IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/405117-2476756634-1003ge
unknown
http://185.215.113.206/6c4adf523b719729.php/
unknown
http://185.215.113.206/d?
unknown
http://185.215.113.206/6c4adf523b719729.phpeC
unknown
http://185.215.113.206/6c4adf523b719729.phpAC
unknown
http://185.215.113.206/$
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
CD1000
unkown
page execute and read and write
malicious
157E000
heap
page read and write
malicious
5190000
direct allocation
page read and write
malicious
1CFCE000
stack
page read and write
E19000
unkown
page execute and read and write
BE4000
heap
page read and write
4D11000
heap
page read and write
14FF000
stack
page read and write
BE4000
heap
page read and write
45CE000
stack
page read and write
13F4000
unkown
page execute and write copy
52F0000
direct allocation
page execute and read and write
1D8C2000
heap
page read and write
46CF000
stack
page read and write
1560000
direct allocation
page execute and read and write
3E4E000
stack
page read and write
4D11000
heap
page read and write
4D30000
heap
page read and write
123F000
unkown
page execute and read and write
52D0000
direct allocation
page execute and read and write
FA6000
unkown
page execute and read and write
4D11000
heap
page read and write
121D000
unkown
page execute and read and write
BE4000
heap
page read and write
BE4000
heap
page read and write
1D34E000
stack
page read and write
4D11000
heap
page read and write
BE4000
heap
page read and write
CC0000
direct allocation
page read and write
CD1000
unkown
page execute and write copy
3F8E000
stack
page read and write
430F000
stack
page read and write
4D11000
heap
page read and write
BE4000
heap
page read and write
1D8BE000
stack
page read and write
3050000
direct allocation
page execute and read and write
4D11000
heap
page read and write
1D7BE000
stack
page read and write
4D11000
heap
page read and write
3D0E000
stack
page read and write
4D11000
heap
page read and write
4D11000
heap
page read and write
BD0000
heap
page read and write
BE4000
heap
page read and write
358E000
stack
page read and write
BE4000
heap
page read and write
4D11000
heap
page read and write
484E000
stack
page read and write
37CF000
stack
page read and write
4D11000
heap
page read and write
BE4000
heap
page read and write
1D20F000
stack
page read and write
BE4000
heap
page read and write
4D11000
heap
page read and write
4D11000
heap
page read and write
BE4000
heap
page read and write
4D11000
heap
page read and write
4D11000
heap
page read and write
CFC000
unkown
page execute and read and write
3070000
direct allocation
page execute and read and write
CC0000
direct allocation
page read and write
3BCE000
stack
page read and write
4D20000
heap
page read and write
4E10000
trusted library allocation
page read and write
3060000
direct allocation
page execute and read and write
BE0000
heap
page read and write
13F3000
unkown
page execute and read and write
4D11000
heap
page read and write
BE4000
heap
page read and write
CD0000
unkown
page read and write
4D11000
heap
page read and write
4D11000
heap
page read and write
4A8F000
stack
page read and write
CC0000
direct allocation
page read and write
31CE000
stack
page read and write
4C0E000
stack
page read and write
4D11000
heap
page read and write
15DF000
heap
page read and write
C8E000
stack
page read and write
470E000
stack
page read and write
4D10000
heap
page read and write
BE4000
heap
page read and write
BE4000
heap
page read and write
51BB000
direct allocation
page read and write
3CCF000
stack
page read and write
CD0000
unkown
page readonly
444F000
stack
page read and write
354F000
stack
page read and write
113E000
unkown
page execute and read and write
CC0000
direct allocation
page read and write
1D8C0000
heap
page read and write
4D11000
heap
page read and write
1D38E000
stack
page read and write
3087000
heap
page read and write
BE4000
heap
page read and write
1550000
direct allocation
page read and write
BE4000
heap
page read and write
CC0000
direct allocation
page read and write
4D11000
heap
page read and write
4D11000
heap
page read and write
4D11000
heap
page read and write
420E000
stack
page read and write
448E000
stack
page read and write
BE4000
heap
page read and write
304B000
stack
page read and write
4D11000
heap
page read and write
4D11000
heap
page read and write
4D11000
heap
page read and write
176F000
stack
page read and write
4D11000
heap
page read and write
BE4000
heap
page read and write
1D48F000
stack
page read and write
4D11000
heap
page read and write
40CE000
stack
page read and write
CC0000
direct allocation
page read and write
1D71C000
stack
page read and write
380E000
stack
page read and write
CC0000
direct allocation
page read and write
3B8F000
stack
page read and write
3A4F000
stack
page read and write
1D4DD000
stack
page read and write
3E0F000
stack
page read and write
32CF000
stack
page read and write
1257000
unkown
page execute and write copy
340F000
stack
page read and write
4D11000
heap
page read and write
BE4000
heap
page read and write
CC0000
direct allocation
page read and write
BE4000
heap
page read and write
4BCF000
stack
page read and write
1249000
unkown
page execute and read and write
1257000
unkown
page execute and read and write
79C000
stack
page read and write
E0D000
unkown
page execute and read and write
4D11000
heap
page read and write
BE4000
heap
page read and write
CB0000
heap
page read and write
15BD000
heap
page read and write
BE4000
heap
page read and write
15D8000
heap
page read and write
1D10E000
stack
page read and write
4D11000
heap
page read and write
BE4000
heap
page read and write
408F000
stack
page read and write
4D11000
heap
page read and write
4D11000
heap
page read and write
BE4000
heap
page read and write
7F0000
heap
page read and write
153E000
stack
page read and write
E3E000
unkown
page execute and read and write
4D11000
heap
page read and write
4ACE000
stack
page read and write
4D11000
heap
page read and write
4D11000
heap
page read and write
BE4000
heap
page read and write
4D11000
heap
page read and write
BE4000
heap
page read and write
4D11000
heap
page read and write
4D11000
heap
page read and write
51CE000
stack
page read and write
3080000
heap
page read and write
AFE000
stack
page read and write
BE4000
heap
page read and write
3070000
direct allocation
page execute and read and write
BE4000
heap
page read and write
BE4000
heap
page read and write
4D11000
heap
page read and write
36CE000
stack
page read and write
4D11000
heap
page read and write
494F000
stack
page read and write
4D11000
heap
page read and write
4D11000
heap
page read and write
15C2000
heap
page read and write
318F000
stack
page read and write
BE4000
heap
page read and write
1258000
unkown
page execute and write copy
4D11000
heap
page read and write
4D11000
heap
page read and write
3F4F000
stack
page read and write
4D11000
heap
page read and write
52E0000
direct allocation
page execute and read and write
1D0CF000
stack
page read and write
4D11000
heap
page read and write
BE4000
heap
page read and write
15F3000
heap
page read and write
BE4000
heap
page read and write
3060000
heap
page read and write
344E000
stack
page read and write
330E000
stack
page read and write
BE4000
heap
page read and write
4D11000
heap
page read and write
4D11000
heap
page read and write
AF5000
stack
page read and write
1D5DD000
stack
page read and write
4D11000
heap
page read and write
480F000
stack
page read and write
4D11000
heap
page read and write
308B000
heap
page read and write
CC0000
direct allocation
page read and write
1D24E000
stack
page read and write
FBA000
unkown
page execute and read and write
BE4000
heap
page read and write
4D11000
heap
page read and write
458F000
stack
page read and write
157A000
heap
page read and write
4D11000
heap
page read and write
C4E000
stack
page read and write
CC0000
direct allocation
page read and write
3070000
direct allocation
page execute and read and write
BE4000
heap
page read and write
41CF000
stack
page read and write
4D11000
heap
page read and write
4D11000
heap
page read and write
3A8E000
stack
page read and write
368F000
stack
page read and write
BE4000
heap
page read and write
4D11000
heap
page read and write
390F000
stack
page read and write
4D11000
heap
page read and write
CC0000
direct allocation
page read and write
1570000
heap
page read and write
300F000
stack
page read and write
394E000
stack
page read and write
1550000
direct allocation
page read and write
4D11000
heap
page read and write
52CF000
stack
page read and write
434E000
stack
page read and write
4D0F000
stack
page read and write
4D11000
heap
page read and write
CC0000
direct allocation
page read and write
CC0000
direct allocation
page read and write
BE4000
heap
page read and write
1D61D000
stack
page read and write
4D11000
heap
page read and write
CC0000
direct allocation
page read and write
498E000
stack
page read and write
There are 226 hidden memdumps, click here to show them.