IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.phpa
unknown
http://185.215.113.206/6c4adf523b719729.php/b
unknown
http://185.215.113.206/wKL
unknown
http://185.215.113.206/6c4adf523b719729.phpZ
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.206/6c4adf523b719729.php%
unknown
http://185.215.113.206/w
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5960000
direct allocation
page read and write
malicious
F11000
unkown
page execute and read and write
malicious
1D6E000
heap
page read and write
malicious
54D1000
heap
page read and write
1DA2E000
stack
page read and write
527E000
stack
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
17C5000
stack
page read and write
149B000
unkown
page execute and write copy
3E7E000
stack
page read and write
487E000
stack
page read and write
3AFF000
stack
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
1D5C000
stack
page read and write
F10000
unkown
page readonly
1DC6000
heap
page read and write
46FF000
stack
page read and write
4C3E000
stack
page read and write
149A000
unkown
page execute and read and write
54D1000
heap
page read and write
37C0000
heap
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
1BD0000
heap
page read and write
4D7E000
stack
page read and write
54C0000
direct allocation
page read and write
5960000
direct allocation
page read and write
1D68000
heap
page read and write
54C0000
direct allocation
page read and write
54C0000
direct allocation
page read and write
54D1000
heap
page read and write
54BF000
stack
page read and write
37F7000
heap
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
1D8EE000
stack
page read and write
523F000
stack
page read and write
54D1000
heap
page read and write
1B6E000
stack
page read and write
54D0000
heap
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
44BE000
stack
page read and write
1DB2000
heap
page read and write
107E000
unkown
page execute and read and write
599E000
stack
page read and write
5B10000
direct allocation
page execute and read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
4ABF000
stack
page read and write
598B000
direct allocation
page read and write
1E0BF000
stack
page read and write
1D1E000
stack
page read and write
373E000
stack
page read and write
3E3F000
stack
page read and write
54D1000
heap
page read and write
54C0000
direct allocation
page read and write
54D1000
heap
page read and write
37BE000
stack
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
54C0000
direct allocation
page read and write
54D1000
heap
page read and write
17CE000
stack
page read and write
1DCDD000
stack
page read and write
473E000
stack
page read and write
37F0000
heap
page read and write
1D8AF000
stack
page read and write
54D1000
heap
page read and write
40FE000
stack
page read and write
433F000
stack
page read and write
54D1000
heap
page read and write
1DF1E000
stack
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
5AB0000
direct allocation
page execute and read and write
1D60000
heap
page read and write
54D1000
heap
page read and write
40BF000
stack
page read and write
16CC000
stack
page read and write
3D3E000
stack
page read and write
54C0000
direct allocation
page read and write
5AF0000
direct allocation
page execute and read and write
148C000
unkown
page execute and read and write
1059000
unkown
page execute and read and write
50FF000
stack
page read and write
F11000
unkown
page execute and write copy
54D1000
heap
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
513E000
stack
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
1E0C0000
heap
page read and write
5AE0000
direct allocation
page execute and read and write
1CDE000
stack
page read and write
104D000
unkown
page execute and read and write
54D1000
heap
page read and write
1DE3000
heap
page read and write
1DC8F000
stack
page read and write
145D000
unkown
page execute and read and write
39FF000
stack
page read and write
54D1000
heap
page read and write
3CFF000
stack
page read and write
4EBE000
stack
page read and write
54C0000
direct allocation
page read and write
5A9F000
stack
page read and write
1DB8E000
stack
page read and write
437E000
stack
page read and write
11FA000
unkown
page execute and read and write
5910000
trusted library allocation
page read and write
54D1000
heap
page read and write
3F7E000
stack
page read and write
5AEE000
stack
page read and write
54D1000
heap
page read and write
497F000
stack
page read and write
4FFE000
stack
page read and write
5AE0000
direct allocation
page execute and read and write
447F000
stack
page read and write
49BE000
stack
page read and write
54C0000
direct allocation
page read and write
5AE0000
direct allocation
page execute and read and write
54D1000
heap
page read and write
423E000
stack
page read and write
54D1000
heap
page read and write
1A20000
heap
page read and write
54D1000
heap
page read and write
53BE000
stack
page read and write
54C0000
direct allocation
page read and write
54D1000
heap
page read and write
1638000
unkown
page execute and read and write
1DD3000
heap
page read and write
1D9EF000
stack
page read and write
54D1000
heap
page read and write
149A000
unkown
page execute and write copy
1B00000
heap
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
4D3F000
stack
page read and write
54D1000
heap
page read and write
1384000
unkown
page execute and read and write
38FF000
stack
page read and write
5AD0000
direct allocation
page execute and read and write
4E7F000
stack
page read and write
54D1000
heap
page read and write
11E6000
unkown
page execute and read and write
4AFE000
stack
page read and write
F10000
unkown
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
54C0000
direct allocation
page read and write
1482000
unkown
page execute and read and write
1DFBE000
stack
page read and write
1BD5000
heap
page read and write
54D1000
heap
page read and write
1F5E000
stack
page read and write
54C0000
direct allocation
page read and write
45BF000
stack
page read and write
37D0000
heap
page read and write
54D1000
heap
page read and write
54C0000
direct allocation
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
5B00000
direct allocation
page execute and read and write
45FE000
stack
page read and write
5AC0000
direct allocation
page execute and read and write
54D1000
heap
page read and write
54C0000
direct allocation
page read and write
537F000
stack
page read and write
F3C000
unkown
page execute and read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
1BAE000
stack
page read and write
1DB2F000
stack
page read and write
483F000
stack
page read and write
5960000
direct allocation
page read and write
54C0000
direct allocation
page read and write
1DDDC000
stack
page read and write
41FF000
stack
page read and write
4BFE000
stack
page read and write
3FBE000
stack
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
54D1000
heap
page read and write
1DE1D000
stack
page read and write
54D1000
heap
page read and write
3BFF000
stack
page read and write
54D1000
heap
page read and write
377E000
stack
page read and write
37FB000
heap
page read and write
4FBF000
stack
page read and write
There are 194 hidden memdumps, click here to show them.