IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpL
unknown
malicious
http://185.215.113.37o
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpRx
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpP
unknown
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/Lxcq
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php8
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpx
unknown
malicious
http://185.215.113.37/6122658-3693405117-2476756634-1002e
unknown
malicious
http://185.215.113.37/UxZq
unknown
malicious
http://185.215.113.37/cx
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php$
unknown
malicious
There are 5 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
146E000
heap
page read and write
malicious
51A0000
direct allocation
page read and write
malicious
681000
unkown
page execute and read and write
malicious
680000
unkown
page read and write
B5E000
unkown
page execute and read and write
4D21000
heap
page read and write
31DE000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
1424000
heap
page read and write
175E000
stack
page read and write
1450000
direct allocation
page read and write
1420000
heap
page read and write
4D21000
heap
page read and write
14B4000
heap
page read and write
449E000
stack
page read and write
1424000
heap
page read and write
4D21000
heap
page read and write
1450000
direct allocation
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
1D53D000
stack
page read and write
1450000
direct allocation
page read and write
1424000
heap
page read and write
B65000
unkown
page execute and read and write
14C8000
heap
page read and write
4D21000
heap
page read and write
3F9E000
stack
page read and write
51DE000
stack
page read and write
32DF000
stack
page read and write
5310000
direct allocation
page execute and read and write
4D21000
heap
page read and write
481F000
stack
page read and write
4D21000
heap
page read and write
8CA000
unkown
page execute and read and write
381E000
stack
page read and write
4C1E000
stack
page read and write
12F5000
stack
page read and write
1424000
heap
page read and write
B74000
unkown
page execute and read and write
445F000
stack
page read and write
37DE000
stack
page read and write
1424000
heap
page read and write
1424000
heap
page read and write
D09000
unkown
page execute and read and write
1424000
heap
page read and write
4D21000
heap
page read and write
1424000
heap
page read and write
4A9F000
stack
page read and write
140E000
stack
page read and write
1424000
heap
page read and write
1424000
heap
page read and write
4D21000
heap
page read and write
1424000
heap
page read and write
1424000
heap
page read and write
1450000
direct allocation
page read and write
355F000
stack
page read and write
1450000
direct allocation
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
731000
unkown
page execute and read and write
4D21000
heap
page read and write
1424000
heap
page read and write
4D21000
heap
page read and write
681000
unkown
page execute and write copy
4D1F000
stack
page read and write
4D20000
heap
page read and write
4D21000
heap
page read and write
395E000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
1424000
heap
page read and write
459F000
stack
page read and write
36DE000
stack
page read and write
1450000
direct allocation
page read and write
4D21000
heap
page read and write
1D16E000
stack
page read and write
5320000
direct allocation
page execute and read and write
5300000
direct allocation
page execute and read and write
4D21000
heap
page read and write
1D63D000
stack
page read and write
435E000
stack
page read and write
1424000
heap
page read and write
1450000
direct allocation
page read and write
4D21000
heap
page read and write
4E20000
trusted library allocation
page read and write
4D21000
heap
page read and write
14EB000
heap
page read and write
4D21000
heap
page read and write
3D1E000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
8DE000
unkown
page execute and read and write
4D21000
heap
page read and write
485E000
stack
page read and write
1424000
heap
page read and write
1D26F000
stack
page read and write
762000
unkown
page execute and read and write
4D21000
heap
page read and write
1424000
heap
page read and write
F2C000
stack
page read and write
40DE000
stack
page read and write
1424000
heap
page read and write
4BDF000
stack
page read and write
1450000
direct allocation
page read and write
1424000
heap
page read and write
4D21000
heap
page read and write
52F0000
direct allocation
page execute and read and write
41DF000
stack
page read and write
3E1F000
stack
page read and write
4D21000
heap
page read and write
345E000
stack
page read and write
1424000
heap
page read and write
3BDE000
stack
page read and write
409F000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
5320000
direct allocation
page execute and read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
73D000
unkown
page execute and read and write
1424000
heap
page read and write
4D21000
heap
page read and write
1424000
heap
page read and write
5180000
heap
page read and write
1440000
heap
page read and write
4D21000
heap
page read and write
3A9E000
stack
page read and write
1424000
heap
page read and write
2F57000
heap
page read and write
4D21000
heap
page read and write
3E5E000
stack
page read and write
B74000
unkown
page execute and write copy
1424000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
1460000
heap
page read and write
4ADE000
stack
page read and write
B37000
unkown
page execute and read and write
3CDF000
stack
page read and write
369F000
stack
page read and write
F90000
heap
page read and write
4D21000
heap
page read and write
4D28000
heap
page read and write
680000
unkown
page readonly
319F000
stack
page read and write
1D12F000
stack
page read and write
1424000
heap
page read and write
1424000
heap
page read and write
4D21000
heap
page read and write
51A0000
direct allocation
page read and write
5350000
direct allocation
page execute and read and write
1424000
heap
page read and write
1424000
heap
page read and write
471E000
stack
page read and write
D0A000
unkown
page execute and write copy
1D77E000
stack
page read and write
1450000
direct allocation
page read and write
499E000
stack
page read and write
3A5F000
stack
page read and write
45DE000
stack
page read and write
5340000
direct allocation
page execute and read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
B75000
unkown
page execute and write copy
2F5B000
heap
page read and write
2F3E000
stack
page read and write
1424000
heap
page read and write
495F000
stack
page read and write
1468000
heap
page read and write
5330000
direct allocation
page execute and read and write
1D2AE000
stack
page read and write
1424000
heap
page read and write
1424000
heap
page read and write
4D21000
heap
page read and write
341F000
stack
page read and write
F80000
heap
page read and write
1450000
direct allocation
page read and write
1424000
heap
page read and write
4D30000
heap
page read and write
4D21000
heap
page read and write
1D3AE000
stack
page read and write
4D21000
heap
page read and write
1424000
heap
page read and write
14E2000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
46DF000
stack
page read and write
331E000
stack
page read and write
A5E000
unkown
page execute and read and write
1450000
direct allocation
page read and write
4D21000
heap
page read and write
421E000
stack
page read and write
3B9F000
stack
page read and write
309B000
stack
page read and write
1D67E000
stack
page read and write
1D3EE000
stack
page read and write
391F000
stack
page read and write
165E000
stack
page read and write
4D21000
heap
page read and write
1450000
direct allocation
page read and write
431F000
stack
page read and write
1D4EF000
stack
page read and write
4D21000
heap
page read and write
3F5F000
stack
page read and write
359E000
stack
page read and write
1424000
heap
page read and write
14B0000
heap
page read and write
1424000
heap
page read and write
4D21000
heap
page read and write
1424000
heap
page read and write
1424000
heap
page read and write
4D21000
heap
page read and write
52DF000
stack
page read and write
2F50000
heap
page read and write
51A0000
direct allocation
page read and write
1450000
direct allocation
page read and write
4D40000
heap
page read and write
4D21000
heap
page read and write
1450000
direct allocation
page read and write
FFE000
stack
page read and write
12FE000
stack
page read and write
305F000
stack
page read and write
1D02E000
stack
page read and write
4D21000
heap
page read and write
There are 220 hidden memdumps, click here to show them.