IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.phpQD
unknown
http://185.215.113.206/6c4adf523b719729.phpID
unknown
http://185.215.113.206/6c4adf523b719729.phpJ
unknown
http://185.215.113.206/6c4adf523b719729.phpft
unknown
http://185.215.113.206/6c4adf523b719729.php//
unknown
http://185.215.113.206/6c4adf523b719729.phpLMEM
unknown
http://185.215.113.206/sonation
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
A31000
unkown
page execute and read and write
malicious
4E10000
direct allocation
page read and write
malicious
12FE000
heap
page read and write
malicious
4991000
heap
page read and write
438E000
stack
page read and write
384E000
stack
page read and write
3E4F000
stack
page read and write
4991000
heap
page read and write
4991000
heap
page read and write
2F8F000
stack
page read and write
8B4000
heap
page read and write
4991000
heap
page read and write
A20000
direct allocation
page read and write
8B4000
heap
page read and write
8B4000
heap
page read and write
8B4000
heap
page read and write
A31000
unkown
page execute and write copy
460E000
stack
page read and write
A20000
direct allocation
page read and write
4991000
heap
page read and write
8B4000
heap
page read and write
4991000
heap
page read and write
4991000
heap
page read and write
8B4000
heap
page read and write
1D18E000
stack
page read and write
4991000
heap
page read and write
8B4000
heap
page read and write
EAB000
unkown
page execute and read and write
8B4000
heap
page read and write
308F000
stack
page read and write
4991000
heap
page read and write
63C000
stack
page read and write
3E8E000
stack
page read and write
A10000
heap
page read and write
4991000
heap
page read and write
8B4000
heap
page read and write
434F000
stack
page read and write
4991000
heap
page read and write
4E4E000
stack
page read and write
4991000
heap
page read and write
4991000
heap
page read and write
12F0000
heap
page read and write
2D87000
heap
page read and write
4991000
heap
page read and write
4990000
heap
page read and write
4F70000
direct allocation
page execute and read and write
FC6000
unkown
page execute and read and write
4F50000
direct allocation
page execute and read and write
4991000
heap
page read and write
8B4000
heap
page read and write
448F000
stack
page read and write
1D2CE000
stack
page read and write
8B4000
heap
page read and write
11AE000
stack
page read and write
4991000
heap
page read and write
1D46E000
stack
page read and write
2D60000
direct allocation
page read and write
2D80000
heap
page read and write
4991000
heap
page read and write
A20000
direct allocation
page read and write
4991000
heap
page read and write
8B4000
heap
page read and write
4DD0000
trusted library allocation
page read and write
FB0000
unkown
page execute and read and write
9FE000
stack
page read and write
73E000
stack
page read and write
4991000
heap
page read and write
3D4E000
stack
page read and write
8B4000
heap
page read and write
12AE000
stack
page read and write
4F80000
direct allocation
page execute and read and write
A20000
direct allocation
page read and write
4991000
heap
page read and write
498F000
stack
page read and write
2D70000
direct allocation
page execute and read and write
8B4000
heap
page read and write
4991000
heap
page read and write
3D0F000
stack
page read and write
8B4000
heap
page read and write
4991000
heap
page read and write
420F000
stack
page read and write
4991000
heap
page read and write
410E000
stack
page read and write
4991000
heap
page read and write
4991000
heap
page read and write
2D8B000
heap
page read and write
8FE000
stack
page read and write
1CD7F000
stack
page read and write
424E000
stack
page read and write
8B4000
heap
page read and write
348E000
stack
page read and write
4991000
heap
page read and write
2D60000
direct allocation
page read and write
4996000
heap
page read and write
2D4E000
stack
page read and write
470F000
stack
page read and write
45CF000
stack
page read and write
4991000
heap
page read and write
4E3B000
direct allocation
page read and write
49B0000
heap
page read and write
8B4000
heap
page read and write
D1A000
unkown
page execute and read and write
FC7000
unkown
page execute and write copy
4F4F000
stack
page read and write
4991000
heap
page read and write
3BCF000
stack
page read and write
4F60000
direct allocation
page execute and read and write
1CC7E000
stack
page read and write
B6D000
unkown
page execute and read and write
4991000
heap
page read and write
FC6000
unkown
page execute and write copy
116C000
unkown
page execute and write copy
4991000
heap
page read and write
4F70000
direct allocation
page execute and read and write
8B4000
heap
page read and write
FB7000
unkown
page execute and read and write
4991000
heap
page read and write
1375000
heap
page read and write
A20000
direct allocation
page read and write
4991000
heap
page read and write
8B4000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
1D56F000
stack
page read and write
380F000
stack
page read and write
8B4000
heap
page read and write
4991000
heap
page read and write
8B4000
heap
page read and write
4991000
heap
page read and write
A20000
direct allocation
page read and write
4991000
heap
page read and write
734000
stack
page read and write
4991000
heap
page read and write
44CE000
stack
page read and write
1CEFE000
stack
page read and write
D06000
unkown
page execute and read and write
A30000
unkown
page read and write
8B4000
heap
page read and write
B79000
unkown
page execute and read and write
8B4000
heap
page read and write
4991000
heap
page read and write
4991000
heap
page read and write
320E000
stack
page read and write
A20000
direct allocation
page read and write
4991000
heap
page read and write
F89000
unkown
page execute and read and write
330F000
stack
page read and write
4991000
heap
page read and write
4991000
heap
page read and write
4991000
heap
page read and write
3F8F000
stack
page read and write
8B4000
heap
page read and write
334E000
stack
page read and write
2C8F000
stack
page read and write
2E8F000
stack
page read and write
8B4000
heap
page read and write
4991000
heap
page read and write
8B4000
heap
page read and write
1CDBE000
stack
page read and write
790000
heap
page read and write
1344000
heap
page read and write
4991000
heap
page read and write
B9E000
unkown
page execute and read and write
344F000
stack
page read and write
8B4000
heap
page read and write
358F000
stack
page read and write
A30000
unkown
page readonly
A20000
direct allocation
page read and write
3ACE000
stack
page read and write
4991000
heap
page read and write
2D0E000
stack
page read and write
8B4000
heap
page read and write
1D570000
heap
page read and write
1CFFF000
stack
page read and write
30CE000
stack
page read and write
8B4000
heap
page read and write
2CCC000
stack
page read and write
4991000
heap
page read and write
40CF000
stack
page read and write
4991000
heap
page read and write
4991000
heap
page read and write
1D14F000
stack
page read and write
8B4000
heap
page read and write
1D04E000
stack
page read and write
12EE000
stack
page read and write
1D3CE000
stack
page read and write
870000
heap
page read and write
394F000
stack
page read and write
1359000
heap
page read and write
A20000
direct allocation
page read and write
4991000
heap
page read and write
A20000
direct allocation
page read and write
8B4000
heap
page read and write
3A8F000
stack
page read and write
8B4000
heap
page read and write
8B0000
heap
page read and write
49A0000
heap
page read and write
4991000
heap
page read and write
31CF000
stack
page read and write
12FA000
heap
page read and write
4991000
heap
page read and write
398E000
stack
page read and write
4991000
heap
page read and write
8B4000
heap
page read and write
A5C000
unkown
page execute and read and write
3C0E000
stack
page read and write
1D28D000
stack
page read and write
8B4000
heap
page read and write
4991000
heap
page read and write
A20000
direct allocation
page read and write
484F000
stack
page read and write
4991000
heap
page read and write
4991000
heap
page read and write
A20000
direct allocation
page read and write
116B000
unkown
page execute and read and write
4991000
heap
page read and write
4991000
heap
page read and write
8B4000
heap
page read and write
1CEBF000
stack
page read and write
3FCD000
stack
page read and write
8B4000
heap
page read and write
474E000
stack
page read and write
A20000
direct allocation
page read and write
4991000
heap
page read and write
488E000
stack
page read and write
4DE0000
heap
page read and write
370E000
stack
page read and write
4F90000
direct allocation
page execute and read and write
4991000
heap
page read and write
A20000
direct allocation
page read and write
4991000
heap
page read and write
4991000
heap
page read and write
4F70000
direct allocation
page execute and read and write
4991000
heap
page read and write
8B4000
heap
page read and write
36CF000
stack
page read and write
35CE000
stack
page read and write
There are 226 hidden memdumps, click here to show them.