IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.php#
unknown
http://185.215.113.206/6c4adf523b719729.php=YV
unknown
http://185.215.113.206/6c4adf523b719729.php?
unknown
http://185.215.113.206/.IE5
unknown
http://185.215.113.206/2O
unknown
http://185.215.113.206/6c4adf523b719729.phpZ
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.206/aO
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5290000
direct allocation
page read and write
malicious
163E000
heap
page read and write
malicious
7B1000
unkown
page execute and read and write
malicious
4E11000
heap
page read and write
33CF000
stack
page read and write
4E11000
heap
page read and write
354E000
stack
page read and write
1444000
heap
page read and write
1D90E000
stack
page read and write
5270000
heap
page read and write
13EE000
stack
page read and write
163A000
heap
page read and write
4E11000
heap
page read and write
D2E000
unkown
page execute and write copy
1D11E000
stack
page read and write
4E11000
heap
page read and write
3180000
heap
page read and write
A9A000
unkown
page execute and read and write
454F000
stack
page read and write
4E10000
heap
page read and write
4E11000
heap
page read and write
1444000
heap
page read and write
4E11000
heap
page read and write
4E11000
heap
page read and write
3160000
direct allocation
page read and write
4E11000
heap
page read and write
4BCE000
stack
page read and write
5400000
direct allocation
page execute and read and write
1D4EE000
stack
page read and write
1444000
heap
page read and write
D2E000
unkown
page execute and read and write
368E000
stack
page read and write
1699000
heap
page read and write
182E000
stack
page read and write
3B8E000
stack
page read and write
1444000
heap
page read and write
318B000
heap
page read and write
1334000
stack
page read and write
494E000
stack
page read and write
4E11000
heap
page read and write
418F000
stack
page read and write
1444000
heap
page read and write
408E000
stack
page read and write
458E000
stack
page read and write
1444000
heap
page read and write
47CF000
stack
page read and write
3160000
direct allocation
page read and write
4E11000
heap
page read and write
1444000
heap
page read and write
4E20000
heap
page read and write
7B0000
unkown
page read and write
404F000
stack
page read and write
7B0000
unkown
page readonly
4E11000
heap
page read and write
1440000
heap
page read and write
3150000
heap
page read and write
16B7000
heap
page read and write
314B000
stack
page read and write
1444000
heap
page read and write
1444000
heap
page read and write
D2F000
unkown
page execute and write copy
1D72E000
stack
page read and write
1444000
heap
page read and write
1444000
heap
page read and write
37CE000
stack
page read and write
1444000
heap
page read and write
3F4E000
stack
page read and write
1D86C000
stack
page read and write
1444000
heap
page read and write
4E11000
heap
page read and write
4E11000
heap
page read and write
350F000
stack
page read and write
1D62D000
stack
page read and write
3160000
direct allocation
page read and write
4E11000
heap
page read and write
46CE000
stack
page read and write
3DCF000
stack
page read and write
4E11000
heap
page read and write
38CF000
stack
page read and write
4E11000
heap
page read and write
52BB000
direct allocation
page read and write
430E000
stack
page read and write
4E11000
heap
page read and write
3160000
direct allocation
page read and write
4E11000
heap
page read and write
1D76E000
stack
page read and write
4E11000
heap
page read and write
1444000
heap
page read and write
1444000
heap
page read and write
4E11000
heap
page read and write
1444000
heap
page read and write
53E0000
direct allocation
page execute and read and write
EC3000
unkown
page execute and read and write
142E000
stack
page read and write
1444000
heap
page read and write
4E11000
heap
page read and write
378F000
stack
page read and write
4E11000
heap
page read and write
4E11000
heap
page read and write
16A6000
heap
page read and write
1D25E000
stack
page read and write
3160000
direct allocation
page read and write
41CE000
stack
page read and write
340E000
stack
page read and write
8ED000
unkown
page execute and read and write
3160000
direct allocation
page read and write
4E11000
heap
page read and write
C1B000
unkown
page execute and read and write
1444000
heap
page read and write
300E000
stack
page read and write
3160000
direct allocation
page read and write
3160000
direct allocation
page read and write
5430000
direct allocation
page execute and read and write
EC4000
unkown
page execute and write copy
1444000
heap
page read and write
5410000
direct allocation
page execute and read and write
4A4F000
stack
page read and write
1370000
heap
page read and write
4A8E000
stack
page read and write
4E11000
heap
page read and write
4E11000
heap
page read and write
4CCF000
stack
page read and write
3160000
direct allocation
page read and write
3160000
direct allocation
page read and write
7B1000
unkown
page execute and write copy
4E11000
heap
page read and write
4E11000
heap
page read and write
4E11000
heap
page read and write
5440000
direct allocation
page execute and read and write
4E11000
heap
page read and write
3B4F000
stack
page read and write
4E11000
heap
page read and write
3F0F000
stack
page read and write
53CF000
stack
page read and write
4E11000
heap
page read and write
CF2000
unkown
page execute and read and write
4E11000
heap
page read and write
3187000
heap
page read and write
444E000
stack
page read and write
42CF000
stack
page read and write
5420000
direct allocation
page execute and read and write
1D35F000
stack
page read and write
4E11000
heap
page read and write
133E000
stack
page read and write
1444000
heap
page read and write
1444000
heap
page read and write
3160000
direct allocation
page read and write
3160000
direct allocation
page read and write
4B8F000
stack
page read and write
4E11000
heap
page read and write
4E11000
heap
page read and write
1444000
heap
page read and write
4E11000
heap
page read and write
1D49F000
stack
page read and write
4E11000
heap
page read and write
1444000
heap
page read and write
4E11000
heap
page read and write
4E11000
heap
page read and write
4E11000
heap
page read and write
4E30000
heap
page read and write
4E11000
heap
page read and write
1444000
heap
page read and write
3E0E000
stack
page read and write
1444000
heap
page read and write
1444000
heap
page read and write
468F000
stack
page read and write
4E11000
heap
page read and write
91E000
unkown
page execute and read and write
3160000
direct allocation
page read and write
8F9000
unkown
page execute and read and write
1D21F000
stack
page read and write
480E000
stack
page read and write
1444000
heap
page read and write
D17000
unkown
page execute and read and write
1DA10000
heap
page read and write
4E11000
heap
page read and write
4E11000
heap
page read and write
1444000
heap
page read and write
4E11000
heap
page read and write
16BD000
heap
page read and write
3CCE000
stack
page read and write
1D5EF000
stack
page read and write
161F000
stack
page read and write
1444000
heap
page read and write
1444000
heap
page read and write
3A4E000
stack
page read and write
4E11000
heap
page read and write
52CB000
stack
page read and write
D1F000
unkown
page execute and read and write
4E11000
heap
page read and write
4E11000
heap
page read and write
4E11000
heap
page read and write
4D0E000
stack
page read and write
5410000
direct allocation
page execute and read and write
1380000
heap
page read and write
4E11000
heap
page read and write
4E11000
heap
page read and write
390E000
stack
page read and write
4E11000
heap
page read and write
440F000
stack
page read and write
5290000
direct allocation
page read and write
490F000
stack
page read and write
364F000
stack
page read and write
3160000
direct allocation
page read and write
4E11000
heap
page read and write
328F000
stack
page read and write
1444000
heap
page read and write
1444000
heap
page read and write
4E11000
heap
page read and write
4E11000
heap
page read and write
1444000
heap
page read and write
310F000
stack
page read and write
3A0F000
stack
page read and write
4E11000
heap
page read and write
1D39D000
stack
page read and write
1444000
heap
page read and write
32CE000
stack
page read and write
1630000
heap
page read and write
4E11000
heap
page read and write
123C000
stack
page read and write
5410000
direct allocation
page execute and read and write
4E11000
heap
page read and write
1444000
heap
page read and write
1444000
heap
page read and write
4E11000
heap
page read and write
4E0F000
stack
page read and write
3C8F000
stack
page read and write
1682000
heap
page read and write
1DA0F000
stack
page read and write
4E11000
heap
page read and write
5250000
trusted library allocation
page read and write
1444000
heap
page read and write
7DC000
unkown
page execute and read and write
5290000
direct allocation
page read and write
53F0000
direct allocation
page execute and read and write
4E11000
heap
page read and write
A86000
unkown
page execute and read and write
There are 227 hidden memdumps, click here to show them.