IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpLMEM
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpO
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/rn
unknown
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpS
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpkn
unknown
malicious
http://185.215.113.372
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpg
unknown
malicious
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4BB0000
direct allocation
page read and write
malicious
EEE000
heap
page read and write
malicious
121000
unkown
page execute and read and write
malicious
DE4000
heap
page read and write
2FAE000
stack
page read and write
44EE000
stack
page read and write
336E000
stack
page read and write
4731000
heap
page read and write
4731000
heap
page read and write
DE0000
heap
page read and write
4731000
heap
page read and write
36EF000
stack
page read and write
4731000
heap
page read and write
40EF000
stack
page read and write
4731000
heap
page read and write
DE4000
heap
page read and write
120000
unkown
page read and write
DD0000
direct allocation
page read and write
4731000
heap
page read and write
4731000
heap
page read and write
4731000
heap
page read and write
DD0000
direct allocation
page read and write
DE4000
heap
page read and write
4731000
heap
page read and write
4731000
heap
page read and write
13DE000
stack
page read and write
DE4000
heap
page read and write
35EE000
stack
page read and write
1D1EE000
stack
page read and write
DE4000
heap
page read and write
10DE000
stack
page read and write
202000
unkown
page execute and read and write
DE4000
heap
page read and write
4731000
heap
page read and write
4731000
heap
page read and write
2F6F000
stack
page read and write
EC0000
direct allocation
page read and write
4731000
heap
page read and write
43AE000
stack
page read and write
4D00000
direct allocation
page execute and read and write
4731000
heap
page read and write
4731000
heap
page read and write
2D2E000
stack
page read and write
4731000
heap
page read and write
DD0000
direct allocation
page read and write
3FAF000
stack
page read and write
1CB3E000
stack
page read and write
DE4000
heap
page read and write
35AF000
stack
page read and write
4750000
heap
page read and write
DD0000
direct allocation
page read and write
4731000
heap
page read and write
3D2F000
stack
page read and write
332F000
stack
page read and write
4731000
heap
page read and write
4731000
heap
page read and write
1D04D000
stack
page read and write
4731000
heap
page read and write
629000
unkown
page execute and write copy
4731000
heap
page read and write
4731000
heap
page read and write
DE4000
heap
page read and write
F4A000
heap
page read and write
1CDCE000
stack
page read and write
346F000
stack
page read and write
DE4000
heap
page read and write
4730000
heap
page read and write
DE4000
heap
page read and write
4731000
heap
page read and write
DD0000
direct allocation
page read and write
37E000
unkown
page execute and read and write
396F000
stack
page read and write
4731000
heap
page read and write
386E000
stack
page read and write
382F000
stack
page read and write
4731000
heap
page read and write
4731000
heap
page read and write
31EF000
stack
page read and write
30EE000
stack
page read and write
DE4000
heap
page read and write
4731000
heap
page read and write
3AEE000
stack
page read and write
3E6F000
stack
page read and write
1D2EE000
stack
page read and write
2A7F000
stack
page read and write
62A000
unkown
page execute and write copy
2AA0000
heap
page read and write
4731000
heap
page read and write
4731000
heap
page read and write
DE4000
heap
page read and write
F54000
heap
page read and write
EC0000
direct allocation
page read and write
4CF0000
direct allocation
page execute and read and write
DD0000
direct allocation
page read and write
DE4000
heap
page read and write
4731000
heap
page read and write
DD0000
direct allocation
page read and write
4731000
heap
page read and write
4731000
heap
page read and write
1CF0D000
stack
page read and write
1CC7E000
stack
page read and write
4731000
heap
page read and write
3BEF000
stack
page read and write
4CF0000
direct allocation
page execute and read and write
DE4000
heap
page read and write
4731000
heap
page read and write
1D2F0000
heap
page read and write
4731000
heap
page read and write
DE4000
heap
page read and write
4CEF000
stack
page read and write
4BEE000
stack
page read and write
DE4000
heap
page read and write
4D10000
direct allocation
page execute and read and write
462E000
stack
page read and write
EE0000
heap
page read and write
D9D000
stack
page read and write
34AE000
stack
page read and write
4740000
heap
page read and write
DE4000
heap
page read and write
1DD000
unkown
page execute and read and write
2A90000
direct allocation
page execute and read and write
1C9FE000
stack
page read and write
322E000
stack
page read and write
4731000
heap
page read and write
F68000
heap
page read and write
2BAF000
stack
page read and write
DE4000
heap
page read and write
4731000
heap
page read and write
2A80000
direct allocation
page execute and read and write
7D1000
unkown
page execute and write copy
3FEE000
stack
page read and write
426E000
stack
page read and write
4731000
heap
page read and write
372E000
stack
page read and write
4731000
heap
page read and write
4731000
heap
page read and write
DE4000
heap
page read and write
DE4000
heap
page read and write
DD0000
direct allocation
page read and write
DE4000
heap
page read and write
DD0000
direct allocation
page read and write
4731000
heap
page read and write
1D14D000
stack
page read and write
4734000
heap
page read and write
F74000
heap
page read and write
2AA7000
heap
page read and write
F2E000
heap
page read and write
4830000
trusted library allocation
page read and write
DD0000
direct allocation
page read and write
121000
unkown
page execute and write copy
61A000
unkown
page execute and read and write
2CEF000
stack
page read and write
4D20000
direct allocation
page execute and read and write
DE4000
heap
page read and write
DE4000
heap
page read and write
4B70000
heap
page read and write
DE4000
heap
page read and write
7D0000
unkown
page execute and read and write
2BEE000
stack
page read and write
1CECF000
stack
page read and write
4731000
heap
page read and write
30AF000
stack
page read and write
1D00E000
stack
page read and write
4731000
heap
page read and write
2E6E000
stack
page read and write
4731000
heap
page read and write
DE4000
heap
page read and write
3D6E000
stack
page read and write
4731000
heap
page read and write
4731000
heap
page read and write
613000
unkown
page execute and read and write
F33000
heap
page read and write
DE4000
heap
page read and write
DE4000
heap
page read and write
C50000
heap
page read and write
1CAFF000
stack
page read and write
E2E000
stack
page read and write
4731000
heap
page read and write
9FE000
stack
page read and write
DC0000
heap
page read and write
DE4000
heap
page read and write
412E000
stack
page read and write
4731000
heap
page read and write
4731000
heap
page read and write
D30000
heap
page read and write
4731000
heap
page read and write
DE4000
heap
page read and write
3EAE000
stack
page read and write
ED0000
direct allocation
page execute and read and write
4731000
heap
page read and write
DD0000
direct allocation
page read and write
1CD7F000
stack
page read and write
3C2E000
stack
page read and write
4731000
heap
page read and write
4731000
heap
page read and write
DE4000
heap
page read and write
DD0000
direct allocation
page read and write
8FC000
stack
page read and write
45EF000
stack
page read and write
4731000
heap
page read and write
2E2F000
stack
page read and write
36A000
unkown
page execute and read and write
4731000
heap
page read and write
39AE000
stack
page read and write
DD0000
direct allocation
page read and write
4731000
heap
page read and write
1D1000
unkown
page execute and read and write
507000
unkown
page execute and read and write
9F5000
stack
page read and write
4731000
heap
page read and write
4731000
heap
page read and write
DD0000
direct allocation
page read and write
2AAB000
heap
page read and write
4731000
heap
page read and write
4731000
heap
page read and write
472F000
stack
page read and write
436F000
stack
page read and write
422F000
stack
page read and write
1CC3F000
stack
page read and write
DE4000
heap
page read and write
DE4000
heap
page read and write
DE4000
heap
page read and write
E6E000
stack
page read and write
DE4000
heap
page read and write
44AF000
stack
page read and write
DE4000
heap
page read and write
4731000
heap
page read and write
5EB000
unkown
page execute and read and write
4731000
heap
page read and write
629000
unkown
page execute and read and write
4731000
heap
page read and write
EAB000
stack
page read and write
3AAF000
stack
page read and write
DE4000
heap
page read and write
DE4000
heap
page read and write
EEA000
heap
page read and write
120000
unkown
page readonly
There are 227 hidden memdumps, click here to show them.