IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/e2b1563c6670f193.phpz9jv%
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpn9fv&
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37e
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phptop
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
541000
unkown
page execute and read and write
malicious
4EF0000
direct allocation
page read and write
malicious
121E000
heap
page read and write
malicious
37EE000
stack
page read and write
432E000
stack
page read and write
10A4000
heap
page read and write
10A4000
heap
page read and write
1CFFE000
stack
page read and write
4A71000
heap
page read and write
1CD7E000
stack
page read and write
4A71000
heap
page read and write
5090000
direct allocation
page execute and read and write
11D0000
heap
page read and write
121A000
heap
page read and write
10A4000
heap
page read and write
4A71000
heap
page read and write
2DAF000
stack
page read and write
36AE000
stack
page read and write
10A4000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
10A4000
heap
page read and write
306E000
stack
page read and write
32EE000
stack
page read and write
3CAF000
stack
page read and write
3DEF000
stack
page read and write
4A71000
heap
page read and write
4B70000
trusted library allocation
page read and write
352F000
stack
page read and write
541000
unkown
page execute and write copy
4A71000
heap
page read and write
4A71000
heap
page read and write
3F2F000
stack
page read and write
4ED0000
heap
page read and write
392E000
stack
page read and write
F75000
stack
page read and write
4A71000
heap
page read and write
3F6E000
stack
page read and write
1CE7F000
stack
page read and write
1D28D000
stack
page read and write
11E0000
direct allocation
page read and write
79E000
unkown
page execute and read and write
5080000
direct allocation
page execute and read and write
4A71000
heap
page read and write
10A4000
heap
page read and write
4F2E000
stack
page read and write
11E0000
direct allocation
page read and write
1D14E000
stack
page read and write
4A71000
heap
page read and write
10A4000
heap
page read and write
1210000
heap
page read and write
4A71000
heap
page read and write
38EF000
stack
page read and write
4A71000
heap
page read and write
11FB000
heap
page read and write
11E0000
direct allocation
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
502F000
stack
page read and write
540000
unkown
page readonly
10A4000
heap
page read and write
4A71000
heap
page read and write
10A4000
heap
page read and write
10A4000
heap
page read and write
4A71000
heap
page read and write
11F7000
heap
page read and write
5060000
direct allocation
page execute and read and write
4A71000
heap
page read and write
A32000
unkown
page execute and read and write
496E000
stack
page read and write
4A71000
heap
page read and write
10A4000
heap
page read and write
2EEF000
stack
page read and write
10A4000
heap
page read and write
4A71000
heap
page read and write
5070000
direct allocation
page execute and read and write
4A71000
heap
page read and write
1278000
heap
page read and write
FE0000
heap
page read and write
BE1000
unkown
page execute and write copy
622000
unkown
page execute and read and write
11E0000
direct allocation
page read and write
11E0000
direct allocation
page read and write
11E0000
direct allocation
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
A41000
unkown
page execute and write copy
4A87000
heap
page read and write
4A71000
heap
page read and write
32AF000
stack
page read and write
F7F000
stack
page read and write
3B6F000
stack
page read and write
10A4000
heap
page read and write
11CE000
stack
page read and write
10A4000
heap
page read and write
46AF000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
10A4000
heap
page read and write
10A4000
heap
page read and write
1294000
heap
page read and write
540000
unkown
page read and write
5040000
direct allocation
page execute and read and write
1CEBE000
stack
page read and write
140E000
stack
page read and write
2DEC000
stack
page read and write
11E0000
direct allocation
page read and write
10A4000
heap
page read and write
4A71000
heap
page read and write
2F2E000
stack
page read and write
37AF000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
10A4000
heap
page read and write
A03000
unkown
page execute and read and write
4A90000
heap
page read and write
150E000
stack
page read and write
10A4000
heap
page read and write
4A71000
heap
page read and write
10A4000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
10A4000
heap
page read and write
4A71000
heap
page read and write
10A0000
heap
page read and write
10A4000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
442F000
stack
page read and write
31AE000
stack
page read and write
5FD000
unkown
page execute and read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
41EE000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
492F000
stack
page read and write
125F000
heap
page read and write
50A0000
direct allocation
page execute and read and write
11E0000
direct allocation
page read and write
482E000
stack
page read and write
446E000
stack
page read and write
4A71000
heap
page read and write
10A4000
heap
page read and write
46EE000
stack
page read and write
4A71000
heap
page read and write
10A4000
heap
page read and write
316F000
stack
page read and write
4EF0000
direct allocation
page read and write
1CFBF000
stack
page read and write
FD0000
heap
page read and write
10A4000
heap
page read and write
922000
unkown
page execute and read and write
356E000
stack
page read and write
4A71000
heap
page read and write
10A4000
heap
page read and write
10A4000
heap
page read and write
4A71000
heap
page read and write
3A2F000
stack
page read and write
10A4000
heap
page read and write
456F000
stack
page read and write
3A6E000
stack
page read and write
47EF000
stack
page read and write
108E000
stack
page read and write
42EF000
stack
page read and write
A42000
unkown
page execute and write copy
366F000
stack
page read and write
4A71000
heap
page read and write
10A4000
heap
page read and write
10A4000
heap
page read and write
4A71000
heap
page read and write
E7C000
stack
page read and write
4EF0000
direct allocation
page read and write
4A71000
heap
page read and write
A28000
unkown
page execute and read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
11F0000
heap
page read and write
1D0FE000
stack
page read and write
5050000
direct allocation
page execute and read and write
10A4000
heap
page read and write
78A000
unkown
page execute and read and write
104E000
stack
page read and write
40AE000
stack
page read and write
4A70000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
11E0000
direct allocation
page read and write
4A71000
heap
page read and write
10A4000
heap
page read and write
10A4000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
3CEE000
stack
page read and write
4A71000
heap
page read and write
1D4CE000
stack
page read and write
10A4000
heap
page read and write
1D3CE000
stack
page read and write
4A71000
heap
page read and write
302F000
stack
page read and write
11E0000
direct allocation
page read and write
4A71000
heap
page read and write
11E0000
direct allocation
page read and write
4A71000
heap
page read and write
A41000
unkown
page execute and read and write
BE0000
unkown
page execute and read and write
10A4000
heap
page read and write
3E2E000
stack
page read and write
406F000
stack
page read and write
5F1000
unkown
page execute and read and write
4A71000
heap
page read and write
342E000
stack
page read and write
5070000
direct allocation
page execute and read and write
41AE000
stack
page read and write
1D38C000
stack
page read and write
11E0000
direct allocation
page read and write
4A6F000
stack
page read and write
45AE000
stack
page read and write
3BAE000
stack
page read and write
10A4000
heap
page read and write
1264000
heap
page read and write
33EF000
stack
page read and write
1D24F000
stack
page read and write
10A4000
heap
page read and write
11E0000
direct allocation
page read and write
11E0000
direct allocation
page read and write
4A71000
heap
page read and write
There are 221 hidden memdumps, click here to show them.