IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.37/e2b1563c6670f193.phpn
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://185.215.113.37/e2b1563c6670f193.php9U
unknown
malicious
http://185.215.113.37O
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.37/.9
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php
185.215.113.37
malicious
http://185.215.113.37/ws
unknown
malicious
http://185.215.113.37/G
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.php%U
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpG
unknown
malicious
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.37
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4C20000
direct allocation
page read and write
malicious
381000
unkown
page execute and read and write
malicious
E1E000
heap
page read and write
malicious
47A1000
heap
page read and write
311F000
stack
page read and write
F30000
direct allocation
page read and write
43D000
unkown
page execute and read and write
2A80000
direct allocation
page read and write
47A0000
heap
page read and write
2EDE000
stack
page read and write
375F000
stack
page read and write
885000
unkown
page execute and read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
441E000
stack
page read and write
47A1000
heap
page read and write
38DE000
stack
page read and write
47A1000
heap
page read and write
419E000
stack
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
380000
unkown
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
2C9F000
stack
page read and write
1CB4F000
stack
page read and write
325E000
stack
page read and write
3C5F000
stack
page read and write
2A90000
heap
page read and write
47A1000
heap
page read and write
B2E000
stack
page read and write
47A1000
heap
page read and write
B25000
stack
page read and write
47A1000
heap
page read and write
4D80000
direct allocation
page execute and read and write
47A1000
heap
page read and write
401F000
stack
page read and write
2E9F000
stack
page read and write
462000
unkown
page execute and read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
1CDCF000
stack
page read and write
1D1BE000
stack
page read and write
F30000
direct allocation
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
86E000
unkown
page execute and read and write
47A1000
heap
page read and write
4D9E000
stack
page read and write
5DE000
unkown
page execute and read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
3D9F000
stack
page read and write
4D60000
direct allocation
page execute and read and write
F30000
direct allocation
page read and write
E77000
heap
page read and write
4D90000
direct allocation
page execute and read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
47A1000
heap
page read and write
1D0BD000
stack
page read and write
4DB0000
direct allocation
page execute and read and write
F10000
heap
page read and write
47A1000
heap
page read and write
886000
unkown
page execute and write copy
47A1000
heap
page read and write
47A1000
heap
page read and write
431000
unkown
page execute and read and write
47A1000
heap
page read and write
4D5F000
stack
page read and write
2A80000
direct allocation
page read and write
47A1000
heap
page read and write
47C0000
heap
page read and write
47A1000
heap
page read and write
E65000
heap
page read and write
47A1000
heap
page read and write
339F000
stack
page read and write