IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37=
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php=
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php?
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php6
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phph
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
341000
unkown
page execute and read and write
malicious
4DD0000
direct allocation
page read and write
malicious
F9E000
heap
page read and write
malicious
4F50000
direct allocation
page execute and read and write
B94000
heap
page read and write
B94000
heap
page read and write
45AE000
stack
page read and write
B94000
heap
page read and write
2B5B000
heap
page read and write
340000
unkown
page read and write
82F000
unkown
page execute and write copy
4941000
heap
page read and write
2AFF000
stack
page read and write
4DD0000
direct allocation
page read and write
456F000
stack
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
9C4000
unkown
page execute and write copy
4941000
heap
page read and write
4F50000
direct allocation
page execute and read and write
4941000
heap
page read and write
2B57000
heap
page read and write
4F30000
direct allocation
page execute and read and write
4930000
direct allocation
page read and write
4941000
heap
page read and write
4E0E000
stack
page read and write
365F000
stack
page read and write
817000
unkown
page execute and read and write
B94000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
BD0000
heap
page read and write
4941000
heap
page read and write
B94000
heap
page read and write
2C5F000
stack
page read and write
4941000
heap
page read and write
351F000
stack
page read and write
4941000
heap
page read and write
4930000
direct allocation
page read and write
B94000
heap
page read and write
4941000
heap
page read and write
3B9E000
stack
page read and write
446E000
stack
page read and write
4F40000
direct allocation
page execute and read and write
B94000
heap
page read and write
4930000
direct allocation
page read and write
B94000
heap
page read and write
FF7000
heap
page read and write
B94000
heap
page read and write
1D3AC000
stack
page read and write
4950000
heap
page read and write
4941000
heap
page read and write
355E000
stack
page read and write
830000
unkown
page execute and write copy
4941000
heap
page read and write
38DF000
stack
page read and write
B94000
heap
page read and write
F3E000
stack
page read and write
B94000
heap
page read and write
125E000
stack
page read and write
432E000
stack
page read and write
4930000
direct allocation
page read and write
1D16E000
stack
page read and write
EFE000
stack
page read and write
4930000
direct allocation
page read and write
4930000
direct allocation
page read and write
319E000
stack
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
1D520000
heap
page read and write
1D51E000
stack
page read and write
3FD000
unkown
page execute and read and write
7F7000
unkown
page execute and read and write
301F000
stack
page read and write
B94000
heap
page read and write
305E000
stack
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
47EF000
stack
page read and write
4930000
direct allocation
page read and write
4941000
heap
page read and write
1D41E000
stack
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
2B50000
heap
page read and write
4941000
heap
page read and write
4960000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
4940000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
59E000
unkown
page execute and read and write
341000
unkown
page execute and write copy
42E0000
heap
page read and write
340000
unkown
page readonly
4941000
heap
page read and write
4F60000
direct allocation
page execute and read and write
1D524000
heap
page read and write
315F000
stack
page read and write
1CD5F000
stack
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
3DDF000
stack
page read and write
32DE000
stack
page read and write
721000
unkown
page execute and read and write
EF5000
stack
page read and write
2F1E000
stack
page read and write
B94000
heap
page read and write
329F000
stack
page read and write
4A40000
trusted library allocation
page read and write
3F1000
unkown
page execute and read and write
2DDE000
stack
page read and write
379F000
stack
page read and write
B94000
heap
page read and write
391E000
stack
page read and write
4941000
heap
page read and write
1CD9E000
stack
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
820000
unkown
page execute and read and write
3A1F000
stack
page read and write
422000
unkown
page execute and read and write
4941000
heap
page read and write
4941000
heap
page read and write
2B4E000
stack
page read and write
B94000
heap
page read and write
3F1F000
stack
page read and write
42DF000
stack
page read and write
4F0F000
stack
page read and write
4930000
direct allocation
page read and write
B94000
heap
page read and write
58A000
unkown
page execute and read and write
2C9B000
stack
page read and write
4930000
direct allocation
page read and write
F98000
heap
page read and write
419F000
stack
page read and write
4941000
heap
page read and write
1011000
heap
page read and write
B94000
heap
page read and write
4941000
heap
page read and write
B94000
heap
page read and write
1CEDE000
stack
page read and write
B94000
heap
page read and write
2EDF000
stack
page read and write
4941000
heap
page read and write
1D11F000
stack
page read and write
3E1E000
stack
page read and write
4941000
heap
page read and write
B94000
heap
page read and write
4941000
heap
page read and write
F90000
heap
page read and write
B94000
heap
page read and write
FE3000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
3B5F000
stack
page read and write
2D9F000
stack
page read and write
4F20000
direct allocation
page execute and read and write
4DD0000
direct allocation
page read and write
9C3000
unkown
page execute and read and write
4941000
heap
page read and write
3CDE000
stack
page read and write
4DB0000
heap
page read and write
1D26E000
stack
page read and write
1CE9F000
stack
page read and write
341E000
stack
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
33DF000
stack
page read and write
409E000
stack
page read and write
4941000
heap
page read and write
B90000
heap
page read and write
4941000
heap
page read and write
B94000
heap
page read and write
3A5E000
stack
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
1D01E000
stack
page read and write
B94000
heap
page read and write
46EE000
stack
page read and write
3C9F000
stack
page read and write
BC0000
heap
page read and write
B94000
heap
page read and write
4941000
heap
page read and write
4930000
direct allocation
page read and write
4941000
heap
page read and write
405F000
stack
page read and write
B94000
heap
page read and write
41DE000
stack
page read and write
4941000
heap
page read and write
B94000
heap
page read and write
4F80000
direct allocation
page execute and read and write
482E000
stack
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
B94000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
82F000
unkown
page execute and read and write
F8E000
stack
page read and write
4941000
heap
page read and write
B5C000
stack
page read and write
442F000
stack
page read and write
3F5E000
stack
page read and write
4930000
direct allocation
page read and write
B94000
heap
page read and write
4941000
heap
page read and write
B94000
heap
page read and write
1CFDF000
stack
page read and write
B94000
heap
page read and write
B94000
heap
page read and write
4941000
heap
page read and write
4941000
heap
page read and write
1D2AE000
stack
page read and write
4930000
direct allocation
page read and write
4930000
direct allocation
page read and write
4941000
heap
page read and write
1CC5E000
stack
page read and write
4941000
heap
page read and write
4957000
heap
page read and write
369E000
stack
page read and write
4941000
heap
page read and write
492F000
stack
page read and write
46AF000
stack
page read and write
4F70000
direct allocation
page execute and read and write
4930000
direct allocation
page read and write
37DE000
stack
page read and write
There are 222 hidden memdumps, click here to show them.