IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.php=DMJ
unknown
http://185.215.113.206/6c4adf523b719729.php/O
unknown
http://185.215.113.206/$
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4EF0000
direct allocation
page read and write
malicious
128E000
heap
page read and write
malicious
4C1000
unkown
page execute and read and write
malicious
2C6E000
stack
page read and write
4A61000
heap
page read and write
50A0000
direct allocation
page execute and read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
10A4000
heap
page read and write
2FFF000
stack
page read and write
1D28D000
stack
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
10A4000
heap
page read and write
BEC000
unkown
page execute and read and write
4A61000
heap
page read and write
BED000
unkown
page execute and write copy
4A50000
direct allocation
page read and write
417F000
stack
page read and write
42BF000
stack
page read and write
303E000
stack
page read and write
3F3E000
stack
page read and write
32BE000
stack
page read and write
127E000
stack
page read and write
4A70000
heap
page read and write
4EF0000
direct allocation
page read and write
453F000
stack
page read and write
10A4000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
12F9000
heap
page read and write
4A61000
heap
page read and write
10A4000
heap
page read and write
494E000
stack
page read and write
403F000
stack
page read and write
F74000
stack
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
62E000
unkown
page execute and read and write
46CE000
stack
page read and write
4A50000
direct allocation
page read and write
4A61000
heap
page read and write
2DAB000
stack
page read and write
5050000
direct allocation
page execute and read and write
A4D000
unkown
page execute and read and write
4F1B000
direct allocation
page read and write
327F000
stack
page read and write
10A4000
heap
page read and write
480E000
stack
page read and write
4A61000
heap
page read and write
4A4F000
stack
page read and write
4A61000
heap
page read and write
3B3F000
stack
page read and write
4A61000
heap
page read and write
10A4000
heap
page read and write
38BF000
stack
page read and write
1CFBF000
stack
page read and write
4C0000
unkown
page readonly
1D0FF000
stack
page read and write
10A4000
heap
page read and write
4ED0000
heap
page read and write
4A61000
heap
page read and write
42FE000
stack
page read and write
3A3E000
stack
page read and write
10A4000
heap
page read and write
4C0000
unkown
page read and write
10A4000
heap
page read and write
1D23F000
stack
page read and write
4A61000
heap
page read and write
33BF000
stack
page read and write
3C7F000
stack
page read and write
4A61000
heap
page read and write
10A4000
heap
page read and write
130B000
heap
page read and write
377F000
stack
page read and write
10A4000
heap
page read and write
4C1000
unkown
page execute and write copy
F7E000
stack
page read and write
4EC000
unkown
page execute and read and write
A4E000
unkown
page execute and write copy
10A4000
heap
page read and write
4A61000
heap
page read and write
4A50000
direct allocation
page read and write
930000
unkown
page execute and read and write
10A4000
heap
page read and write
3DFE000
stack
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
4A50000
direct allocation
page read and write
10A4000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
10A4000
heap
page read and write
4A61000
heap
page read and write
1D38C000
stack
page read and write
4A50000
direct allocation
page read and write
468F000
stack
page read and write
407E000
stack
page read and write
10A4000
heap
page read and write
353E000
stack
page read and write
4A61000
heap
page read and write
12D4000
heap
page read and write
317E000
stack
page read and write
443E000
stack
page read and write
10A4000
heap
page read and write
4A61000
heap
page read and write
33FE000
stack
page read and write
10A4000
heap
page read and write
A35000
unkown
page execute and read and write
108E000
stack
page read and write
4A61000
heap
page read and write
38FE000
stack
page read and write
4A61000
heap
page read and write
1D4CE000
stack
page read and write
A3E000
unkown
page execute and read and write
2DF7000
heap
page read and write
1CEBE000
stack
page read and write
10A4000
heap
page read and write
10A4000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
796000
unkown
page execute and read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
4A50000
direct allocation
page read and write
4A61000
heap
page read and write
10A4000
heap
page read and write
A4D000
unkown
page execute and write copy
10A4000
heap
page read and write
4A50000
direct allocation
page read and write
4A50000
direct allocation
page read and write
5040000
direct allocation
page execute and read and write
10A4000
heap
page read and write
2DF0000
heap
page read and write
FD0000
heap
page read and write
5070000
direct allocation
page execute and read and write
4A61000
heap
page read and write
4A62000
heap
page read and write
490F000
stack
page read and write
4F2E000
stack
page read and write
5060000
direct allocation
page execute and read and write
12E7000
heap
page read and write
5070000
direct allocation
page execute and read and write
1CFFE000
stack
page read and write
4A61000
heap
page read and write
37BE000
stack
page read and write
1D3CE000
stack
page read and write
10A4000
heap
page read and write
10A4000
heap
page read and write
4A61000
heap
page read and write
10A4000
heap
page read and write
4A61000
heap
page read and write
4A60000
heap
page read and write
4EA0000
trusted library allocation
page read and write
104D000
stack
page read and write
1280000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
1CE7F000
stack
page read and write
2DFB000
heap
page read and write
4A50000
direct allocation
page read and write
10A4000
heap
page read and write
3EFF000
stack
page read and write
10A4000
heap
page read and write
10A4000
heap
page read and write
458E000
stack
page read and write
34FF000
stack
page read and write
10A4000
heap
page read and write
1305000
heap
page read and write
10A4000
heap
page read and write
2EFF000
stack
page read and write
1CD7E000
stack
page read and write
E7C000
stack
page read and write
363F000
stack
page read and write
4A61000
heap
page read and write
4A50000
direct allocation
page read and write
4540000
heap
page read and write
10A4000
heap
page read and write
A11000
unkown
page execute and read and write
5FD000
unkown
page execute and read and write
313F000
stack
page read and write
7AA000
unkown
page execute and read and write
4A50000
direct allocation
page read and write
4A61000
heap
page read and write
147E000
stack
page read and write
4A61000
heap
page read and write
1288000
heap
page read and write
10A4000
heap
page read and write
4A61000
heap
page read and write
609000
unkown
page execute and read and write
4A61000
heap
page read and write
10A4000
heap
page read and write
5070000
direct allocation
page execute and read and write
4A50000
direct allocation
page read and write
4A61000
heap
page read and write
4A50000
direct allocation
page read and write
39FF000
stack
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
10A4000
heap
page read and write
4A50000
direct allocation
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
3CBE000
stack
page read and write
41BE000
stack
page read and write
FE0000
heap
page read and write
367E000
stack
page read and write
4A61000
heap
page read and write
43FF000
stack
page read and write
5090000
direct allocation
page execute and read and write
4A61000
heap
page read and write
4A61000
heap
page read and write
3DBF000
stack
page read and write
10A0000
heap
page read and write
502F000
stack
page read and write
4A61000
heap
page read and write
2DEE000
stack
page read and write
47CF000
stack
page read and write
1D13E000
stack
page read and write
4A61000
heap
page read and write
4EF0000
direct allocation
page read and write
2D6F000
stack
page read and write
4A61000
heap
page read and write
3B7E000
stack
page read and write
5080000
direct allocation
page execute and read and write
10A4000
heap
page read and write
10A4000
heap
page read and write
4A61000
heap
page read and write
There are 222 hidden memdumps, click here to show them.