IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/a
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php?
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phph
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpG
unknown
malicious
http://185.215.113.37so
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
A7E000
heap
page read and write
malicious
EB1000
unkown
page execute and read and write
malicious
4D40000
direct allocation
page read and write
malicious
8C4000
heap
page read and write
39AF000
stack
page read and write
8C4000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
312E000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
48C5000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
1375000
unkown
page execute and read and write
13A2000
unkown
page execute and read and write
426F000
stack
page read and write
376E000
stack
page read and write
48B1000
heap
page read and write
416E000
stack
page read and write
466E000
stack
page read and write
735000
stack
page read and write
2BD0000
direct allocation
page read and write
48AF000
stack
page read and write
8C4000
heap
page read and write
44EF000
stack
page read and write
48B1000
heap
page read and write
336F000
stack
page read and write
39EE000
stack
page read and write
2BC0000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
8C4000
heap
page read and write
3AEF000
stack
page read and write
13B2000
unkown
page execute and write copy
48B1000
heap
page read and write
2CEF000
stack
page read and write
48B1000
heap
page read and write
13B1000
unkown
page execute and write copy
EB1000
unkown
page execute and write copy
1CE0F000
stack
page read and write
48B1000
heap
page read and write
2EEF000
stack
page read and write
8C4000
heap
page read and write
3EAF000
stack
page read and write
2BD0000
direct allocation
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
4D40000
direct allocation
page read and write
48B1000
heap
page read and write
ADA000
heap
page read and write
A7A000
heap
page read and write
3C2F000
stack
page read and write
A0E000
stack
page read and write
F6D000
unkown
page execute and read and write
2DEF000
stack
page read and write
3EEE000
stack
page read and write
1D09F000
stack
page read and write
476F000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
1D1DD000
stack
page read and write
48B1000
heap
page read and write
9CF000
stack
page read and write
3B2E000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
1D45C000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
322F000
stack
page read and write
48C0000
heap
page read and write
1CCCF000
stack
page read and write
48B1000
heap
page read and write
362E000
stack
page read and write
1CE4E000
stack
page read and write
2B3E000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
8C4000
heap
page read and write
48B1000
heap
page read and write
38AE000
stack
page read and write
A70000
heap
page read and write
8BD000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
4E90000
direct allocation
page execute and read and write
48B1000
heap
page read and write
EB0000
unkown
page read and write
4EA0000
direct allocation
page execute and read and write
48B1000
heap
page read and write
EAB000
stack
page read and write
2BD0000
direct allocation
page read and write
AC2000
heap
page read and write
10FA000
unkown
page execute and read and write
48B1000
heap
page read and write
F61000
unkown
page execute and read and write
48B1000
heap
page read and write
48B0000
heap
page read and write
48B1000
heap
page read and write
35EF000
stack
page read and write
48B1000
heap
page read and write
386F000
stack
page read and write
1550000
unkown
page execute and read and write
8C4000
heap
page read and write
A6E000
stack
page read and write
AE3000
heap
page read and write
48B1000
heap
page read and write
8C4000
heap
page read and write
1D0DD000
stack
page read and write
8C4000
heap
page read and write
2FEF000
stack
page read and write
13B1000
unkown
page execute and read and write
8C4000
heap
page read and write
110E000
unkown
page execute and read and write
1D35D000
stack
page read and write
48B1000
heap
page read and write
8C4000
heap
page read and write
1D470000
heap
page read and write
48B1000
heap
page read and write
1CF4E000
stack
page read and write
1CF9E000
stack
page read and write
452E000
stack
page read and write
2BD0000
direct allocation
page read and write
48B1000
heap
page read and write
AC8000
heap
page read and write
8C4000
heap
page read and write
8C4000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
8C4000
heap
page read and write
372F000
stack
page read and write
8C4000
heap
page read and write
326E000
stack
page read and write
8C4000
heap
page read and write
2BD0000
direct allocation
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
2BE0000
heap
page read and write
4CF0000
trusted library allocation
page read and write
8C4000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
2BD0000
direct allocation
page read and write
3DAE000
stack
page read and write
850000
heap
page read and write
8C4000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
4D20000
heap
page read and write
1295000
unkown
page execute and read and write
4EF0000
direct allocation
page execute and read and write
8C4000
heap
page read and write
F92000
unkown
page execute and read and write
1CBCE000
stack
page read and write
42AE000
stack
page read and write
4ED0000
direct allocation
page execute and read and write
4E7F000
stack
page read and write
1CD0E000
stack
page read and write
8C4000
heap
page read and write
2BD0000
direct allocation
page read and write
8C4000
heap
page read and write
2BD0000
direct allocation
page read and write
1D21D000
stack
page read and write
2BD0000
direct allocation
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
8C4000
heap
page read and write
48B1000
heap
page read and write
402E000
stack
page read and write
48B1000
heap
page read and write
30EF000
stack
page read and write
34EE000
stack
page read and write
8C0000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
63C000
stack
page read and write
2BD0000
direct allocation
page read and write
48B1000
heap
page read and write
1398000
unkown
page execute and read and write
2BD0000
direct allocation
page read and write
8C4000
heap
page read and write
48B1000
heap
page read and write
8C4000
heap
page read and write
73F000
stack
page read and write
4D7E000
stack
page read and write
2BD0000
direct allocation
page read and write
2BD0000
direct allocation
page read and write
47AE000
stack
page read and write
8C4000
heap
page read and write
EB0000
unkown
page readonly
48B1000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
8C4000
heap
page read and write
8C4000
heap
page read and write
8C4000
heap
page read and write
3C6E000
stack
page read and write
48B1000
heap
page read and write
8C4000
heap
page read and write
8C4000
heap
page read and write
1D474000
heap
page read and write
48B1000
heap
page read and write
1D31F000
stack
page read and write
8C4000
heap
page read and write
34AF000
stack
page read and write
412F000
stack
page read and write
462F000
stack
page read and write
8C4000
heap
page read and write
48B1000
heap
page read and write
1551000
unkown
page execute and write copy
2BE7000
heap
page read and write
8C4000
heap
page read and write
33AE000
stack
page read and write
AF4000
heap
page read and write
2B7E000
stack
page read and write
770000
heap
page read and write
48D0000
heap
page read and write
2BD0000
direct allocation
page read and write
48B1000
heap
page read and write
43AF000
stack
page read and write
C6E000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
8C4000
heap
page read and write
43EE000
stack
page read and write
2BBE000
stack
page read and write
8C4000
heap
page read and write
8C4000
heap
page read and write
48B1000
heap
page read and write
8C4000
heap
page read and write
4D40000
direct allocation
page read and write
48B1000
heap
page read and write
3FEF000
stack
page read and write
3D6F000
stack
page read and write
There are 225 hidden memdumps, click here to show them.