IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.php/
unknown
http://185.215.113.206/6c4adf523b719729.phpm%A
unknown
http://185.215.113.206/6c4adf523b719729.phpA%%
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5260000
direct allocation
page read and write
malicious
15DE000
heap
page read and write
malicious
811000
unkown
page execute and read and write
malicious
4DD1000
heap
page read and write
4DD1000
heap
page read and write
362E000
stack
page read and write
4DD1000
heap
page read and write
39EE000
stack
page read and write
44EF000
stack
page read and write
2F90000
direct allocation
page read and write
2F90000
direct allocation
page read and write
53EE000
stack
page read and write
3EAF000
stack
page read and write
476F000
stack
page read and write
F39000
unkown
page execute and read and write
1D71D000
stack
page read and write
2F80000
heap
page read and write
336F000
stack
page read and write
4DD1000
heap
page read and write
4DF0000
heap
page read and write
4DD1000
heap
page read and write
5400000
direct allocation
page execute and read and write
38AE000
stack
page read and write
4DD1000
heap
page read and write
D84000
unkown
page execute and read and write
53D0000
direct allocation
page execute and read and write
53E0000
direct allocation
page execute and read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
AE6000
unkown
page execute and read and write
1400000
heap
page read and write
163D000
heap
page read and write
4DD1000
heap
page read and write
148E000
stack
page read and write
452E000
stack
page read and write
1D1AF000
stack
page read and write
426F000
stack
page read and write
4B2F000
stack
page read and write
2FA0000
heap
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
35EF000
stack
page read and write
D61000
unkown
page execute and read and write
43ED000
stack
page read and write
4DD1000
heap
page read and write
466E000
stack
page read and write
4DD1000
heap
page read and write
4DD0000
heap
page read and write
42AE000
stack
page read and write
539F000
stack
page read and write
1636000
heap
page read and write
4DD1000
heap
page read and write
2F90000
direct allocation
page read and write
83C000
unkown
page execute and read and write
810000
unkown
page readonly
34EE000
stack
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
2FAB000
heap
page read and write
48AF000
stack
page read and write
4DD1000
heap
page read and write
39AF000
stack
page read and write
4DD1000
heap
page read and write
1D32E000
stack
page read and write
53E0000
direct allocation
page execute and read and write
4DD1000
heap
page read and write
462F000
stack
page read and write
529E000
stack
page read and write
4DD1000
heap
page read and write
4CAE000
stack
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
4DB0000
heap
page read and write
4DD1000
heap
page read and write
3C2F000
stack
page read and write
1D81C000
stack
page read and write
3DAE000
stack
page read and write
5260000
direct allocation
page read and write
1D6DD000
stack
page read and write
402E000
stack
page read and write
53B0000
direct allocation
page execute and read and write
4DD1000
heap
page read and write
1D58F000
stack
page read and write
4DD1000
heap
page read and write
2F90000
direct allocation
page read and write
D9A000
unkown
page execute and read and write
4DD1000
heap
page read and write
D8B000
unkown
page execute and read and write
4DD1000
heap
page read and write
4DE0000
heap
page read and write
4DD1000
heap
page read and write
2F90000
direct allocation
page read and write
53C0000
direct allocation
page execute and read and write
1440000
heap
page read and write
4DD1000
heap
page read and write
386F000
stack
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
810000
unkown
page read and write
2F90000
direct allocation
page read and write
372F000
stack
page read and write
15DA000
heap
page read and write
4DD1000
heap
page read and write
1D5DD000
stack
page read and write
1445000
heap
page read and write
1654000
heap
page read and write
1D9BF000
stack
page read and write
2F90000
direct allocation
page read and write
4DD1000
heap
page read and write
811000
unkown
page execute and write copy
30EF000
stack
page read and write
4DD1000
heap
page read and write
12F5000
stack
page read and write
4DD1000
heap
page read and write
97E000
unkown
page execute and read and write
53E0000
direct allocation
page execute and read and write
312B000
stack
page read and write
4DD1000
heap
page read and write
3C6E000
stack
page read and write
4DD1000
heap
page read and write
1D48E000
stack
page read and write
3D6F000
stack
page read and write
5410000
direct allocation
page execute and read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
D9B000
unkown
page execute and write copy
322F000
stack
page read and write
528B000
direct allocation
page read and write
12FE000
stack
page read and write
4DD1000
heap
page read and write
1D8BE000
stack
page read and write
4DD1000
heap
page read and write
412F000
stack
page read and write
2F90000
direct allocation
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
AFA000
unkown
page execute and read and write
4DD1000
heap
page read and write
2F90000
direct allocation
page read and write
D9A000
unkown
page execute and write copy
3EEE000
stack
page read and write
2F90000
direct allocation
page read and write
4DD1000
heap
page read and write
C83000
unkown
page execute and read and write
43AF000
stack
page read and write
53F0000
direct allocation
page execute and read and write
2F90000
direct allocation
page read and write
959000
unkown
page execute and read and write
15CE000
stack
page read and write
4DD1000
heap
page read and write
3AEF000
stack
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
F3A000
unkown
page execute and write copy
3B2E000
stack
page read and write
4B6E000
stack
page read and write
2F90000
direct allocation
page read and write
4DD1000
heap
page read and write
5210000
trusted library allocation
page read and write
4DAF000
stack
page read and write
2F90000
direct allocation
page read and write
47AE000
stack
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
FCC000
stack
page read and write
158E000
stack
page read and write
15D0000
heap
page read and write
2FEE000
stack
page read and write
4DD1000
heap
page read and write
1D42E000
stack
page read and write
49EF000
stack
page read and write
94D000
unkown
page execute and read and write
33AE000
stack
page read and write
4C6F000
stack
page read and write
4DD3000
heap
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
376E000
stack
page read and write
2FA7000
heap
page read and write
326E000
stack
page read and write
3FEF000
stack
page read and write
1D2EF000
stack
page read and write
1D9C0000
heap
page read and write
4DD1000
heap
page read and write
17CF000
stack
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
5260000
direct allocation
page read and write
34AF000
stack
page read and write
1623000
heap
page read and write
161F000
heap
page read and write
4DD1000
heap
page read and write
2F90000
direct allocation
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
416E000
stack
page read and write
4DD1000
heap
page read and write
1D1EE000
stack
page read and write
4DD1000
heap
page read and write
48EE000
stack
page read and write
4A2E000
stack
page read and write
4DD1000
heap
page read and write
1320000
heap
page read and write
4DD1000
heap
page read and write
There are 200 hidden memdumps, click here to show them.