IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/e2b1563c6670f193.phpn
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.phpb
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/r
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpV
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/G
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpm:
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
DBE000
heap
page read and write
malicious
4B10000
direct allocation
page read and write
malicious
141000
unkown
page execute and read and write
malicious
4691000
heap
page read and write
312F000
stack
page read and write
B75000
stack
page read and write
2D6F000
stack
page read and write
3A2E000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4B10000
direct allocation
page read and write
2C2F000
stack
page read and write
4691000
heap
page read and write
140000
unkown
page readonly
466F000
stack
page read and write
2C6E000
stack
page read and write
39EF000
stack
page read and write
1CA5F000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
DA0000
direct allocation
page read and write
1CE8E000
stack
page read and write
609000
unkown
page execute and read and write
2B2E000
stack
page read and write
46B0000
heap
page read and write
DFE000
heap
page read and write
DB0000
heap
page read and write
D7E000
stack
page read and write
CF5000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
362F000
stack
page read and write
4691000
heap
page read and write
52E000
unkown
page execute and read and write
E40000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4696000
heap
page read and write
D3E000
stack
page read and write
1CF8D000
stack
page read and write
366E000
stack
page read and write
442E000
stack
page read and write
42EE000
stack
page read and write
416F000
stack
page read and write
DA0000
direct allocation
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
1CA9E000
stack
page read and write
DBA000
heap
page read and write
4691000
heap
page read and write
DA0000
direct allocation
page read and write
4C90000
direct allocation
page execute and read and write
28EB000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
3F2E000
stack
page read and write
376F000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
28CC000
stack
page read and write
4691000
heap
page read and write
43EF000
stack
page read and write
4691000
heap
page read and write
2EAF000
stack
page read and write
DA0000
direct allocation
page read and write
644000
unkown
page execute and write copy
37AE000
stack
page read and write
4691000
heap
page read and write
28E7000
heap
page read and write
456E000
stack
page read and write
316E000
stack
page read and write
4691000
heap
page read and write
288E000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
1CE3F000
stack
page read and write
4691000
heap
page read and write
302E000
stack
page read and write
222000
unkown
page execute and read and write
4691000
heap
page read and write
140000
unkown
page read and write
4670000
heap
page read and write
326F000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4690000
heap
page read and write
3CAE000
stack
page read and write
4C90000
direct allocation
page execute and read and write
4691000
heap
page read and write
DA0000
direct allocation
page read and write
1FD000
unkown
page execute and read and write
4691000
heap
page read and write
33AF000
stack
page read and write
DA0000
direct allocation
page read and write
2AEF000
stack
page read and write
DA0000
direct allocation
page read and write
2EEE000
stack
page read and write
DA0000
direct allocation
page read and write
4691000
heap
page read and write
DA0000
direct allocation
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
BD0000
heap
page read and write
3EEF000
stack
page read and write
DA0000
direct allocation
page read and write
38A000
unkown
page execute and read and write
4691000
heap
page read and write
4691000
heap
page read and write
1CD3E000
stack
page read and write
4C60000
direct allocation
page execute and read and write
1CCDE000
stack
page read and write
3B6E000
stack
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
D90000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
4C80000
direct allocation
page execute and read and write
4691000
heap
page read and write
452F000
stack
page read and write
352E000
stack
page read and write
CB0000
heap
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
34EF000
stack
page read and write
DA0000
direct allocation
page read and write
635000
unkown
page execute and read and write
7E3000
unkown
page execute and write copy
B7E000
stack
page read and write
DA0000
direct allocation
page read and write
4C9E000
stack
page read and write
4691000
heap
page read and write
46A0000
heap
page read and write
FAF000
stack
page read and write
29EF000
stack
page read and write
4691000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
41AE000
stack
page read and write
4691000
heap
page read and write
402F000
stack
page read and write
42AF000
stack
page read and write
A7C000
stack
page read and write
643000
unkown
page execute and write copy
2FEF000
stack
page read and write
1F1000
unkown
page execute and read and write
3B2F000
stack
page read and write
284E000
stack
page read and write
4691000
heap
page read and write
4C4F000
stack
page read and write
33EE000
stack
page read and write
4691000
heap
page read and write
406E000
stack
page read and write
4691000
heap
page read and write
1CBDE000
stack
page read and write
E17000
heap
page read and write
4691000
heap
page read and write
3C6F000
stack
page read and write
4691000
heap
page read and write
39E000
unkown
page execute and read and write
4691000
heap
page read and write
DA0000
direct allocation
page read and write
DA0000
direct allocation
page read and write
4691000
heap
page read and write
4691000
heap
page read and write
E34000
heap
page read and write
4691000
heap
page read and write
643000
unkown
page execute and read and write
4B10000
direct allocation
page read and write
3DEE000
stack
page read and write
3DAF000
stack
page read and write
2DAE000
stack
page read and write
4691000
heap
page read and write
38EE000
stack
page read and write
CF0000
heap
page read and write
1CFCD000
stack
page read and write
4691000
heap
page read and write
4B4E000
stack
page read and write
141000
unkown
page execute and write copy
4691000
heap
page read and write
4691000
heap
page read and write
4790000
trusted library allocation
page read and write
1CB9F000
stack
page read and write
1D0CC000
stack
page read and write
4C70000
direct allocation
page execute and read and write
4691000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
4691000
heap
page read and write
28E0000
heap
page read and write
38AF000
stack
page read and write
62B000
unkown
page execute and read and write
E01000
heap
page read and write
32AE000
stack
page read and write
7E2000
unkown
page execute and read and write
There are 194 hidden memdumps, click here to show them.