IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/e2b1563c6670f193.php~
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php&
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpj
unknown
malicious
http://185.215.113.37/l
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
871000
unkown
page execute and read and write
malicious
5230000
direct allocation
page read and write
malicious
15BE000
heap
page read and write
malicious
4EA0000
trusted library allocation
page read and write
411E000
stack
page read and write
4DA1000
heap
page read and write
53A0000
direct allocation
page execute and read and write
870000
unkown
page read and write
4DA1000
heap
page read and write
1D44E000
stack
page read and write
349E000
stack
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
5380000
direct allocation
page execute and read and write
4D90000
direct allocation
page read and write
4DA0000
heap
page read and write
3FDE000
stack
page read and write
15B0000
heap
page read and write
4DA1000
heap
page read and write
53B0000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
13E0000
heap
page read and write
2FDB000
heap
page read and write
335E000
stack
page read and write
1D16F000
stack
page read and write
4DA1000
heap
page read and write
449E000
stack
page read and write
1D6DD000
stack
page read and write
4DA1000
heap
page read and write
5230000
direct allocation
page read and write
4D90000
direct allocation
page read and write
1602000
heap
page read and write
4DA1000
heap
page read and write
3E9E000
stack
page read and write
4DA1000
heap
page read and write
4D90000
direct allocation
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
44DE000
stack
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
5230000
direct allocation
page read and write
D5E000
unkown
page execute and read and write
475E000
stack
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
D30000
unkown
page execute and read and write
30DF000
stack
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
92D000
unkown
page execute and read and write
53C0000
direct allocation
page execute and read and write
ABA000
unkown
page execute and read and write
536F000
stack
page read and write
4DA1000
heap
page read and write
1D980000
heap
page read and write
4DA1000
heap
page read and write
2FCC000
stack
page read and write
4C2F000
stack
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
3BDF000
stack
page read and write
ACE000
unkown
page execute and read and write
3D1F000
stack
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
3ADE000
stack
page read and write
4DA1000
heap
page read and write
499F000
stack
page read and write
13D5000
heap
page read and write
4D90000
direct allocation
page read and write
399E000
stack
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
345F000
stack
page read and write
5390000
direct allocation
page execute and read and write
435F000
stack
page read and write
1D97F000
stack
page read and write
4DA1000
heap
page read and write
154E000
stack
page read and write
12F5000
stack
page read and write
158E000
stack
page read and write
1632000
heap
page read and write
4DA1000
heap
page read and write
4D90000
direct allocation
page read and write
F0A000
unkown
page execute and write copy
4DA1000
heap
page read and write
35DE000
stack
page read and write
2F8E000
stack
page read and write
4DA1000
heap
page read and write
2FD7000
heap
page read and write
485F000
stack
page read and write
49EE000
stack
page read and write
4DA1000
heap
page read and write
439E000
stack
page read and write
D6C000
unkown
page execute and write copy
489E000
stack
page read and write
4DA1000
heap
page read and write
4D6F000
stack
page read and write
4DA1000
heap
page read and write
921000
unkown
page execute and read and write
4DA1000
heap
page read and write
3F9F000
stack
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
331F000
stack
page read and write
4DA1000
heap
page read and write
36DF000
stack
page read and write
359F000
stack
page read and write
395F000
stack
page read and write
1D87E000
stack
page read and write
53B0000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
4DB0000
heap
page read and write
4DA1000
heap
page read and write
381F000
stack
page read and write
870000
unkown
page readonly
471F000
stack
page read and write
4DA1000
heap
page read and write
1D1AE000
stack
page read and write
12FE000
stack
page read and write
385E000
stack
page read and write
4D90000
direct allocation
page read and write
45DF000
stack
page read and write
4D70000
heap
page read and write
4D90000
direct allocation
page read and write
D55000
unkown
page execute and read and write
1D54F000
stack
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
C51000
unkown
page execute and read and write
461E000
stack
page read and write
4DA1000
heap
page read and write
3A9F000
stack
page read and write
53D0000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
1D7DE000
stack
page read and write
4DA1000
heap
page read and write
4B2E000
stack
page read and write
1617000
heap
page read and write
4D90000
direct allocation
page read and write
952000
unkown
page execute and read and write
2FD0000
heap
page read and write
4DA1000
heap
page read and write
1D3EE000
stack
page read and write
4DA4000
heap
page read and write
4DA1000
heap
page read and write
144E000
stack
page read and write
4DA1000
heap
page read and write
15BA000
heap
page read and write
4DC0000
heap
page read and write
425E000
stack
page read and write
3C1E000
stack
page read and write
F9C000
stack
page read and write
4DA1000
heap
page read and write
526E000
stack
page read and write
1D2AF000
stack
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
321E000
stack
page read and write
31DF000
stack
page read and write
4D90000
direct allocation
page read and write
4D90000
direct allocation
page read and write
40DF000
stack
page read and write
4AEF000
stack
page read and write
D6C000
unkown
page execute and read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
3D5E000
stack
page read and write
53BE000
stack
page read and write
13D0000
heap
page read and write
FF0000
heap
page read and write
421F000
stack
page read and write
4D90000
direct allocation
page read and write
4C6E000
stack
page read and write
1D69C000
stack
page read and write
1D2EE000
stack
page read and write
17AF000
stack
page read and write
1D59D000
stack
page read and write
371E000
stack
page read and write
D6D000
unkown
page execute and write copy
4DA1000
heap
page read and write
4D90000
direct allocation
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
871000
unkown
page execute and write copy
4DA1000
heap
page read and write
4D90000
direct allocation
page read and write
3E5F000
stack
page read and write
4DA1000
heap
page read and write
4D90000
direct allocation
page read and write
4DA1000
heap
page read and write
F09000
unkown
page execute and read and write
4DA1000
heap
page read and write
49A0000
heap
page read and write
There are 194 hidden memdumps, click here to show them.