IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.php/2
unknown
http://185.215.113.206/6c4adf523b719729.php3
unknown
http://185.215.113.206/6c4adf523b719729.php.
unknown
http://185.215.113.206/6c4adf523b719729.php/
unknown
http://185.215.113.206/:U
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
BA1000
unkown
page execute and read and write
malicious
52D0000
direct allocation
page read and write
malicious
12EE000
heap
page read and write
malicious
4E51000
heap
page read and write
4E4F000
stack
page read and write
B80000
direct allocation
page read and write
AF4000
heap
page read and write
AF4000
heap
page read and write
8EC000
stack
page read and write
B80000
direct allocation
page read and write
AF4000
heap
page read and write
AF4000
heap
page read and write
B7E000
stack
page read and write
3E4E000
stack
page read and write
12E0000
heap
page read and write
498E000
stack
page read and write
5290000
heap
page read and write
5420000
direct allocation
page execute and read and write
324B000
heap
page read and write
BA1000
unkown
page execute and write copy
AF4000
heap
page read and write
1365000
heap
page read and write
3A4F000
stack
page read and write
17CE000
stack
page read and write
4E51000
heap
page read and write
1D38E000
stack
page read and write
3B8F000
stack
page read and write
B80000
direct allocation
page read and write
AF4000
heap
page read and write
408F000
stack
page read and write
AF4000
heap
page read and write
37CF000
stack
page read and write
B80000
direct allocation
page read and write
4E60000
heap
page read and write
AF4000
heap
page read and write
46CF000
stack
page read and write
AF4000
heap
page read and write
1DA00000
heap
page read and write
AF4000
heap
page read and write
4E51000
heap
page read and write
3F8E000
stack
page read and write
BCC000
unkown
page execute and read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
B3E000
stack
page read and write
3E0F000
stack
page read and write
12EA000
heap
page read and write
4E51000
heap
page read and write
AF4000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
BA0000
unkown
page read and write
45CE000
stack
page read and write
3230000
direct allocation
page execute and read and write
AF4000
heap
page read and write
52FB000
direct allocation
page read and write
430F000
stack
page read and write
4E51000
heap
page read and write
CE9000
unkown
page execute and read and write
AF4000
heap
page read and write
4E51000
heap
page read and write
36CE000
stack
page read and write
3A8E000
stack
page read and write
B80000
direct allocation
page read and write
12B3000
unkown
page execute and write copy
4E51000
heap
page read and write
1D61D000
stack
page read and write
4A8F000
stack
page read and write
12B2000
unkown
page execute and read and write
4E51000
heap
page read and write
AF0000
heap
page read and write
BA0000
unkown
page readonly
3CCF000
stack
page read and write
AF4000
heap
page read and write
4E51000
heap
page read and write
1D10E000
stack
page read and write
E76000
unkown
page execute and read and write
420E000
stack
page read and write
1D75E000
stack
page read and write
18CF000
stack
page read and write
12D0000
direct allocation
page execute and read and write
D0E000
unkown
page execute and read and write
4E51000
heap
page read and write
AF4000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
394E000
stack
page read and write
4E51000
heap
page read and write
4E70000
heap
page read and write
4E51000
heap
page read and write
ABE000
stack
page read and write
13F0000
direct allocation
page execute and read and write
5410000
direct allocation
page execute and read and write
4E51000
heap
page read and write
AF4000
heap
page read and write
1D20F000
stack
page read and write
4E51000
heap
page read and write
AF4000
heap
page read and write
354F000
stack
page read and write
3D0E000
stack
page read and write
358E000
stack
page read and write
3BCE000
stack
page read and write
444F000
stack
page read and write
4D4E000
stack
page read and write
4BCF000
stack
page read and write
AF4000
heap
page read and write
4E51000
heap
page read and write
AF4000
heap
page read and write
9EE000
stack
page read and write
41CF000
stack
page read and write
AF4000
heap
page read and write
12C0000
direct allocation
page read and write
111D000
unkown
page execute and read and write
31EE000
stack
page read and write
AF4000
heap
page read and write
344F000
stack
page read and write
AF4000
heap
page read and write
4E51000
heap
page read and write
3230000
direct allocation
page execute and read and write
CDD000
unkown
page execute and read and write
458F000
stack
page read and write
5430000
direct allocation
page execute and read and write
322E000
stack
page read and write
4E51000
heap
page read and write
AF4000
heap
page read and write
40CE000
stack
page read and write
B80000
direct allocation
page read and write
1D48F000
stack
page read and write
134A000
heap
page read and write
390F000
stack
page read and write
AF4000
heap
page read and write
1333000
heap
page read and write
3247000
heap
page read and write
AF4000
heap
page read and write
4E67000
heap
page read and write
434E000
stack
page read and write
448D000
stack
page read and write
AF4000
heap
page read and write
AF4000
heap
page read and write
4E51000
heap
page read and write
E8A000
unkown
page execute and read and write
4D0F000
stack
page read and write
1D24E000
stack
page read and write
AF4000
heap
page read and write
B80000
direct allocation
page read and write
316F000
stack
page read and write
4E51000
heap
page read and write
B80000
direct allocation
page read and write
1D8FE000
stack
page read and write
AE0000
heap
page read and write
4E51000
heap
page read and write
1355000
heap
page read and write
1D5CF000
stack
page read and write
110D000
unkown
page execute and read and write
B80000
direct allocation
page read and write
470E000
stack
page read and write
1107000
unkown
page execute and read and write
3240000
heap
page read and write
AF4000
heap
page read and write
A50000
heap
page read and write
B80000
direct allocation
page read and write
484E000
stack
page read and write
368F000
stack
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
13E0000
direct allocation
page execute and read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
AF4000
heap
page read and write
4E51000
heap
page read and write
1D9FF000
stack
page read and write
4E51000
heap
page read and write
3230000
direct allocation
page execute and read and write
4E51000
heap
page read and write
AF4000
heap
page read and write
4ACE000
stack
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
12C0000
direct allocation
page read and write
B80000
direct allocation
page read and write
1D4CE000
stack
page read and write
4C0E000
stack
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
B80000
direct allocation
page read and write
3F4F000
stack
page read and write
4E50000
heap
page read and write
B80000
direct allocation
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
530E000
stack
page read and write
AF4000
heap
page read and write
AF4000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
AF4000
heap
page read and write
10E1000
unkown
page execute and read and write
1D34F000
stack
page read and write
A40000
heap
page read and write
1D71D000
stack
page read and write
4E51000
heap
page read and write
380E000
stack
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
111E000
unkown
page execute and write copy
9E5000
stack
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
5290000
trusted library allocation
page read and write
B80000
direct allocation
page read and write
494F000
stack
page read and write
AF4000
heap
page read and write
1D85D000
stack
page read and write
480F000
stack
page read and write
1371000
heap
page read and write
31AC000
stack
page read and write
AF4000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
111D000
unkown
page execute and write copy
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
AF4000
heap
page read and write
540F000
stack
page read and write
1007000
unkown
page execute and read and write
4E51000
heap
page read and write
4E51000
heap
page read and write
334F000
stack
page read and write
There are 225 hidden memdumps, click here to show them.