IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpqM
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php%M
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37G
unknown
malicious
http://185.215.113.37/l
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
AF1000
unkown
page execute and read and write
malicious
5480000
direct allocation
page read and write
malicious
188E000
heap
page read and write
malicious
5630000
direct allocation
page execute and read and write
FE2000
unkown
page execute and read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
181E000
stack
page read and write
185E000
stack
page read and write
4FF1000
heap
page read and write
1694000
heap
page read and write
4FF1000
heap
page read and write
1870000
direct allocation
page read and write
55F0000
direct allocation
page execute and read and write
5480000
direct allocation
page read and write
3BEF000
stack
page read and write
422F000
stack
page read and write
1870000
direct allocation
page read and write
48AE000
stack
page read and write
35EE000
stack
page read and write
1870000
direct allocation
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
3FEE000
stack
page read and write
4FF1000
heap
page read and write
49AF000
stack
page read and write
1D54F000
stack
page read and write
1870000
direct allocation
page read and write
16DD000
stack
page read and write
1694000
heap
page read and write
412E000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
1D81D000
stack
page read and write
339E000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
5610000
direct allocation
page execute and read and write
1870000
direct allocation
page read and write
44AF000
stack
page read and write
39AE000
stack
page read and write
1694000
heap
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
5000000
heap
page read and write
4C6E000
stack
page read and write
4FF1000
heap
page read and write
1694000
heap
page read and write
382F000
stack
page read and write
3C2E000
stack
page read and write
3D6E000
stack
page read and write
55BF000
stack
page read and write
1694000
heap
page read and write
33AB000
heap
page read and write
486F000
stack
page read and write
1694000
heap
page read and write
4FF1000
heap
page read and write
1694000
heap
page read and write
1694000
heap
page read and write
35AF000
stack
page read and write
1694000
heap
page read and write
4FF1000
heap
page read and write
1D30E000
stack
page read and write
1535000
stack
page read and write
1870000
direct allocation
page read and write
FE3000
unkown
page execute and write copy
153E000
stack
page read and write
1694000
heap
page read and write
4FF1000
heap
page read and write
1694000
heap
page read and write
1694000
heap
page read and write
331F000
stack
page read and write
1924000
heap
page read and write
4FF1000
heap
page read and write
BD2000
unkown
page execute and read and write
1694000
heap
page read and write
1860000
heap
page read and write
4EAF000
stack
page read and write
372E000
stack
page read and write
1870000
direct allocation
page read and write
1DA5D000
stack
page read and write
1694000
heap
page read and write
335B000
stack
page read and write
D3A000
unkown
page execute and read and write
4FF1000
heap
page read and write
3AEE000
stack
page read and write
1D44E000
stack
page read and write
1D95D000
stack
page read and write
1694000
heap
page read and write
4FF1000
heap
page read and write
3EAE000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
1694000
heap
page read and write
1640000
heap
page read and write
4FF1000
heap
page read and write
426E000
stack
page read and write
17DE000
stack
page read and write
4FF1000
heap
page read and write
50F0000
trusted library allocation
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
BAD000
unkown
page execute and read and write
D4E000
unkown
page execute and read and write
EC9000
unkown
page execute and read and write
1694000
heap
page read and write
18E9000
heap
page read and write
4AEF000
stack
page read and write
1870000
direct allocation
page read and write
4FF1000
heap
page read and write
1694000
heap
page read and write
117A000
unkown
page execute and write copy
4FF0000
heap
page read and write
462E000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
1D58E000
stack
page read and write
55D0000
direct allocation
page execute and read and write
5620000
direct allocation
page execute and read and write
36EF000
stack
page read and write
4FF1000
heap
page read and write
1694000
heap
page read and write
4EEE000
stack
page read and write
BA1000
unkown
page execute and read and write
1690000
heap
page read and write
1870000
direct allocation
page read and write
476E000
stack
page read and write
5600000
direct allocation
page execute and read and write
1870000
direct allocation
page read and write
33A0000
heap
page read and write
4FF1000
heap
page read and write
FAA000
unkown
page execute and read and write
1694000
heap
page read and write
54BE000
stack
page read and write
4D6F000
stack
page read and write
4FF1000
heap
page read and write
386E000
stack
page read and write
1D91D000
stack
page read and write
1902000
heap
page read and write
3FAF000
stack
page read and write
AF1000
unkown
page execute and write copy
1922000
heap
page read and write
FD4000
unkown
page execute and read and write
4FF1000
heap
page read and write
1694000
heap
page read and write
3D2F000
stack
page read and write
4FEF000
stack
page read and write
1694000
heap
page read and write
4FF1000
heap
page read and write
4B2E000
stack
page read and write
1870000
direct allocation
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
1D68F000
stack
page read and write
4DAE000
stack
page read and write
1694000
heap
page read and write
1D40F000
stack
page read and write
436F000
stack
page read and write
1880000
heap
page read and write
1870000
direct allocation
page read and write
1694000
heap
page read and write
4FF1000
heap
page read and write
1D6DE000
stack
page read and write
3E6F000
stack
page read and write
4C2F000
stack
page read and write
4FF1000
heap
page read and write
1694000
heap
page read and write
43AE000
stack
page read and write
1694000
heap
page read and write
FE2000
unkown
page execute and write copy
4FF1000
heap
page read and write
45EF000
stack
page read and write
143C000
stack
page read and write
40EF000
stack
page read and write
44EE000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
4FF4000
heap
page read and write
1915000
heap
page read and write
1694000
heap
page read and write
FCA000
unkown
page execute and read and write
33A7000
heap
page read and write
4FF1000
heap
page read and write
18F4000
heap
page read and write
1D7DF000
stack
page read and write
1560000
heap
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
1694000
heap
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
5010000
heap
page read and write
4FF1000
heap
page read and write
49EE000
stack
page read and write
55E0000
direct allocation
page execute and read and write
3AAF000
stack
page read and write
1694000
heap
page read and write
AF0000
unkown
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
1694000
heap
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
1694000
heap
page read and write
18D2000
heap
page read and write
4FF1000
heap
page read and write
1870000
direct allocation
page read and write
34AF000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
1694000
heap
page read and write
5460000
heap
page read and write
1694000
heap
page read and write
5600000
direct allocation
page execute and read and write
1A7E000
stack
page read and write
AF0000
unkown
page readonly
1179000
unkown
page execute and read and write
1694000
heap
page read and write
1694000
heap
page read and write
4FF1000
heap
page read and write
396F000
stack
page read and write
1694000
heap
page read and write
1694000
heap
page read and write
4FF1000
heap
page read and write
1870000
direct allocation
page read and write
188A000
heap
page read and write
472E000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
5480000
direct allocation
page read and write
There are 225 hidden memdumps, click here to show them.