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
1D73E000
stack
page read and write
DCB000
unkown
page execute and write copy
97A000
unkown
page execute and read and write
2FDF000
stack
page read and write
13C0000
heap
page read and write
50F0000
direct allocation
page read and write
4C61000
heap
page read and write
3E9F000
stack
page read and write
43DE000
stack
page read and write
4C61000
heap
page read and write
2EC0000
direct allocation
page read and write
12E0000
heap
page read and write
4B1F000
stack
page read and write
2EC0000
direct allocation
page read and write
4C61000
heap
page read and write
2EC0000
direct allocation
page read and write
325E000
stack
page read and write
512B000
stack
page read and write
13CA000
heap
page read and write
39DE000
stack
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
3D5F000
stack
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
5290000
direct allocation
page execute and read and write
4C80000
heap
page read and write
361E000
stack
page read and write
4C61000
heap
page read and write
399F000
stack
page read and write
4A1E000
stack
page read and write
3D9E000
stack
page read and write
461F000
stack
page read and write
2EC0000
direct allocation
page read and write
4C61000
heap
page read and write
2EDB000
heap
page read and write
4C61000
heap
page read and write
375E000
stack
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
425F000
stack
page read and write
4C61000
heap
page read and write
479E000
stack
page read and write
16BF000
stack
page read and write
4C61000
heap
page read and write
15BF000
stack
page read and write
34DE000
stack
page read and write
5270000
direct allocation
page execute and read and write
4C61000
heap
page read and write
115E000
stack
page read and write
B15000
unkown
page execute and read and write
465E000
stack
page read and write
1440000
heap
page read and write
4C61000
heap
page read and write
1D2AF000
stack
page read and write
4D60000
trusted library allocation
page read and write
105C000
stack
page read and write
4C61000
heap
page read and write
1290000
heap
page read and write
385F000
stack
page read and write
451E000
stack
page read and write
1426000
heap
page read and write
136E000
stack
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
DCA000
unkown
page execute and read and write
4C61000
heap
page read and write
522F000
stack
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
5280000
direct allocation
page execute and read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
1D83E000
stack
page read and write
4C61000
heap
page read and write
C15000
unkown
page execute and read and write
527E000
stack
page read and write
1D59E000
stack
page read and write
There are 194 hidden memdumps, click here to show them.