IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php1
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpQ
unknown
malicious
http://185.215.113.37Tz
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/H
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpe
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpc
unknown
malicious
http://185.215.113.37/t1
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpy
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php8
unknown
malicious
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
FE1000
unkown
page execute and read and write
malicious
17EE000
heap
page read and write
malicious
5340000
direct allocation
page read and write
malicious
4EC1000
heap
page read and write
3EBE000
stack
page read and write
1831000
heap
page read and write
383F000
stack
page read and write
4EC1000
heap
page read and write
1D40F000
stack
page read and write
3250000
direct allocation
page read and write
3250000
direct allocation
page read and write
3250000
direct allocation
page read and write
4EC1000
heap
page read and write
D84000
heap
page read and write
1D54F000
stack
page read and write
4EC1000
heap
page read and write
FE1000
unkown
page execute and write copy
387E000
stack
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
54F0000
direct allocation
page execute and read and write
4EC1000
heap
page read and write
D84000
heap
page read and write
4EC1000
heap
page read and write
D84000
heap
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
4C3F000
stack
page read and write
3240000
heap
page read and write
1DAC0000
heap
page read and write
4B3E000
stack
page read and write
373E000
stack
page read and write
323E000
stack
page read and write
17CF000
stack
page read and write
4EC1000
heap
page read and write
3FFE000
stack
page read and write
D84000
heap
page read and write
3250000
direct allocation
page read and write
4C7E000
stack
page read and write
D35000
stack
page read and write
337F000
stack
page read and write
10C2000
unkown
page execute and read and write
D3F000
stack
page read and write
4D7F000
stack
page read and write
4EC1000
heap
page read and write
1D6DE000
stack
page read and write
5490000
direct allocation
page execute and read and write
45FE000
stack
page read and write
36FF000
stack
page read and write
4EC1000
heap
page read and write
487F000
stack
page read and write
4EC1000
heap
page read and write
54A0000
direct allocation
page execute and read and write
427E000
stack
page read and write
14CE000
unkown
page execute and read and write
D84000
heap
page read and write
4EC1000
heap
page read and write
3250000
direct allocation
page read and write
D90000
heap
page read and write
1091000
unkown
page execute and read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
54E0000
direct allocation
page execute and read and write
54D0000
direct allocation
page execute and read and write
3AFE000
stack
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
54C0000
direct allocation
page execute and read and write
14A1000
unkown
page execute and read and write
413E000
stack
page read and write
49BF000
stack
page read and write
3250000
direct allocation
page read and write
4EBF000
stack
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
3D7E000
stack
page read and write
3BFF000
stack
page read and write
D84000
heap
page read and write
3250000
direct allocation
page read and write
D84000
heap
page read and write
4EC1000
heap
page read and write
14DD000
unkown
page execute and read and write
30BE000
stack
page read and write
4EC1000
heap
page read and write
3250000
direct allocation
page read and write
1D2CF000
stack
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
167A000
unkown
page execute and read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
1DABE000
stack
page read and write
4EC1000
heap
page read and write
43BE000
stack
page read and write
D84000
heap
page read and write
C3C000
stack
page read and write
D84000
heap
page read and write
D84000
heap
page read and write
1DAC2000
heap
page read and write
1847000
heap
page read and write
3250000
direct allocation
page read and write
48BE000
stack
page read and write
167B000
unkown
page execute and write copy
1D81E000
stack
page read and write
397F000
stack
page read and write
FE0000
unkown
page read and write
D84000
heap
page read and write
D84000
heap
page read and write
D84000
heap
page read and write
3D3F000
stack
page read and write
4EC1000
heap
page read and write
34BE000
stack
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
31BF000
stack
page read and write
D84000
heap
page read and write
EDE000
stack
page read and write
4EC1000
heap
page read and write
4ED0000
heap
page read and write
3FBF000
stack
page read and write
1862000
heap
page read and write
3ABF000
stack
page read and write
17E0000
heap
page read and write
4EC8000
heap
page read and write
437F000
stack
page read and write
3270000
heap
page read and write
44FE000
stack
page read and write
1D30E000
stack
page read and write
4EC1000
heap
page read and write
D84000
heap
page read and write
423F000
stack
page read and write
35BF000
stack
page read and write
31FC000
stack
page read and write
4EC1000
heap
page read and write
D84000
heap
page read and write
4AFF000
stack
page read and write
4EC1000
heap
page read and write
D80000
heap
page read and write
D84000
heap
page read and write
123E000
unkown
page execute and read and write
49FE000
stack
page read and write
4FC0000
trusted library allocation
page read and write
347F000
stack
page read and write
1D91C000
stack
page read and write
4EC1000
heap
page read and write
54C0000
direct allocation
page execute and read and write
537E000
stack
page read and write
D84000
heap
page read and write
D84000
heap
page read and write
D84000
heap
page read and write
D84000
heap
page read and write
5320000
heap
page read and write
4EC1000
heap
page read and write
463E000
stack
page read and write
3C3E000
stack
page read and write
1D44E000
stack
page read and write
4EC1000
heap
page read and write
D84000
heap
page read and write
4EC1000
heap
page read and write
122A000
unkown
page execute and read and write
4EC1000
heap
page read and write
35FE000
stack
page read and write
16CE000
stack
page read and write
3250000
direct allocation
page read and write
13CE000
unkown
page execute and read and write
4EC1000
heap
page read and write
3250000
direct allocation
page read and write
D84000
heap
page read and write
4EC1000
heap
page read and write
327B000
heap
page read and write
4EC0000
heap
page read and write
1D68F000
stack
page read and write
4EC1000
heap
page read and write
109D000
unkown
page execute and read and write
1D7DD000
stack
page read and write
D84000
heap
page read and write
4EC1000
heap
page read and write
4DBE000
stack
page read and write
D84000
heap
page read and write
3E7F000
stack
page read and write
D84000
heap
page read and write
D84000
heap
page read and write
14DE000
unkown
page execute and write copy
4EC1000
heap
page read and write
44BF000
stack
page read and write
D84000
heap
page read and write
4EC1000
heap
page read and write
17EA000
heap
page read and write
D84000
heap
page read and write
D84000
heap
page read and write
3250000
direct allocation
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
D84000
heap
page read and write
5340000
direct allocation
page read and write
4EC1000
heap
page read and write
D84000
heap
page read and write
3250000
direct allocation
page read and write
4EC1000
heap
page read and write
5340000
direct allocation
page read and write
FDF000
stack
page read and write
D84000
heap
page read and write
4EC1000
heap
page read and write
E70000
heap
page read and write
1D9BE000
stack
page read and write
40FF000
stack
page read and write
1D1CE000
stack
page read and write
3250000
direct allocation
page read and write
D84000
heap
page read and write
D84000
heap
page read and write
14DD000
unkown
page execute and write copy
4EE0000
heap
page read and write
4EC1000
heap
page read and write
3277000
heap
page read and write
4EC1000
heap
page read and write
D84000
heap
page read and write
FE0000
unkown
page readonly
54B0000
direct allocation
page execute and read and write
4EC1000
heap
page read and write
39BE000
stack
page read and write
4EC1000
heap
page read and write
14C7000
unkown
page execute and read and write
1D58E000
stack
page read and write
547F000
stack
page read and write
473F000
stack
page read and write
4EC1000
heap
page read and write
477E000
stack
page read and write
D84000
heap
page read and write
There are 222 hidden memdumps, click here to show them.