IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpD_
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpX_
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/3O
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php$
unknown
malicious
http://185.215.113.37g
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php8_Tv
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
FB1000
unkown
page execute and read and write
malicious
DE3000
heap
page read and write
malicious
5340000
direct allocation
page read and write
malicious
4EC1000
heap
page read and write
17BE000
stack
page read and write
4C7E000
stack
page read and write
F90000
direct allocation
page read and write
49BF000
stack
page read and write
3AFE000
stack
page read and write
54A0000
direct allocation
page execute and read and write
D14000
heap
page read and write
E43000
heap
page read and write
D14000
heap
page read and write
45FF000
stack
page read and write
F90000
direct allocation
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
4EBF000
stack
page read and write
14C9000
unkown
page execute and read and write
4EC1000
heap
page read and write
4D7F000
stack
page read and write
34BE000
stack
page read and write
54C0000
direct allocation
page execute and read and write
1D67F000
stack
page read and write
F90000
direct allocation
page read and write
18FE000
stack
page read and write
4EE0000
heap
page read and write
4EC1000
heap
page read and write
9EC000
stack
page read and write
D14000
heap
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
3137000
heap
page read and write
1D3EE000
stack
page read and write
F90000
direct allocation
page read and write
4EC1000
heap
page read and write
CFF000
stack
page read and write
3EBE000
stack
page read and write
387E000
stack
page read and write
17FE000
stack
page read and write
D14000
heap
page read and write
D14000
heap
page read and write
DCA000
heap
page read and write
E16000
heap
page read and write
423F000
stack
page read and write
547F000
stack
page read and write
4ED4000
heap
page read and write
397F000
stack
page read and write
4EC1000
heap
page read and write
D14000
heap
page read and write
F90000
direct allocation
page read and write
1D7FE000
stack
page read and write
373E000
stack
page read and write
4EC1000
heap
page read and write
3ABF000
stack
page read and write
35FE000
stack
page read and write
43BE000
stack
page read and write
477E000
stack
page read and write
4EC1000
heap
page read and write
D14000
heap
page read and write
4EC1000
heap
page read and write
D60000
heap
page read and write
D14000
heap
page read and write
3BFF000
stack
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
F90000
direct allocation
page read and write
4EC1000
heap
page read and write
DB0000
heap
page read and write
D14000
heap
page read and write
4EC1000
heap
page read and write
D14000
heap
page read and write
437F000
stack
page read and write
4EC1000
heap
page read and write
F90000
direct allocation
page read and write
4B3E000
stack
page read and write
4EC1000
heap
page read and write
3C3E000
stack
page read and write
1DA3C000
stack
page read and write
4EC1000
heap
page read and write
F90000
direct allocation
page read and write
3D7E000
stack
page read and write
54B0000
direct allocation
page execute and read and write
1D57E000
stack
page read and write
4ED6000
heap
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
D14000
heap
page read and write
4EC1000
heap
page read and write
5320000
heap
page read and write
4EC1000
heap
page read and write
D14000
heap
page read and write
D14000
heap
page read and write
44BF000
stack
page read and write
DC0000
heap
page read and write
F90000
direct allocation
page read and write
3E7F000
stack
page read and write
D14000
heap
page read and write
1092000
unkown
page execute and read and write
DDF000
heap
page read and write
D14000
heap
page read and write
4EC1000
heap
page read and write
1D6BE000
stack
page read and write
4EC1000
heap
page read and write
1DA54000
heap
page read and write
F90000
direct allocation
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
1D1AE000
stack
page read and write
383F000
stack
page read and write
4EC1000
heap
page read and write
D14000
heap
page read and write
14B2000
unkown
page execute and read and write
F90000
direct allocation
page read and write
3130000
heap
page read and write
3120000
direct allocation
page read and write
D14000
heap
page read and write
48BE000
stack
page read and write
5490000
direct allocation
page execute and read and write
1D42E000
stack
page read and write
FB0000
unkown
page readonly
14BC000
unkown
page execute and read and write
54D0000
direct allocation
page execute and read and write
D50000
heap
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
13AC000
unkown
page execute and read and write
D14000
heap
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
537E000
stack
page read and write
4EC1000
heap
page read and write
1D52F000
stack
page read and write
36FF000
stack
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
D14000
heap
page read and write
E2C000
heap
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
35BF000
stack
page read and write
427E000
stack
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
D14000
heap
page read and write
1D93D000
stack
page read and write
4AFF000
stack
page read and write
1D2AF000
stack
page read and write
463E000
stack
page read and write
1D8FE000
stack
page read and write
D14000
heap
page read and write
4EC1000
heap
page read and write
D14000
heap
page read and write
1676000
unkown
page execute and read and write
4EC1000
heap
page read and write
337E000
stack
page read and write
D14000
heap
page read and write
347F000
stack
page read and write
333F000
stack
page read and write
14C9000
unkown
page execute and write copy
14CA000
unkown
page execute and write copy
4EC1000
heap
page read and write
4C3F000
stack
page read and write
11FA000
unkown
page execute and read and write
120E000
unkown
page execute and read and write
F90000
direct allocation
page read and write
54B0000
direct allocation
page execute and read and write
FB1000
unkown
page execute and write copy
D14000
heap
page read and write
4EC1000
heap
page read and write
D14000
heap
page read and write
4EC1000
heap
page read and write
D14000
heap
page read and write
DCE000
heap
page read and write
D14000
heap
page read and write
148E000
unkown
page execute and read and write
F90000
direct allocation
page read and write
D14000
heap
page read and write
40FF000
stack
page read and write
4EC1000
heap
page read and write
311C000
stack
page read and write
44FE000
stack
page read and write
106D000
unkown
page execute and read and write
4DBE000
stack
page read and write
487F000
stack
page read and write
4EC1000
heap
page read and write
D14000
heap
page read and write
1D7BD000
stack
page read and write
D14000
heap
page read and write
D14000
heap
page read and write
323F000
stack
page read and write
5300000
trusted library allocation
page read and write
FB0000
unkown
page read and write
3FBF000
stack
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
1D2EE000
stack
page read and write
4EC0000
heap
page read and write
4EC1000
heap
page read and write
3FFE000
stack
page read and write
D14000
heap
page read and write
D14000
heap
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
3120000
direct allocation
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
1DA50000
heap
page read and write
39BE000
stack
page read and write
49FE000
stack
page read and write
413E000
stack
page read and write
D14000
heap
page read and write
4ED0000
heap
page read and write
4EC1000
heap
page read and write
D10000
heap
page read and write
16BD000
stack
page read and write
CF5000
stack
page read and write
4EC1000
heap
page read and write
473E000
stack
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
D14000
heap
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
D14000
heap
page read and write
F90000
direct allocation
page read and write
4EC1000
heap
page read and write
4EC1000
heap
page read and write
D14000
heap
page read and write
5480000
direct allocation
page execute and read and write
30DE000
stack
page read and write
1061000
unkown
page execute and read and write
1677000
unkown
page execute and write copy
3D3F000
stack
page read and write
There are 226 hidden memdumps, click here to show them.