IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/-zx3
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37o
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpWCG3
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php;Cc3
unknown
malicious
http://185.215.113.37/z%
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
138E000
heap
page read and write
malicious
5010000
direct allocation
page read and write
malicious
681000
unkown
page execute and read and write
malicious
13F5000
heap
page read and write
4B81000
heap
page read and write
457E000
stack
page read and write
D9C000
stack
page read and write
3A3E000
stack
page read and write
4B81000
heap
page read and write
1D78E000
stack
page read and write
D0A000
unkown
page execute and read and write
1CE9E000
stack
page read and write
B34000
unkown
page execute and read and write
2EA0000
direct allocation
page read and write
11D4000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
4FF0000
heap
page read and write
2EA0000
direct allocation
page read and write
39FF000
stack
page read and write
680000
unkown
page read and write
2EA0000
direct allocation
page read and write
2EA0000
direct allocation
page read and write
367E000
stack
page read and write
33BF000
stack
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
2EA0000
direct allocation
page read and write
1CF9F000
stack
page read and write
4B81000
heap
page read and write
417F000
stack
page read and write
11D4000
heap
page read and write
4B81000
heap
page read and write
4B88000
heap
page read and write
11D4000
heap
page read and write
4B81000
heap
page read and write
2EBB000
heap
page read and write
403F000
stack
page read and write
11D4000
heap
page read and write
10FE000
stack
page read and write
11D4000
heap
page read and write
2EA0000
direct allocation
page read and write
4B81000
heap
page read and write
443E000
stack
page read and write
2EA0000
direct allocation
page read and write
11D4000
heap
page read and write
4B81000
heap
page read and write
DF0000
heap
page read and write
4A3F000
stack
page read and write
11D4000
heap
page read and write
4B81000
heap
page read and write
1D790000
heap
page read and write
2EA0000
direct allocation
page read and write
4B81000
heap
page read and write
3B7E000
stack
page read and write
4B81000
heap
page read and write
3F3E000
stack
page read and write
4B81000
heap
page read and write
11D4000
heap
page read and write
5190000
direct allocation
page execute and read and write
11D4000
heap
page read and write
5170000
direct allocation
page execute and read and write
4B80000
heap
page read and write
11D4000
heap
page read and write
4B81000
heap
page read and write
134E000
stack
page read and write
2D9E000
stack
page read and write
2EB0000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
11D4000
heap
page read and write
2EA0000
direct allocation
page read and write
3DFE000
stack
page read and write
4B81000
heap
page read and write
353E000
stack
page read and write
B5B000
unkown
page execute and read and write
762000
unkown
page execute and read and write
317E000
stack
page read and write
5010000
direct allocation
page read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
43FF000
stack
page read and write
38FE000
stack
page read and write
4B81000
heap
page read and write
11E0000
heap
page read and write
B75000
unkown
page execute and write copy
46BE000
stack
page read and write
453F000
stack
page read and write
5010000
direct allocation
page read and write
4B81000
heap
page read and write
3B3F000
stack
page read and write
42BE000
stack
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
303E000
stack
page read and write
4A7E000
stack
page read and write
4B81000
heap
page read and write
11D4000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
2EA0000
direct allocation
page read and write
3C7F000
stack
page read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
4B90000
heap
page read and write
1D25E000
stack
page read and write
4B81000
heap
page read and write
2FFF000
stack
page read and write
11D4000
heap
page read and write
5160000
direct allocation
page execute and read and write
514F000
stack
page read and write
11D4000
heap
page read and write
37BE000
stack
page read and write
A58000
unkown
page execute and read and write
504E000
stack
page read and write
4B81000
heap
page read and write
1D4ED000
stack
page read and write
13E8000
heap
page read and write
1370000
heap
page read and write
363F000
stack
page read and write
467F000
stack
page read and write
48FF000
stack
page read and write
B74000
unkown
page execute and read and write
3DBF000
stack
page read and write
731000
unkown
page execute and read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
4B81000
heap
page read and write
2EA0000
direct allocation
page read and write
377F000
stack
page read and write
124E000
stack
page read and write
1380000
heap
page read and write
5190000
direct allocation
page execute and read and write
2EFB000
stack
page read and write
41BE000
stack
page read and write
11D4000
heap
page read and write
1D35F000
stack
page read and write
4B81000
heap
page read and write
11D4000
heap
page read and write
1D4AC000
stack
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
407E000
stack
page read and write
2EB7000
heap
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
2EA0000
direct allocation
page read and write
11D4000
heap
page read and write
680000
unkown
page readonly
4B7F000
stack
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
14BE000
stack
page read and write
4B81000
heap
page read and write
2EA0000
direct allocation
page read and write
51B0000
direct allocation
page execute and read and write
1D0DF000
stack
page read and write
4B81000
heap
page read and write
681000
unkown
page execute and write copy
313F000
stack
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
8CA000
unkown
page execute and read and write
42FE000
stack
page read and write
1D21F000
stack
page read and write
4B81000
heap
page read and write
1D3AD000
stack
page read and write
4B81000
heap
page read and write
4FC0000
trusted library allocation
page read and write
51A0000
direct allocation
page execute and read and write
11D4000
heap
page read and write
2EA0000
direct allocation
page read and write
4B81000
heap
page read and write
11D4000
heap
page read and write
1D68E000
stack
page read and write
11D4000
heap
page read and write
327F000
stack
page read and write
4B81000
heap
page read and write
11D4000
heap
page read and write
4B81000
heap
page read and write
73D000
unkown
page execute and read and write
493E000
stack
page read and write
4B81000
heap
page read and write
47BF000
stack
page read and write
1403000
heap
page read and write
4B81000
heap
page read and write
B74000
unkown
page execute and write copy
13CE000
heap
page read and write
5180000
direct allocation
page execute and read and write
11D0000
heap
page read and write
8DE000
unkown
page execute and read and write
47FE000
stack
page read and write
34FF000
stack
page read and write
13D2000
heap
page read and write
138A000
heap
page read and write
4B81000
heap
page read and write
B65000
unkown
page execute and read and write
4B81000
heap
page read and write
38BF000
stack
page read and write
3EFF000
stack
page read and write
4B81000
heap
page read and write
33FE000
stack
page read and write
1CFDE000
stack
page read and write
4B81000
heap
page read and write
1D11E000
stack
page read and write
3CBE000
stack
page read and write
11D4000
heap
page read and write
4B81000
heap
page read and write
11D4000
heap
page read and write
D0B000
unkown
page execute and write copy
15BF000
stack
page read and write
32BE000
stack
page read and write
4B81000
heap
page read and write
11D4000
heap
page read and write
4B81000
heap
page read and write
1D5EE000
stack
page read and write
51C0000
direct allocation
page execute and read and write
4BA0000
heap
page read and write
4B81000
heap
page read and write
10F5000
stack
page read and write
11D4000
heap
page read and write
2E9F000
stack
page read and write
4B81000
heap
page read and write
4B81000
heap
page read and write
There are 222 hidden memdumps, click here to show them.