IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.php/%
unknown
http://185.215.113.206$P
unknown
http://185.215.113.206G
unknown
http://185.215.113.206/6c4adf523b719729.php7)
unknown
http://185.215.113.206/6c4adf523b719729.phpG
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4B50000
direct allocation
page read and write
malicious
D2E000
heap
page read and write
malicious
D1000
unkown
page execute and read and write
malicious
46C1000
heap
page read and write
46C1000
heap
page read and write
CBE000
stack
page read and write
C74000
heap
page read and write
41AF000
stack
page read and write
1D02D000
stack
page read and write
C74000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
46C1000
heap
page read and write
46D0000
heap
page read and write
C74000
heap
page read and write
D75000
heap
page read and write
46C1000
heap
page read and write
46C1000
heap
page read and write
1CE9F000
stack
page read and write
42EF000
stack
page read and write
1CEEE000
stack
page read and write
46C1000
heap
page read and write
46C1000
heap
page read and write
C74000
heap
page read and write
2B2F000
stack
page read and write
C74000
heap
page read and write
659000
unkown
page execute and write copy
46C1000
heap
page read and write
46C1000
heap
page read and write
C74000
heap
page read and write
302F000
stack
page read and write
392E000
stack
page read and write
23E000
unkown
page execute and read and write
C74000
heap
page read and write
366F000
stack
page read and write
47C0000
trusted library allocation
page read and write
32EE000
stack
page read and write
C74000
heap
page read and write
4C8F000
stack
page read and write
20D000
unkown
page execute and read and write
356E000
stack
page read and write
46C1000
heap
page read and write
1C9DE000
stack
page read and write
46C1000
heap
page read and write
342E000
stack
page read and write
4B7B000
direct allocation
page read and write
46C1000
heap
page read and write
C74000
heap
page read and write
9D5000
stack
page read and write
46C1000
heap
page read and write
46B0000
direct allocation
page read and write
D87000
heap
page read and write
46AF000
stack
page read and write
46C1000
heap
page read and write
46C1000
heap
page read and write
46C1000
heap
page read and write
658000
unkown
page execute and write copy
D0000
unkown
page read and write
3A2F000
stack
page read and write
1CC5E000
stack
page read and write
46C1000
heap
page read and write
2C6F000
stack
page read and write
46C1000
heap
page read and write
FEF000
stack
page read and write
46C1000
heap
page read and write
FC000
unkown
page execute and read and write
46C1000
heap
page read and write
C74000
heap
page read and write
1CADF000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
219000
unkown
page execute and read and write
37EE000
stack
page read and write
2B6E000
stack
page read and write
46C1000
heap
page read and write
46B0000
direct allocation
page read and write
2DAF000
stack
page read and write
3DEF000
stack
page read and write
3CEE000
stack
page read and write
C74000
heap
page read and write
C74000
heap
page read and write
C74000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
46C1000
heap
page read and write
2927000
heap
page read and write
46B0000
direct allocation
page read and write
316F000
stack
page read and write
3A6E000
stack
page read and write
46C1000
heap
page read and write
46B0000
direct allocation
page read and write
46C1000
heap
page read and write
306E000
stack
page read and write
C74000
heap
page read and write
46C1000
heap
page read and write
7F7000
unkown
page execute and read and write
3F6E000
stack
page read and write
4B50000
direct allocation
page read and write
446E000
stack
page read and write
3E2E000
stack
page read and write
D97000
heap
page read and write
D1000
unkown
page execute and write copy
4B30000
heap
page read and write
41EE000
stack
page read and write
46D5000
heap
page read and write
1CFED000
stack
page read and write
46C1000
heap
page read and write
46B0000
direct allocation
page read and write
33EF000
stack
page read and write
46C1000
heap
page read and write
46C1000
heap
page read and write
C74000
heap
page read and write
46C1000
heap
page read and write
3F2F000
stack
page read and write
45AE000
stack
page read and write
46C1000
heap
page read and write
2910000
heap
page read and write
38EF000
stack
page read and write
46C1000
heap
page read and write
46B0000
direct allocation
page read and write
31AE000
stack
page read and write
2DEE000
stack
page read and write
37AF000
stack
page read and write
649000
unkown
page execute and read and write
4CF0000
direct allocation
page execute and read and write
DAC000
heap
page read and write
C74000
heap
page read and write
1CB1E000
stack
page read and write
352F000
stack
page read and write
C74000
heap
page read and write
C74000
heap
page read and write
3BAE000
stack
page read and write
36AE000
stack
page read and write
1CD9E000
stack
page read and write
2EEF000
stack
page read and write
4B8E000
stack
page read and write
2CAE000
stack
page read and write
442F000
stack
page read and write
C74000
heap
page read and write
C74000
heap
page read and write
46C1000
heap
page read and write
46C1000
heap
page read and write
46C1000
heap
page read and write
46C1000
heap
page read and write
46B0000
direct allocation
page read and write
3B6F000
stack
page read and write
456F000
stack
page read and write
C74000
heap
page read and write
C74000
heap
page read and write
620000
unkown
page execute and read and write
1CD5F000
stack
page read and write
46B0000
direct allocation
page read and write
642000
unkown
page execute and read and write
46C1000
heap
page read and write
46C1000
heap
page read and write
28CE000
stack
page read and write
658000
unkown
page execute and read and write
3A6000
unkown
page execute and read and write
46B0000
direct allocation
page read and write
46C1000
heap
page read and write
C74000
heap
page read and write
46C1000
heap
page read and write
2920000
heap
page read and write
46C1000
heap
page read and write
C74000
heap
page read and write
3CAF000
stack
page read and write
46C1000
heap
page read and write
46B0000
direct allocation
page read and write
46C1000
heap
page read and write
C74000
heap
page read and write
C74000
heap
page read and write
1D12E000
stack
page read and write
D0000
unkown
page readonly
2F2E000
stack
page read and write
290B000
stack
page read and write
9DE000
stack
page read and write
C74000
heap
page read and write
D28000
heap
page read and write
4D00000
direct allocation
page execute and read and write
C74000
heap
page read and write
8DC000
stack
page read and write
46B0000
direct allocation
page read and write
46B0000
direct allocation
page read and write
46C1000
heap
page read and write
46C1000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
46C1000
heap
page read and write
C74000
heap
page read and write
46C1000
heap
page read and write
46C1000
heap
page read and write
544000
unkown
page execute and read and write
2A2F000
stack
page read and write
292B000
heap
page read and write
CFE000
stack
page read and write
4B50000
direct allocation
page read and write
46C1000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
46B0000
direct allocation
page read and write
3BA000
unkown
page execute and read and write
46C1000
heap
page read and write
432E000
stack
page read and write
46C1000
heap
page read and write
46B0000
direct allocation
page read and write
46C1000
heap
page read and write
7F8000
unkown
page execute and write copy
46C1000
heap
page read and write
C74000
heap
page read and write
46C1000
heap
page read and write
40AE000
stack
page read and write
C74000
heap
page read and write
C30000
heap
page read and write
46C1000
heap
page read and write
C74000
heap
page read and write
46C1000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
4CD0000
direct allocation
page execute and read and write
C70000
heap
page read and write
C74000
heap
page read and write
46C1000
heap
page read and write
C40000
heap
page read and write
32AF000
stack
page read and write
C74000
heap
page read and write
46C1000
heap
page read and write
1CC1F000
stack
page read and write
C74000
heap
page read and write
406F000
stack
page read and write
DA4000
heap
page read and write
C74000
heap
page read and write
46C1000
heap
page read and write
46C0000
heap
page read and write
46C1000
heap
page read and write
C74000
heap
page read and write
46E0000
heap
page read and write
D20000
heap
page read and write
10EF000
stack
page read and write
46C1000
heap
page read and write
There are 223 hidden memdumps, click here to show them.