IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.php=6u2
unknown
http://185.215.113.206/6c4adf523b719729.php~
unknown
http://185.215.113.206/6c4adf523b719729.phpl
unknown
http://185.215.113.206/6c4adf523b719729.php//
unknown
http://185.215.113.206/6c4adf523b719729.phpU5
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
http://185.215.113.206/6c4adf523b719729.phpq5
unknown
http://185.215.113.206/6c4adf523b719729.phpI5
unknown
http://185.215.113.206/&
unknown
http://185.215.113.206RG
unknown
There are 3 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1A6E000
heap
page read and write
malicious
5670000
direct allocation
page read and write
malicious
E11000
unkown
page execute and read and write
malicious
1730000
heap
page read and write
51E1000
heap
page read and write
155B000
unkown
page execute and write copy
F7E000
unkown
page execute and read and write
51E1000
heap
page read and write
1A50000
direct allocation
page read and write
1A50000
direct allocation
page read and write
51E1000
heap
page read and write
42BF000
stack
page read and write
507F000
stack
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1DAED000
stack
page read and write
1A50000
direct allocation
page read and write
51E1000
heap
page read and write
18C5000
heap
page read and write
51E1000
heap
page read and write
377F000
stack
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
5820000
direct allocation
page execute and read and write
1ACA000
heap
page read and write
51E7000
heap
page read and write
51E1000
heap
page read and write
1DCCE000
stack
page read and write
51E1000
heap
page read and write
19CF000
stack
page read and write
16DE000
stack
page read and write
51E1000
heap
page read and write
367E000
stack
page read and write
51E1000
heap
page read and write
13AF000
unkown
page execute and read and write
467F000
stack
page read and write
57F0000
direct allocation
page execute and read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
4B7F000
stack
page read and write
1D5FD000
stack
page read and write
4A7E000
stack
page read and write
1A50000
direct allocation
page read and write
1A50000
direct allocation
page read and write
57F0000
direct allocation
page execute and read and write
1DDD0000
heap
page read and write
51E1000
heap
page read and write
18B7000
heap
page read and write
18BB000
heap
page read and write
51E1000
heap
page read and write
493E000
stack
page read and write
51E1000
heap
page read and write
1FEE000
stack
page read and write
10FA000
unkown
page execute and read and write
453F000
stack
page read and write
1D9AF000
stack
page read and write
5800000
direct allocation
page execute and read and write
13B0000
unkown
page execute and write copy
3A3E000
stack
page read and write
1A6A000
heap
page read and write
38BF000
stack
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1A4E000
stack
page read and write
457E000
stack
page read and write
51E1000
heap
page read and write
39FF000
stack
page read and write
51BF000
stack
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
13AF000
unkown
page execute and write copy
38FE000
stack
page read and write
5670000
direct allocation
page read and write
41BE000
stack
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1D6FE000
stack
page read and write
3EFF000
stack
page read and write
3DFE000
stack
page read and write
51E1000
heap
page read and write
1A50000
direct allocation
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
5670000
direct allocation
page read and write
57C0000
direct allocation
page execute and read and write
51E1000
heap
page read and write
417F000
stack
page read and write
1AE0000
heap
page read and write
1D83F000
stack
page read and write
4A3F000
stack
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1A60000
heap
page read and write
4CFE000
stack
page read and write
1D9EE000
stack
page read and write
1A0E000
stack
page read and write
51E1000
heap
page read and write
3F3E000
stack
page read and write
56AE000
stack
page read and write
353B000
stack
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1A50000
direct allocation
page read and write
51E1000
heap
page read and write
F4D000
unkown
page execute and read and write
47FE000
stack
page read and write
57E0000
direct allocation
page execute and read and write
4BBE000
stack
page read and write
407E000
stack
page read and write
51E1000
heap
page read and write
1A50000
direct allocation
page read and write
1D8AE000
stack
page read and write
4F7E000
stack
page read and write
1A50000
direct allocation
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
4E3E000
stack
page read and write
51E1000
heap
page read and write
3DBF000
stack
page read and write
51E1000
heap
page read and write
1DDCF000
stack
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1AB4000
heap
page read and write
51E1000
heap
page read and write
18A0000
heap
page read and write
51E1000
heap
page read and write
16D4000
stack
page read and write
51F0000
heap
page read and write
1D5BF000
stack
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
5200000
heap
page read and write
1810000
heap
page read and write
E10000
unkown
page readonly
51E1000
heap
page read and write
187E000
stack
page read and write
51E1000
heap
page read and write
1399000
unkown
page execute and read and write
51E1000
heap
page read and write
1289000
unkown
page execute and read and write
443E000
stack
page read and write
155A000
unkown
page execute and read and write
1A50000
direct allocation
page read and write
403F000
stack
page read and write
51C0000
heap
page read and write
51E1000
heap
page read and write
15DC000
stack
page read and write
E3C000
unkown
page execute and read and write
1DB2D000
stack
page read and write
E11000
unkown
page execute and write copy
1AE4000
heap
page read and write
51E0000
heap
page read and write
569B000
direct allocation
page read and write
57AF000
stack
page read and write
1A50000
direct allocation
page read and write
51E1000
heap
page read and write
13A0000
unkown
page execute and read and write
52E0000
trusted library allocation
page read and write
51E1000
heap
page read and write
4CBF000
stack
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
3CBE000
stack
page read and write
18B0000
heap
page read and write
18C0000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
37BE000
stack
page read and write
10E6000
unkown
page execute and read and write
4DFF000
stack
page read and write
57F0000
direct allocation
page execute and read and write
46BE000
stack
page read and write
3B7E000
stack
page read and write
E10000
unkown
page read and write
51E1000
heap
page read and write
4F3F000
stack
page read and write
363F000
stack
page read and write
51E1000
heap
page read and write
1D73E000
stack
page read and write
34FF000
stack
page read and write
3C7F000
stack
page read and write
1A50000
direct allocation
page read and write
51E1000
heap
page read and write
48FE000
stack
page read and write
1DC2C000
stack
page read and write
57FE000
stack
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
47BF000
stack
page read and write
F59000
unkown
page execute and read and write
1375000
unkown
page execute and read and write
1A50000
direct allocation
page read and write
50BE000
stack
page read and write
51E1000
heap
page read and write
42FE000
stack
page read and write
51E1000
heap
page read and write
43FF000
stack
page read and write
3B3F000
stack
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
57D0000
direct allocation
page execute and read and write
5810000
direct allocation
page execute and read and write
51E1000
heap
page read and write
1A50000
direct allocation
page read and write
51E1000
heap
page read and write
There are 201 hidden memdumps, click here to show them.