IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.php/
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.206/6c4adf523b719729.phpu
unknown
http://185.215.113.206X
unknown
http://185.215.113.206/e
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
145E000
heap
page read and write
malicious
50E0000
direct allocation
page read and write
malicious
6B1000
unkown
page execute and read and write
malicious
50E0000
direct allocation
page read and write
12A4000
heap
page read and write
12A4000
heap
page read and write
131E000
stack
page read and write
389E000
stack
page read and write
141F000
stack
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
12A4000
heap
page read and write
4C61000
heap
page read and write
C1F000
unkown
page execute and read and write
12A4000
heap
page read and write
4C61000
heap
page read and write
43DE000
stack
page read and write
4C61000
heap
page read and write
4D60000
trusted library allocation
page read and write
12A4000
heap
page read and write
2F70000
direct allocation
page read and write
12A4000
heap
page read and write
4C61000
heap
page read and write
DD3000
unkown
page execute and write copy
2F70000
direct allocation
page read and write
12A4000
heap
page read and write
4B5E000
stack
page read and write
465E000
stack
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
12A4000
heap
page read and write
4C61000
heap
page read and write
371F000
stack
page read and write
14DA000
heap
page read and write
12A4000
heap
page read and write
1CF6E000
stack
page read and write
2F70000
direct allocation
page read and write
4C61000
heap
page read and write
12A4000
heap
page read and write
39DE000
stack
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
5260000
direct allocation
page execute and read and write
12A4000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
3D9E000
stack
page read and write
5270000
direct allocation
page execute and read and write
4C61000
heap
page read and write
415E000
stack
page read and write
4C61000
heap
page read and write
6B0000
unkown
page readonly
4C61000
heap
page read and write
375E000
stack
page read and write
3EDE000
stack
page read and write
B1C000
unkown
page execute and read and write
1D0AE000
stack
page read and write
6B1000
unkown
page execute and write copy
12A4000
heap
page read and write
4C61000
heap
page read and write
1440000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
12A4000
heap
page read and write
439F000
stack
page read and write
14B7000
heap
page read and write
510B000
direct allocation
page read and write
6DC000
unkown
page execute and read and write
34DE000
stack
page read and write
4C5F000
stack
page read and write
4C61000
heap
page read and write
399F000
stack
page read and write
12A4000
heap
page read and write
2F70000
direct allocation
page read and write
986000
unkown
page execute and read and write
2F70000
direct allocation
page read and write
5230000
direct allocation
page execute and read and write
35DF000
stack
page read and write
2F70000
direct allocation
page read and write
4C61000
heap
page read and write
12A0000
heap
page read and write
2F70000
direct allocation
page read and write
4C61000
heap
page read and write
2FDB000
stack
page read and write
2E6E000
stack
page read and write
4C61000
heap
page read and write
12A4000
heap
page read and write
4C61000
heap
page read and write
12A4000
heap
page read and write
5260000
direct allocation
page execute and read and write
12A4000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
7F9000
unkown
page execute and read and write
C37000
unkown
page execute and read and write
7ED000
unkown
page execute and read and write
5250000
direct allocation
page execute and read and write
30DF000
stack
page read and write
411F000
stack
page read and write
4C61000
heap
page read and write
49DF000
stack
page read and write
1D5BD000
stack
page read and write
12A4000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
521F000
stack
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
12A4000
heap
page read and write
3B1E000
stack
page read and write
361E000
stack
page read and write
158E000
stack
page read and write
12A4000
heap
page read and write
451E000
stack
page read and write
11C0000
heap
page read and write
12B0000
heap
page read and write
12A4000
heap
page read and write
12A4000
heap
page read and write
4C61000
heap
page read and write
1D42F000
stack
page read and write
4C61000
heap
page read and write
2F70000
direct allocation
page read and write
12A4000
heap
page read and write
461F000
stack
page read and write
425F000
stack
page read and write
3ADF000
stack
page read and write
1D1EE000
stack
page read and write
5240000
direct allocation
page execute and read and write
BFA000
unkown
page execute and read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
3C1F000
stack
page read and write
2F90000
heap
page read and write
1458000
heap
page read and write
4C61000
heap
page read and write
335F000
stack
page read and write
325E000
stack
page read and write
12A4000
heap
page read and write
479E000
stack
page read and write
4C80000
heap
page read and write
44DF000
stack
page read and write
2F70000
direct allocation
page read and write
321F000
stack
page read and write
4A1E000
stack
page read and write
81E000
unkown
page execute and read and write
4C61000
heap
page read and write
3FDF000
stack
page read and write
401E000
stack
page read and write
50C0000
heap
page read and write
4C61000
heap
page read and write
2F70000
direct allocation
page read and write
168E000
stack
page read and write
12A4000
heap
page read and write
511E000
stack
page read and write
1D06F000
stack
page read and write
4C61000
heap
page read and write
311E000
stack
page read and write
C29000
unkown
page execute and read and write
4C61000
heap
page read and write
1164000
stack
page read and write
4C60000
heap
page read and write
3E9F000
stack
page read and write
106C000
stack
page read and write
1450000
heap
page read and write
4C61000
heap
page read and write
3D5F000
stack
page read and write
4C61000
heap
page read and write
2F70000
direct allocation
page read and write
349F000
stack
page read and write
4C61000
heap
page read and write
50E0000
direct allocation
page read and write
4C61000
heap
page read and write
475F000
stack
page read and write
4C61000
heap
page read and write
12A4000
heap
page read and write
12A4000
heap
page read and write
4C61000
heap
page read and write
DD2000
unkown
page execute and read and write
2F9B000
heap
page read and write
1D57D000
stack
page read and write
4C61000
heap
page read and write
12A4000
heap
page read and write
4C61000
heap
page read and write
12A4000
heap
page read and write
2F97000
heap
page read and write
116E000
stack
page read and write
4C61000
heap
page read and write
1D2EF000
stack
page read and write
2F6F000
stack
page read and write
99A000
unkown
page execute and read and write
429E000
stack
page read and write
4C70000
heap
page read and write
6B0000
unkown
page read and write
4C61000
heap
page read and write
4B1F000
stack
page read and write
2F70000
direct allocation
page read and write
489F000
stack
page read and write
385F000
stack
page read and write
12A4000
heap
page read and write
2F70000
direct allocation
page read and write
5280000
direct allocation
page execute and read and write
2F70000
direct allocation
page read and write
12A4000
heap
page read and write
5260000
direct allocation
page execute and read and write
5290000
direct allocation
page execute and read and write
12A4000
heap
page read and write
12A4000
heap
page read and write
12A4000
heap
page read and write
48DE000
stack
page read and write
1D32E000
stack
page read and write
4C61000
heap
page read and write
C38000
unkown
page execute and write copy
C37000
unkown
page execute and write copy
12A4000
heap
page read and write
4C61000
heap
page read and write
1D47D000
stack
page read and write
14A3000
heap
page read and write
4C61000
heap
page read and write
339E000
stack
page read and write
14D1000
heap
page read and write
12A4000
heap
page read and write
1D1AF000
stack
page read and write
3C5E000
stack
page read and write
12A4000
heap
page read and write
1D6BC000
stack
page read and write
There are 221 hidden memdumps, click here to show them.