IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpt5b
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpf
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.378
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php)
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phph
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php7
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1B1000
unkown
page execute and read and write
malicious
4B60000
direct allocation
page read and write
malicious
ECE000
heap
page read and write
malicious
D74000
heap
page read and write
4D00000
direct allocation
page execute and read and write
47D0000
trusted library allocation
page read and write
46E0000
heap
page read and write
2B7E000
stack
page read and write
46C0000
direct allocation
page read and write
447E000
stack
page read and write
D74000
heap
page read and write
46D1000
heap
page read and write
1CFFC000
stack
page read and write
D74000
heap
page read and write
46C0000
direct allocation
page read and write
D74000
heap
page read and write
40E000
unkown
page execute and read and write
46C0000
direct allocation
page read and write
8EC000
stack
page read and write
46D1000
heap
page read and write
6A7000
unkown
page execute and read and write
4CF0000
direct allocation
page execute and read and write
46D1000
heap
page read and write
433E000
stack
page read and write
4B40000
heap
page read and write
46D1000
heap
page read and write
2C7F000
stack
page read and write
D74000
heap
page read and write
59D000
unkown
page execute and read and write
D74000
heap
page read and write
46D1000
heap
page read and write
D74000
heap
page read and write
46D1000
heap
page read and write
3E3E000
stack
page read and write
46D1000
heap
page read and write
4B9E000
stack
page read and write
28F7000
heap
page read and write
D74000
heap
page read and write
1D03E000
stack
page read and write
1B0000
unkown
page read and write
D74000
heap
page read and write
46C0000
direct allocation
page read and write
6B6000
unkown
page execute and read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
1D2A4000
heap
page read and write
46D1000
heap
page read and write
31BE000
stack
page read and write
46D1000
heap
page read and write
DBE000
stack
page read and write
46C0000
direct allocation
page read and write
D74000
heap
page read and write
443F000
stack
page read and write
46D1000
heap
page read and write
41FE000
stack
page read and write
32BF000
stack
page read and write
1CAEF000
stack
page read and write
3BBE000
stack
page read and write
46C0000
direct allocation
page read and write
2EFF000
stack
page read and write
46E5000
heap
page read and write
D74000
heap
page read and write
46D1000
heap
page read and write
367F000
stack
page read and write
4D10000
direct allocation
page execute and read and write
2B3F000
stack
page read and write
F13000
heap
page read and write
D74000
heap
page read and write
D70000
heap
page read and write
46D1000
heap
page read and write
46BF000
stack
page read and write
6B7000
unkown
page execute and write copy
32FE000
stack
page read and write
46D1000
heap
page read and write
3DFF000
stack
page read and write
46C0000
direct allocation
page read and write
1C9EE000
stack
page read and write
F26000
heap
page read and write
3F3F000
stack
page read and write
46D1000
heap
page read and write
2DFE000
stack
page read and write
1CEFE000
stack
page read and write
36BE000
stack
page read and write
46D1000
heap
page read and write
3CFE000
stack
page read and write
D74000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
2CBE000
stack
page read and write
D74000
heap
page read and write
D74000
heap
page read and write
D74000
heap
page read and write
EBF000
stack
page read and write
303F000
stack
page read and write
46D1000
heap
page read and write
D74000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
1D2A0000
heap
page read and write
26D000
unkown
page execute and read and write
D74000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
28E0000
heap
page read and write
46D1000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
292000
unkown
page execute and read and write
9E5000
stack
page read and write
1CD6E000
stack
page read and write
46D1000
heap
page read and write
D74000
heap
page read and write
D74000
heap
page read and write
46D1000
heap
page read and write
4C9F000
stack
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
1CDAE000
stack
page read and write
1CEAF000
stack
page read and write
46C0000
direct allocation
page read and write
357E000
stack
page read and write
46D1000
heap
page read and write
317F000
stack
page read and write
46D1000
heap
page read and write
1CB2E000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
3A7E000
stack
page read and write
261000
unkown
page execute and read and write
69D000
unkown
page execute and read and write
2A3B000
stack
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
D74000
heap
page read and write
457F000
stack
page read and write
D74000
heap
page read and write
46D1000
heap
page read and write
D74000
heap
page read and write
407F000
stack
page read and write
46D0000
heap
page read and write
10FF000
stack
page read and write
D74000
heap
page read and write
46D1000
heap
page read and write
4B60000
direct allocation
page read and write
F0D000
heap
page read and write
3F7E000
stack
page read and write
1B1000
unkown
page execute and write copy
1CC2F000
stack
page read and write
38FF000
stack
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
1B0000
unkown
page readonly
393E000
stack
page read and write
46D1000
heap
page read and write
1D13E000
stack
page read and write
FFE000
stack
page read and write
D74000
heap
page read and write
F41000
heap
page read and write
1D19E000
stack
page read and write
46F0000
heap
page read and write
46D1000
heap
page read and write
28DE000
stack
page read and write
D74000
heap
page read and write
1CC6E000
stack
page read and write
46D1000
heap
page read and write
33FF000
stack
page read and write
353F000
stack
page read and write
4CB0000
direct allocation
page execute and read and write
46D1000
heap
page read and write
D74000
heap
page read and write
46D1000
heap
page read and write
D74000
heap
page read and write
D74000
heap
page read and write
29FF000
stack
page read and write
4B60000
direct allocation
page read and write
46C0000
direct allocation
page read and write
46D1000
heap
page read and write
EC0000
heap
page read and write
3A3F000
stack
page read and write
D74000
heap
page read and write
41BF000
stack
page read and write
D74000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
37FE000
stack
page read and write
6B6000
unkown
page execute and write copy
3FA000
unkown
page execute and read and write
46D1000
heap
page read and write
2F3E000
stack
page read and write
46D1000
heap
page read and write
45BE000
stack
page read and write
46C0000
direct allocation
page read and write
46D1000
heap
page read and write
307E000
stack
page read and write
ECA000
heap
page read and write
46C0000
direct allocation
page read and write
C40000
heap
page read and write
28F0000
heap
page read and write
46D1000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
859000
unkown
page execute and read and write
343E000
stack
page read and write
D20000
heap
page read and write
D74000
heap
page read and write
46C0000
direct allocation
page read and write
D74000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
D74000
heap
page read and write
46C0000
direct allocation
page read and write
3B7F000
stack
page read and write
9EF000
stack
page read and write
2DBF000
stack
page read and write
37BF000
stack
page read and write
3CBF000
stack
page read and write
D74000
heap
page read and write
42FF000
stack
page read and write
D74000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46C0000
direct allocation
page read and write
D74000
heap
page read and write
1D29F000
stack
page read and write
67B000
unkown
page execute and read and write
40BE000
stack
page read and write
There are 221 hidden memdumps, click here to show them.