IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php(#
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpo
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37w
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpS
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpG
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
671000
unkown
page execute and read and write
malicious
129E000
heap
page read and write
malicious
4F30000
direct allocation
page read and write
malicious
2D60000
direct allocation
page read and write
4F30000
direct allocation
page read and write
4AA1000
heap
page read and write
2F7F000
stack
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
457F000
stack
page read and write
671000
unkown
page execute and write copy
4AA1000
heap
page read and write
1CE6F000
stack
page read and write
4AA1000
heap
page read and write
4A7F000
stack
page read and write
4AA1000
heap
page read and write
B5C000
unkown
page execute and read and write
506F000
stack
page read and write
10F5000
stack
page read and write
493F000
stack
page read and write
670000
unkown
page readonly
343E000
stack
page read and write
4AA1000
heap
page read and write
2D60000
direct allocation
page read and write
650000
heap
page read and write
4AA1000
heap
page read and write
3A3F000
stack
page read and write
1314000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
45BE000
stack
page read and write
2C8E000
stack
page read and write
DF5000
heap
page read and write
4F30000
direct allocation
page read and write
4AA1000
heap
page read and write
2D60000
direct allocation
page read and write
50B0000
direct allocation
page execute and read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
B6A000
unkown
page execute and read and write
8CE000
unkown
page execute and read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
4AA0000
heap
page read and write
8BA000
unkown
page execute and read and write
3BBE000
stack
page read and write
4F6E000
stack
page read and write
2D70000
heap
page read and write
4AA1000
heap
page read and write
3CBF000
stack
page read and write
4AA1000
heap
page read and write
1D15E000
stack
page read and write
3F7E000
stack
page read and write
4AA1000
heap
page read and write
DF0000
heap
page read and write
B2F000
unkown
page execute and read and write
357E000
stack
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
5FC000
stack
page read and write
4AA1000
heap
page read and write
670000
unkown
page read and write
5090000
direct allocation
page execute and read and write
4AA1000
heap
page read and write
353F000
stack
page read and write
50A0000
direct allocation
page execute and read and write
B6B000
unkown
page execute and write copy
50BE000
stack
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
42FF000
stack
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
40BE000
stack
page read and write
4AA1000
heap
page read and write
407F000
stack
page read and write
497E000
stack
page read and write
5080000
direct allocation
page execute and read and write
37FE000
stack
page read and write
4AA1000
heap
page read and write
1D25F000
stack
page read and write
32FE000
stack
page read and write
4AA1000
heap
page read and write
114E000
stack
page read and write
4AA1000
heap
page read and write
4AB0000
heap
page read and write
4AA1000
heap
page read and write
3A7E000
stack
page read and write
129A000
heap
page read and write
124E000
stack
page read and write
2D60000
direct allocation
page read and write
4AA1000
heap
page read and write
1D3DD000
stack
page read and write
393E000
stack
page read and write
3F3F000
stack
page read and write
2D4E000
stack
page read and write
4AA1000
heap
page read and write
2D60000
direct allocation
page read and write
A59000
unkown
page execute and read and write
72D000
unkown
page execute and read and write
4AC0000
heap
page read and write
2D7B000
heap
page read and write
4AA1000
heap
page read and write
2D60000
direct allocation
page read and write
447E000
stack
page read and write
B51000
unkown
page execute and read and write
1CEAE000
stack
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
D07000
unkown
page execute and read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
367F000
stack
page read and write
1D0EF000
stack
page read and write
4AA1000
heap
page read and write
33FF000
stack
page read and write
2D60000
direct allocation
page read and write
46FE000
stack
page read and write
433E000
stack
page read and write
4AA1000
heap
page read and write
660000
heap
page read and write
31BE000
stack
page read and write
50D0000
direct allocation
page execute and read and write
752000
unkown
page execute and read and write
317F000
stack
page read and write
50C0000
direct allocation
page execute and read and write
1D4DF000
stack
page read and write
2D77000
heap
page read and write
38FF000
stack
page read and write
4EE0000
trusted library allocation
page read and write
2D60000
direct allocation
page read and write
3B7F000
stack
page read and write
4AA1000
heap
page read and write
1D39D000
stack
page read and write
3E3E000
stack
page read and write
148E000
stack
page read and write
1D29E000
stack
page read and write
4AA1000
heap
page read and write
32BF000
stack
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
483E000
stack
page read and write
36BE000
stack
page read and write
1CFEE000
stack
page read and write
2E7F000
stack
page read and write
B6A000
unkown
page execute and write copy
12E2000
heap
page read and write
4AA1000
heap
page read and write
2D60000
direct allocation
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
443F000
stack
page read and write
3DFF000
stack
page read and write
41FE000
stack
page read and write
4AA1000
heap
page read and write
4A80000
heap
page read and write
2D60000
direct allocation
page read and write
50B0000
direct allocation
page execute and read and write
2CCC000
stack
page read and write
2D60000
direct allocation
page read and write
47FF000
stack
page read and write
D08000
unkown
page execute and write copy
4AA1000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
12FB000
heap
page read and write
2D60000
direct allocation
page read and write
46BF000
stack
page read and write
3CFE000
stack
page read and write
10FE000
stack
page read and write
307F000
stack
page read and write
2D0E000
stack
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
128E000
stack
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
1CFAF000
stack
page read and write
2D50000
heap
page read and write
37BF000
stack
page read and write
41BF000
stack
page read and write
4AA1000
heap
page read and write
2D60000
direct allocation
page read and write
2D60000
direct allocation
page read and write
4AA1000
heap
page read and write
1290000
heap
page read and write
721000
unkown
page execute and read and write
4AB5000
heap
page read and write
There are 193 hidden memdumps, click here to show them.