IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/?2
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php)2
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php3/
unknown
malicious
http://185.215.113.37LjG30S
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpw/
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpf
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php$
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpa-7368302a1ad4
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpu2
unknown
malicious
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
8AE000
heap
page read and write
malicious
FA1000
unkown
page execute and read and write
malicious
4BF0000
direct allocation
page read and write
malicious
402E000
stack
page read and write
4771000
heap
page read and write
724000
heap
page read and write
39AF000
stack
page read and write
724000
heap
page read and write
452E000
stack
page read and write
724000
heap
page read and write
1650000
unkown
page execute and read and write
FA0000
unkown
page read and write
4771000
heap
page read and write
724000
heap
page read and write
918000
heap
page read and write
6EE000
stack
page read and write
4771000
heap
page read and write
4770000
heap
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
39EE000
stack
page read and write
724000
heap
page read and write
4771000
heap
page read and write
F2E000
stack
page read and write
724000
heap
page read and write
4771000
heap
page read and write
870000
direct allocation
page read and write
724000
heap
page read and write
870000
direct allocation
page read and write
416E000
stack
page read and write
F90000
direct allocation
page execute and read and write
4771000
heap
page read and write
4771000
heap
page read and write
724000
heap
page read and write
4870000
trusted library allocation
page read and write
93C000
heap
page read and write
724000
heap
page read and write
44EF000
stack
page read and write
724000
heap
page read and write
1390000
unkown
page execute and read and write
870000
direct allocation
page read and write
870000
direct allocation
page read and write
4771000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
312E000
stack
page read and write
326E000
stack
page read and write
322F000
stack
page read and write
870000
direct allocation
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
55F000
stack
page read and write
45C000
stack
page read and write
923000
heap
page read and write
3EEE000
stack
page read and write
710000
heap
page read and write
1CC3F000
stack
page read and write
38AE000
stack
page read and write
4771000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
F70000
direct allocation
page execute and read and write
1CDBE000
stack
page read and write
724000
heap
page read and write
1470000
unkown
page execute and read and write
4771000
heap
page read and write
35EF000
stack
page read and write
724000
heap
page read and write
EAE000
stack
page read and write
F70000
direct allocation
page execute and read and write
870000
direct allocation
page read and write
4771000
heap
page read and write
870000
direct allocation
page read and write
34EE000
stack
page read and write
1D04D000
stack
page read and write
EEE000
stack
page read and write
F60000
heap
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
720000
heap
page read and write
870000
direct allocation
page read and write
4771000
heap
page read and write
1CF0D000
stack
page read and write
4771000
heap
page read and write
2E6F000
stack
page read and write
34AF000
stack
page read and write
F80000
direct allocation
page execute and read and write
4771000
heap
page read and write
1CEBF000
stack
page read and write
1051000
unkown
page execute and read and write
30EF000
stack
page read and write
336F000
stack
page read and write
890000
direct allocation
page read and write
43EE000
stack
page read and write
8A8000
heap
page read and write
F40000
direct allocation
page execute and read and write
43AF000
stack
page read and write
3DAD000
stack
page read and write
E6E000
stack
page read and write
724000
heap
page read and write
933000
heap
page read and write
149C000
unkown
page execute and read and write
4778000
heap
page read and write
86E000
stack
page read and write
4771000
heap
page read and write
F67000
heap
page read and write
3B2E000
stack
page read and write
4771000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
4771000
heap
page read and write
33AE000
stack
page read and write
1651000
unkown
page execute and write copy
1082000
unkown
page execute and read and write
870000
direct allocation
page read and write
42AE000
stack
page read and write
1CC7E000
stack
page read and write
4771000
heap
page read and write
680000
heap
page read and write
5A0000
heap
page read and write
870000
direct allocation
page read and write
FA0000
unkown
page readonly
4771000
heap
page read and write
4771000
heap
page read and write
4790000
heap
page read and write
4C2E000
stack
page read and write
555000
stack
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
376E000
stack
page read and write
14AA000
unkown
page execute and write copy
4771000
heap
page read and write
2FAF000
stack
page read and write
870000
direct allocation
page read and write
724000
heap
page read and write
E2E000
stack
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
1CAFF000
stack
page read and write
724000
heap
page read and write
386F000
stack
page read and write
724000
heap
page read and write
4771000
heap
page read and write
724000
heap
page read and write
466E000
stack
page read and write
724000
heap
page read and write
3C2F000
stack
page read and write
1D00E000
stack
page read and write
4771000
heap
page read and write
362E000
stack
page read and write
462F000
stack
page read and write
14AB000
unkown
page execute and write copy
870000
direct allocation
page read and write
890000
direct allocation
page read and write
724000
heap
page read and write
3C6E000
stack
page read and write
FA1000
unkown
page execute and write copy
F50000
direct allocation
page execute and read and write
8F4000
heap
page read and write
4771000
heap
page read and write
11FE000
unkown
page execute and read and write
724000
heap
page read and write
724000
heap
page read and write
3EAF000
stack
page read and write
82E000
stack
page read and write
14AA000
unkown
page execute and read and write
1D14C000
stack
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
2EAE000
stack
page read and write
3AEF000
stack
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
4780000
heap
page read and write
4771000
heap
page read and write
3FEF000
stack
page read and write
724000
heap
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
4771000
heap
page read and write
724000
heap
page read and write
4771000
heap
page read and write
870000
direct allocation
page read and write
4771000
heap
page read and write
724000
heap
page read and write
2B6F000
stack
page read and write
2D6F000
stack
page read and write
4771000
heap
page read and write
105D000
unkown
page execute and read and write
4771000
heap
page read and write
724000
heap
page read and write
412F000
stack
page read and write
372F000
stack
page read and write
1C9FE000
stack
page read and write
4771000
heap
page read and write
4D2F000
stack
page read and write
F6B000
heap
page read and write
906000
heap
page read and write
4771000
heap
page read and write
4BB0000
heap
page read and write
1493000
unkown
page execute and read and write
4771000
heap
page read and write
724000
heap
page read and write
4771000
heap
page read and write
724000
heap
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
426F000
stack
page read and write
4771000
heap
page read and write
724000
heap
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
724000
heap
page read and write
870000
direct allocation
page read and write
2FEE000
stack
page read and write
4771000
heap
page read and write
8A0000
heap
page read and write
4771000
heap
page read and write
4771000
heap
page read and write
1CD7E000
stack
page read and write
11EA000
unkown
page execute and read and write
4771000
heap
page read and write
3D6F000
stack
page read and write
4771000
heap
page read and write
F30000
direct allocation
page execute and read and write
1CB3E000
stack
page read and write
2C6F000
stack
page read and write
476F000
stack
page read and write
There are 220 hidden memdumps, click here to show them.