IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.php.
unknown
http://185.215.113.206/6c4adf523b719729.php/
unknown
http://185.215.113.206/m
unknown
http://185.215.113.206/6c4adf523b719729.phpZ
unknown
http://185.215.113.206/6c4adf523b719729.phpj
unknown
http://185.215.113.206/ws
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
9AE000
heap
page read and write
malicious
4F40000
direct allocation
page read and write
malicious
E41000
unkown
page execute and read and write
malicious
4AB1000
heap
page read and write
13C3000
unkown
page execute and read and write
422E000
stack
page read and write
E30000
direct allocation
page read and write
46EF000
stack
page read and write
4AB1000
heap
page read and write
13D2000
unkown
page execute and write copy
5D4000
heap
page read and write
1D14F000
stack
page read and write
5D4000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
31EE000
stack
page read and write
8F5000
stack
page read and write
436E000
stack
page read and write
4AB1000
heap
page read and write
A21000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
5D4000
heap
page read and write
4AB1000
heap
page read and write
5D4000
heap
page read and write
4AB1000
heap
page read and write
3FAE000
stack
page read and write
3D2E000
stack
page read and write
4AB1000
heap
page read and write
5D4000
heap
page read and write
9F2000
heap
page read and write
4AB1000
heap
page read and write
5D4000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
5D4000
heap
page read and write
5D4000
heap
page read and write
45EE000
stack
page read and write
50C0000
direct allocation
page execute and read and write
E30000
direct allocation
page read and write
392F000
stack
page read and write
1570000
unkown
page execute and read and write
4AB1000
heap
page read and write
E30000
direct allocation
page read and write
5D4000
heap
page read and write
1CECF000
stack
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
5D4000
heap
page read and write
4AB1000
heap
page read and write
5D4000
heap
page read and write
332E000
stack
page read and write
4AB1000
heap
page read and write
1D00F000
stack
page read and write
3BEE000
stack
page read and write
50F0000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
50A0000
direct allocation
page execute and read and write
382E000
stack
page read and write
346E000
stack
page read and write
E30000
direct allocation
page read and write
2EA0000
heap
page read and write
3CEF000
stack
page read and write
9AA000
heap
page read and write
446F000
stack
page read and write
5D4000
heap
page read and write
CAE000
stack
page read and write
5D4000
heap
page read and write
4AB1000
heap
page read and write
5D4000
heap
page read and write
112A000
unkown
page execute and read and write
496F000
stack
page read and write
432F000
stack
page read and write
4AD0000
heap
page read and write
5D4000
heap
page read and write
C6F000
stack
page read and write
2E1F000
stack
page read and write
31AF000
stack
page read and write
4AB1000
heap
page read and write
900000
heap
page read and write
44AE000
stack
page read and write
3A6F000
stack
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
49AE000
stack
page read and write
36AF000
stack
page read and write
E41000
unkown
page execute and write copy
3BAF000
stack
page read and write
E6C000
unkown
page execute and read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
3AAE000
stack
page read and write
E30000
direct allocation
page read and write
2E5E000
stack
page read and write
4AB1000
heap
page read and write
4AC5000
heap
page read and write
50D0000
direct allocation
page execute and read and write
E30000
direct allocation
page read and write
E30000
direct allocation
page read and write
1D3DC000
stack
page read and write
5D4000
heap
page read and write
F7D000
unkown
page execute and read and write
4AB1000
heap
page read and write
5D0000
heap
page read and write
5D4000
heap
page read and write
4AB1000
heap
page read and write
13D1000
unkown
page execute and read and write
4AB1000
heap
page read and write
DAF000
stack
page read and write
DEE000
stack
page read and write
5D4000
heap
page read and write
32EF000
stack
page read and write
5D4000
heap
page read and write
1D04E000
stack
page read and write
5D4000
heap
page read and write
E40000
unkown
page readonly
4AB1000
heap
page read and write
1D28F000
stack
page read and write
50E0000
direct allocation
page execute and read and write
4F40000
direct allocation
page read and write
E30000
direct allocation
page read and write
4AB1000
heap
page read and write
E30000
direct allocation
page read and write
37EF000
stack
page read and write
5D4000
heap
page read and write
F89000
unkown
page execute and read and write
3E2F000
stack
page read and write
36EE000
stack
page read and write
2FAF000
stack
page read and write
96E000
stack
page read and write
4AB1000
heap
page read and write
E30000
direct allocation
page read and write
40EE000
stack
page read and write
1D51E000
stack
page read and write
E30000
direct allocation
page read and write
2EA7000
heap
page read and write
40AF000
stack
page read and write
5D4000
heap
page read and write
E30000
direct allocation
page read and write
4AB1000
heap
page read and write
9A0000
heap
page read and write
4AAF000
stack
page read and write
5090000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
5D4000
heap
page read and write
4F7E000
stack
page read and write
507F000
stack
page read and write
5F0000
heap
page read and write
13D1000
unkown
page execute and write copy
5D4000
heap
page read and write
A08000
heap
page read and write
1D2DD000
stack
page read and write
3F6F000
stack
page read and write
E40000
unkown
page read and write
58C000
stack
page read and write
1116000
unkown
page execute and read and write
396E000
stack
page read and write
4AB1000
heap
page read and write
2E9E000
stack
page read and write
50C0000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
50B0000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
4F6B000
direct allocation
page read and write
13BB000
unkown
page execute and read and write
2EAB000
heap
page read and write
4AB1000
heap
page read and write
1571000
unkown
page execute and write copy
1CDCE000
stack
page read and write
5D4000
heap
page read and write
4AC0000
heap
page read and write
4AB1000
heap
page read and write
5D4000
heap
page read and write
5D4000
heap
page read and write
35AE000
stack
page read and write
12C4000
unkown
page execute and read and write
45AF000
stack
page read and write
472E000
stack
page read and write
4AB1000
heap
page read and write
5D4000
heap
page read and write
1D18E000
stack
page read and write
9F5000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
8FF000
stack
page read and write
5D4000
heap
page read and write
4F20000
heap
page read and write
5D4000
heap
page read and write
990000
heap
page read and write
E30000
direct allocation
page read and write
4AB1000
heap
page read and write
356F000
stack
page read and write
E30000
direct allocation
page read and write
4AB1000
heap
page read and write
5D4000
heap
page read and write
5D4000
heap
page read and write
1CF0E000
stack
page read and write
342F000
stack
page read and write
4AB1000
heap
page read and write
1D41E000
stack
page read and write
4AB1000
heap
page read and write
41EF000
stack
page read and write
4AB1000
heap
page read and write
5D4000
heap
page read and write
486E000
stack
page read and write
1399000
unkown
page execute and read and write
5D4000
heap
page read and write
4EF0000
trusted library allocation
page read and write
4AB1000
heap
page read and write
3E6E000
stack
page read and write
482F000
stack
page read and write
FAE000
unkown
page execute and read and write
5D4000
heap
page read and write
5D4000
heap
page read and write
5D4000
heap
page read and write
E2B000
stack
page read and write
4AB0000
heap
page read and write
30AF000
stack
page read and write
4F40000
direct allocation
page read and write
50C0000
direct allocation
page execute and read and write
There are 221 hidden memdumps, click here to show them.