IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.php2
unknown
http://185.215.113.206/6c4adf523b719729.php/
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.206/6c4adf523b719729.phphc_
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
701000
unkown
page execute and read and write
malicious
11BE000
heap
page read and write
malicious
4D30000
direct allocation
page read and write
malicious
1034000
heap
page read and write
412F000
stack
page read and write
1180000
direct allocation
page read and write
48B1000
heap
page read and write
C7A000
unkown
page execute and read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
1180000
direct allocation
page read and write
48B1000
heap
page read and write
701000
unkown
page execute and write copy
2B67000
heap
page read and write
E35000
unkown
page execute and write copy
2B4E000
stack
page read and write
48B1000
heap
page read and write
44EF000
stack
page read and write
1034000
heap
page read and write
48D0000
heap
page read and write
48B1000
heap
page read and write
1030000
heap
page read and write
1034000
heap
page read and write
30EF000
stack
page read and write
1180000
direct allocation
page read and write
1034000
heap
page read and write
3DAE000
stack
page read and write
48B1000
heap
page read and write
86E000
unkown
page execute and read and write
1034000
heap
page read and write
4D6E000
stack
page read and write
1034000
heap
page read and write
48B1000
heap
page read and write
101C000
stack
page read and write
48B1000
heap
page read and write
1034000
heap
page read and write
2B6B000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
11B0000
heap
page read and write
376E000
stack
page read and write
1180000
direct allocation
page read and write
1034000
heap
page read and write
1D48E000
stack
page read and write
48B1000
heap
page read and write
2E6F000
stack
page read and write
48B1000
heap
page read and write
34EE000
stack
page read and write
48B1000
heap
page read and write
4CF0000
trusted library allocation
page read and write
1218000
heap
page read and write
1CE1E000
stack
page read and write
43EE000
stack
page read and write
1034000
heap
page read and write
1034000
heap
page read and write
1D38E000
stack
page read and write
11A0000
direct allocation
page read and write
6F4000
stack
page read and write
1D1AC000
stack
page read and write
1034000
heap
page read and write
362E000
stack
page read and write
322F000
stack
page read and write
48B1000
heap
page read and write
2FEE000
stack
page read and write
1CB9E000
stack
page read and write
1CDDF000
stack
page read and write
48B1000
heap
page read and write
1180000
direct allocation
page read and write
48B1000
heap
page read and write
11A0000
direct allocation
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
1034000
heap
page read and write
6FE000
stack
page read and write
B74000
unkown
page execute and read and write
F8D000
stack
page read and write
416E000
stack
page read and write
1CCDD000
stack
page read and write
1CC9F000
stack
page read and write
72C000
unkown
page execute and read and write
48B1000
heap
page read and write
386F000
stack
page read and write
48B1000
heap
page read and write
35EF000
stack
page read and write
39AF000
stack
page read and write
1034000
heap
page read and write
48B1000
heap
page read and write
3C2F000
stack
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
462F000
stack
page read and write
9EA000
unkown
page execute and read and write
1034000
heap
page read and write
1020000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
1CF5E000
stack
page read and write
48B1000
heap
page read and write
1034000
heap
page read and write
48B5000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
C90000
unkown
page execute and write copy
1202000
heap
page read and write
1234000
heap
page read and write
48B1000
heap
page read and write
1D2EE000
stack
page read and write
1034000
heap
page read and write
4E6F000
stack
page read and write
42AE000
stack
page read and write
2C6F000
stack
page read and write
48B1000
heap
page read and write
1034000
heap
page read and write
48B1000
heap
page read and write
1034000
heap
page read and write
48B1000
heap
page read and write
3FEF000
stack
page read and write
1034000
heap
page read and write
700000
unkown
page readonly
48B1000
heap
page read and write
1180000
direct allocation
page read and write
33AE000
stack
page read and write
1240000
heap
page read and write
4E80000
direct allocation
page execute and read and write
E34000
unkown
page execute and write copy
9D6000
unkown
page execute and read and write
3C6E000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
4E90000
direct allocation
page execute and read and write
1034000
heap
page read and write
1180000
direct allocation
page read and write
E34000
unkown
page execute and read and write
2D6F000
stack
page read and write
1034000
heap
page read and write
1CF1F000
stack
page read and write
48B1000
heap
page read and write
2B60000
heap
page read and write
48B1000
heap
page read and write
3C0000
heap
page read and write
1180000
direct allocation
page read and write
11BA000
heap
page read and write
4D00000
heap
page read and write
1D490000
heap
page read and write
38AE000
stack
page read and write
117E000
stack
page read and write
48B1000
heap
page read and write
426F000
stack
page read and write
48B1000
heap
page read and write
1034000
heap
page read and write
F4E000
stack
page read and write
1D05F000
stack
page read and write
312E000
stack
page read and write
1180000
direct allocation
page read and write
C54000
unkown
page execute and read and write
1034000
heap
page read and write
466E000
stack
page read and write
1180000
direct allocation
page read and write
1180000
direct allocation
page read and write
1034000
heap
page read and write
1D0AD000
stack
page read and write
3B2E000
stack
page read and write
C81000
unkown
page execute and read and write
43AF000
stack
page read and write
402E000
stack
page read and write
1180000
direct allocation
page read and write
48B1000
heap
page read and write
4D5B000
direct allocation
page read and write
48B1000
heap
page read and write
1034000
heap
page read and write
48B1000
heap
page read and write
1180000
direct allocation
page read and write
C90000
unkown
page execute and read and write
4E90000
direct allocation
page execute and read and write
3EEE000
stack
page read and write
48B1000
heap
page read and write
FDE000
stack
page read and write
1034000
heap
page read and write
1034000
heap
page read and write
34AF000
stack
page read and write
1D1EE000
stack
page read and write
326E000
stack
page read and write
48B1000
heap
page read and write
39EE000
stack
page read and write
452E000
stack
page read and write
3EAF000
stack
page read and write
3AEF000
stack
page read and write
372F000
stack
page read and write
1034000
heap
page read and write
1034000
heap
page read and write
48B1000
heap
page read and write
35C000
stack
page read and write
476F000
stack
page read and write
4E90000
direct allocation
page execute and read and write
1034000
heap
page read and write
C91000
unkown
page execute and write copy
1180000
direct allocation
page read and write
700000
unkown
page read and write
1034000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
1034000
heap
page read and write
48B1000
heap
page read and write
1D492000
heap
page read and write
1034000
heap
page read and write
1034000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
48B1000
heap
page read and write
336F000
stack
page read and write
48B1000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
48B1000
heap
page read and write
3B0000
heap
page read and write
2B50000
direct allocation
page execute and read and write
2FAF000
stack
page read and write
849000
unkown
page execute and read and write
4E70000
direct allocation
page execute and read and write
3D6F000
stack
page read and write
48B1000
heap
page read and write
113F000
stack
page read and write
47AE000
stack
page read and write
1034000
heap
page read and write
48AF000
stack
page read and write
48B0000
heap
page read and write
83D000
unkown
page execute and read and write
48B1000
heap
page read and write
1034000
heap
page read and write
2EAE000
stack
page read and write
1034000
heap
page read and write
48C0000
heap
page read and write
48B1000
heap
page read and write
There are 226 hidden memdumps, click here to show them.