IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206xj:o
unknown
http://185.215.113.206/6c4adf523b719729.php/
unknown
http://185.215.113.206/6c4adf523b719729.php/m
unknown
http://185.215.113.206/6c4adf523b719729.phpl
unknown
http://185.215.113.206/6c4adf523b719729.phpH
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5130000
direct allocation
page read and write
malicious
7E1000
unkown
page execute and read and write
malicious
143E000
heap
page read and write
malicious
FF0000
heap
page read and write
1D4AD000
stack
page read and write
4CA1000
heap
page read and write
134E000
stack
page read and write
1499000
heap
page read and write
429E000
stack
page read and write
4C90000
direct allocation
page read and write
4C90000
direct allocation
page read and write
385F000
stack
page read and write
4CA1000
heap
page read and write
3EDE000
stack
page read and write
1D6EC000
stack
page read and write
12FF000
stack
page read and write
4CA1000
heap
page read and write
4C90000
direct allocation
page read and write
142B000
stack
page read and write
14B6000
heap
page read and write
415E000
stack
page read and write
4B6E000
stack
page read and write
4C90000
direct allocation
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CC0000
heap
page read and write
AB6000
unkown
page execute and read and write
2F90000
heap
page read and write
4CA1000
heap
page read and write
12F5000
stack
page read and write
7E0000
unkown
page read and write
411F000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
172F000
stack
page read and write
4C90000
direct allocation
page read and write
4CA1000
heap
page read and write
389E000
stack
page read and write
1D1FE000
stack
page read and write
4CA1000
heap
page read and write
1D2FE000
stack
page read and write
349F000
stack
page read and write
FF5000
heap
page read and write
4CA1000
heap
page read and write
3ADF000
stack
page read and write
4CA1000
heap
page read and write
52B0000
direct allocation
page execute and read and write
91D000
unkown
page execute and read and write
52C0000
direct allocation
page execute and read and write
3D5F000
stack
page read and write
138E000
stack
page read and write
4CA1000
heap
page read and write
D67000
unkown
page execute and write copy
5130000
direct allocation
page read and write
1D35E000
stack
page read and write
4C90000
direct allocation
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
3D9E000
stack
page read and write
49EF000
stack
page read and write
80C000
unkown
page execute and read and write
5290000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
44DE000
stack
page read and write
3C5E000
stack
page read and write
4CA1000
heap
page read and write
52E0000
direct allocation
page execute and read and write
399F000
stack
page read and write
1D5AD000
stack
page read and write
4B2F000
stack
page read and write
2F9B000
heap
page read and write
4C90000
direct allocation
page read and write
3C1F000
stack
page read and write
515B000
direct allocation
page read and write
4CA1000
heap
page read and write
339F000
stack
page read and write
4CA1000
heap
page read and write
D66000
unkown
page execute and read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
50E0000
trusted library allocation
page read and write
4CA1000
heap
page read and write
48EE000
stack
page read and write
4CA1000
heap
page read and write
1D1BF000
stack
page read and write
4CA1000
heap
page read and write
52D0000
direct allocation
page execute and read and write
39DE000
stack
page read and write
1D45F000
stack
page read and write
44E0000
heap
page read and write
52A0000
direct allocation
page execute and read and write
ACA000
unkown
page execute and read and write
4C6F000
stack
page read and write
7C0000
heap
page read and write
425F000
stack
page read and write
D58000
unkown
page execute and read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4C90000
direct allocation
page read and write
4CA1000
heap
page read and write
1430000
heap
page read and write
7D0000
heap
page read and write
2F8E000
stack
page read and write
4C70000
heap
page read and write
4A2E000
stack
page read and write
4CA1000
heap
page read and write
4CB0000
heap
page read and write
48AF000
stack
page read and write
462F000
stack
page read and write
3FDF000
stack
page read and write
476F000
stack
page read and write
143A000
heap
page read and write
4CA1000
heap
page read and write
1483000
heap
page read and write
EFE000
unkown
page execute and read and write
526F000
stack
page read and write
76C000
stack
page read and write
13EE000
stack
page read and write
2F0E000
stack
page read and write
4CA1000
heap
page read and write
43DE000
stack
page read and write
4CA1000
heap
page read and write
4CA3000
heap
page read and write
4C90000
direct allocation
page read and write
4CA1000
heap
page read and write
D66000
unkown
page execute and write copy
52B0000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
329F000
stack
page read and write
3E9F000
stack
page read and write
4CA1000
heap
page read and write
4CA0000
heap
page read and write
5280000
direct allocation
page execute and read and write
4C90000
direct allocation
page read and write
4CA1000
heap
page read and write
371F000
stack
page read and write
4CA1000
heap
page read and write
4C90000
direct allocation
page read and write
4CA1000
heap
page read and write
EFF000
unkown
page execute and write copy
4CA1000
heap
page read and write
4CA1000
heap
page read and write
375E000
stack
page read and write
2F97000
heap
page read and write
4CA1000
heap
page read and write
47AE000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
52BE000
stack
page read and write
7E1000
unkown
page execute and write copy
7E0000
unkown
page readonly
1D5ED000
stack
page read and write
516E000
stack
page read and write
4CA1000
heap
page read and write
5130000
direct allocation
page read and write
162E000
stack
page read and write
309F000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
C51000
unkown
page execute and read and write
4CA1000
heap
page read and write
34DE000
stack
page read and write
4CA1000
heap
page read and write
452E000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4C90000
direct allocation
page read and write
14A7000
heap
page read and write
52B0000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
1D07F000
stack
page read and write
35DF000
stack
page read and write
1D0BE000
stack
page read and write
4CA1000
heap
page read and write
D2E000
unkown
page execute and read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
94E000
unkown
page execute and read and write
929000
unkown
page execute and read and write
319F000
stack
page read and write
401E000
stack
page read and write
466E000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
3B1E000
stack
page read and write
4CA1000
heap
page read and write
4C90000
direct allocation
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
361E000
stack
page read and write
4CA1000
heap
page read and write
4C90000
direct allocation
page read and write
D50000
unkown
page execute and read and write
4CA1000
heap
page read and write
2F4E000
stack
page read and write
439E000
stack
page read and write
There are 196 hidden memdumps, click here to show them.