IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/e2b1563c6670f193.phpM
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpL
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpl
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpr
unknown
malicious
http://185.215.113.37V
unknown
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpy
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpA
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpe
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php)
unknown
malicious
There are 3 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5740000
direct allocation
page read and write
malicious
194E000
heap
page read and write
malicious
E21000
unkown
page execute and read and write
malicious
1845000
heap
page read and write
3EDE000
stack
page read and write
52B1000
heap
page read and write
F02000
unkown
page execute and read and write
58C0000
direct allocation
page execute and read and write
52B1000
heap
page read and write
425F000
stack
page read and write
52A0000
direct allocation
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
ED1000
unkown
page execute and read and write
1DE8E000
stack
page read and write
1322000
unkown
page execute and write copy
52B1000
heap
page read and write
52B1000
heap
page read and write
1810000
heap
page read and write
15CE000
stack
page read and write
519E000
stack
page read and write
52B1000
heap
page read and write
58D0000
direct allocation
page execute and read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
1D8FE000
stack
page read and write
52C4000
heap
page read and write
479E000
stack
page read and write
44DF000
stack
page read and write
52A0000
direct allocation
page read and write
52B1000
heap
page read and write
56F0000
trusted library allocation
page read and write
465E000
stack
page read and write
52B1000
heap
page read and write
4EDF000
stack
page read and write
52A0000
direct allocation
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
1EBE000
stack
page read and write
52A0000
direct allocation
page read and write
107E000
unkown
page execute and read and write
52B1000
heap
page read and write
52C0000
heap
page read and write
52B0000
heap
page read and write
58B0000
direct allocation
page execute and read and write
15C5000
stack
page read and write
1321000
unkown
page execute and write copy
52B1000
heap
page read and write
1D7BF000
stack
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
52A0000
direct allocation
page read and write
52B1000
heap
page read and write
49DF000
stack
page read and write
1999000
heap
page read and write
52A0000
direct allocation
page read and write
1D67F000
stack
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
355E000
stack
page read and write
1200000
unkown
page execute and read and write
34DC000
stack
page read and write
52B1000
heap
page read and write
4A1E000
stack
page read and write
DFC000
stack
page read and write
52B1000
heap
page read and write
52A0000
direct allocation
page read and write
52B1000
heap
page read and write
43DE000
stack
page read and write
1D96E000
stack
page read and write
475F000
stack
page read and write
4B1F000
stack
page read and write
3597000
heap
page read and write
505E000
stack
page read and write
52D0000
heap
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
1DD8E000
stack
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
52A0000
direct allocation
page read and write
52B1000
heap
page read and write
1DBAC000
stack
page read and write
19AB000
heap
page read and write
52A0000
direct allocation
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
52A0000
direct allocation
page read and write
4C5F000
stack
page read and write
52B1000
heap
page read and write
194A000
heap
page read and write
52B1000
heap
page read and write
14C0000
unkown
page execute and read and write
52B1000
heap
page read and write
401E000
stack
page read and write
415E000
stack
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
E20000
unkown
page readonly
52A0000
direct allocation
page read and write
52A0000
direct allocation
page read and write
1DBE000
stack
page read and write
52B1000
heap
page read and write
39DE000
stack
page read and write
19C8000
heap
page read and write
58E0000
direct allocation
page execute and read and write
1940000
heap
page read and write
3D5F000
stack
page read and write
389F000
stack
page read and write
52B1000
heap
page read and write
58A0000
direct allocation
page execute and read and write
3ADF000
stack
page read and write
577E000
stack
page read and write
411F000
stack
page read and write
52B1000
heap
page read and write
1D7FE000
stack
page read and write
451E000
stack
page read and write
52B1000
heap
page read and write
1992000
heap
page read and write
52B1000
heap
page read and write
1DAAD000
stack
page read and write
3B1E000
stack
page read and write
3590000
heap
page read and write
1312000
unkown
page execute and read and write
E21000
unkown
page execute and write copy
58C0000
direct allocation
page execute and read and write
52B1000
heap
page read and write
515F000
stack
page read and write
461F000
stack
page read and write
1D6BE000
stack
page read and write
52B1000
heap
page read and write
349E000
stack
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
3560000
heap
page read and write
52B1000
heap
page read and write
1800000
heap
page read and write
52B1000
heap
page read and write
3570000
heap
page read and write
501F000
stack
page read and write
48DE000
stack
page read and write
529F000
stack
page read and write
52B1000
heap
page read and write
1B7E000
stack
page read and write
5890000
direct allocation
page execute and read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
369F000
stack
page read and write
1DCEE000
stack
page read and write
379F000
stack
page read and write
587F000
stack
page read and write
3C5E000
stack
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
EDD000
unkown
page execute and read and write
1321000
unkown
page execute and read and write
4F1E000
stack
page read and write
1A7E000
stack
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
399F000
stack
page read and write
106A000
unkown
page execute and read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
1DE90000
heap
page read and write
52A0000
direct allocation
page read and write
3FDF000
stack
page read and write
1840000
heap
page read and write
52B1000
heap
page read and write
4DDE000
stack
page read and write
489F000
stack
page read and write
52B1000
heap
page read and write
4B5E000
stack
page read and write
130A000
unkown
page execute and read and write
19BA000
heap
page read and write
52B1000
heap
page read and write
14C1000
unkown
page execute and write copy
58CE000
stack
page read and write
439F000
stack
page read and write
E20000
unkown
page read and write
52B1000
heap
page read and write
5740000
direct allocation
page read and write
351E000
stack
page read and write
52B1000
heap
page read and write
5740000
direct allocation
page read and write
4D9F000
stack
page read and write
52B1000
heap
page read and write
3C1F000
stack
page read and write
12E4000
unkown
page execute and read and write
429E000
stack
page read and write
52B1000
heap
page read and write
52B1000
heap
page read and write
1DA6F000
stack
page read and write
52A0000
direct allocation
page read and write
359B000
heap
page read and write
4C9E000
stack
page read and write
1DBED000
stack
page read and write
52B1000
heap
page read and write
3D9E000
stack
page read and write
3E9F000
stack
page read and write
There are 198 hidden memdumps, click here to show them.