IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/e2b1563c6670f193.phpn
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/H
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpV
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
11DE000
heap
page read and write
malicious
50C0000
direct allocation
page read and write
malicious
B01000
unkown
page execute and read and write
malicious
4C20000
direct allocation
page read and write
1D00F000
stack
page read and write
399E000
stack
page read and write
4C31000
heap
page read and write
395F000
stack
page read and write
4C31000
heap
page read and write
4C20000
direct allocation
page read and write
4C31000
heap
page read and write
4C50000
heap
page read and write
31DF000
stack
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
4C20000
direct allocation
page read and write
4C31000
heap
page read and write
3FDE000
stack
page read and write
4C20000
direct allocation
page read and write
5230000
direct allocation
page execute and read and write
11D0000
heap
page read and write
335E000
stack
page read and write
1D53E000
stack
page read and write
4C31000
heap
page read and write
499F000
stack
page read and write
4D30000
trusted library allocation
page read and write
4C31000
heap
page read and write
1223000
heap
page read and write
11B1000
unkown
page execute and read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
EF1000
unkown
page execute and read and write
100D000
unkown
page execute and read and write
385E000
stack
page read and write
381F000
stack
page read and write
4C31000
heap
page read and write
7C0000
heap
page read and write
4C20000
direct allocation
page read and write
BBD000
unkown
page execute and read and write
1D71E000
stack
page read and write
7D0000
heap
page read and write
5240000
direct allocation
page execute and read and write
4C31000
heap
page read and write
461E000
stack
page read and write
485F000
stack
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
349E000
stack
page read and write
4C31000
heap
page read and write
1D81F000
stack
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
3D1F000
stack
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
45DF000
stack
page read and write
11DA000
heap
page read and write
1D822000
heap
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
2F50000
heap
page read and write
100D000
unkown
page execute and write copy
4C31000
heap
page read and write
2F30000
heap
page read and write
BB1000
unkown
page execute and read and write
1D67C000
stack
page read and write
524E000
stack
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
125E000
heap
page read and write
4C31000
heap
page read and write
AFF000
stack
page read and write
1D14F000
stack
page read and write
4C31000
heap
page read and write
3A9F000
stack
page read and write
4C31000
heap
page read and write
321E000
stack
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
1D3EF000
stack
page read and write
1255000
heap
page read and write
D4A000
unkown
page execute and read and write
1238000
heap
page read and write
3F9F000
stack
page read and write
4C30000
heap
page read and write
162E000
stack
page read and write
4C31000
heap
page read and write
1D18E000
stack
page read and write
489E000
stack
page read and write
76C000
stack
page read and write
4C31000
heap
page read and write
4C20000
direct allocation
page read and write
4ADF000
stack
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
130E000
stack
page read and write
435F000
stack
page read and write
2F20000
heap
page read and write
50C0000
direct allocation
page read and write
36DF000
stack
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
4C20000
direct allocation
page read and write
471F000
stack
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
FCF000
unkown
page execute and read and write
331F000
stack
page read and write
4C40000
heap
page read and write
4C20000
direct allocation
page read and write
5260000
direct allocation
page execute and read and write
4C1F000
stack
page read and write
3D5E000
stack
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
1249000
heap
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
439E000
stack
page read and write
4C31000
heap
page read and write
B00000
unkown
page readonly
FFF000
unkown
page execute and read and write
4C31000
heap
page read and write
40DF000
stack
page read and write
421F000
stack
page read and write
4C20000
direct allocation
page read and write
4C31000
heap
page read and write
FF3000
unkown
page execute and read and write
309F000
stack
page read and write
11B2000
unkown
page execute and write copy
4C31000
heap
page read and write
2F57000
heap
page read and write
1355000
heap
page read and write
121F000
heap
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
152F000
stack
page read and write
4C31000
heap
page read and write
1D57D000
stack
page read and write
D5E000
unkown
page execute and read and write
5250000
direct allocation
page execute and read and write
51FF000
stack
page read and write
5270000
direct allocation
page execute and read and write
1350000
heap
page read and write
2E1E000
stack
page read and write
1D28F000
stack
page read and write
4C31000
heap
page read and write
AF5000
stack
page read and write
1D820000
heap
page read and write
3BDF000
stack
page read and write
4C31000
heap
page read and write
2F5B000
heap
page read and write
4C47000
heap
page read and write
4C31000
heap
page read and write
4C20000
direct allocation
page read and write
411E000
stack
page read and write
359F000
stack
page read and write
BE2000
unkown
page execute and read and write
4C31000
heap
page read and write
2F1F000
stack
page read and write
4C31000
heap
page read and write
4C31000
heap
page read and write
4C20000
direct allocation
page read and write
50FE000
stack
page read and write
425E000
stack
page read and write
B00000
unkown
page read and write
4B1E000
stack
page read and write
371E000
stack
page read and write
4C20000
direct allocation
page read and write
345F000
stack
page read and write
4C31000
heap
page read and write
2F9C000
stack
page read and write
3E5F000
stack
page read and write
49DE000
stack
page read and write
44DE000
stack
page read and write
4C31000
heap
page read and write
3ADE000
stack
page read and write
4C31000
heap
page read and write
475E000
stack
page read and write
3E9E000
stack
page read and write
4C31000
heap
page read and write
50C0000
direct allocation
page read and write
4C31000
heap
page read and write
30DE000
stack
page read and write
449F000
stack
page read and write
4C31000
heap
page read and write
4C20000
direct allocation
page read and write
4C31000
heap
page read and write
B01000
unkown
page execute and write copy
4C31000
heap
page read and write
5220000
direct allocation
page execute and read and write
134E000
stack
page read and write
35DE000
stack
page read and write
5210000
direct allocation
page execute and read and write
1D2EE000
stack
page read and write
4C31000
heap
page read and write
3C1E000
stack
page read and write
5240000
direct allocation
page execute and read and write
1D43D000
stack
page read and write
1D04E000
stack
page read and write
100E000
unkown
page execute and write copy
4C31000
heap
page read and write
4C20000
direct allocation
page read and write
There are 199 hidden memdumps, click here to show them.