IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.phpC
unknown
http://185.215.113.206/6c4adf523b719729.phps
unknown
http://185.215.113.206/6c4adf523b719729.php/
unknown
http://185.215.113.206/:
unknown
http://185.215.113.206/6c4adf523b719729.php;
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5530000
direct allocation
page read and write
malicious
E61000
unkown
page execute and read and write
malicious
171E000
heap
page read and write
malicious
1814000
heap
page read and write
1AEE000
stack
page read and write
50B1000
heap
page read and write
50B1000
heap
page read and write
3310000
direct allocation
page execute and read and write
1814000
heap
page read and write
13E0000
unkown
page execute and read and write
1814000
heap
page read and write
4A6F000
stack
page read and write
1814000
heap
page read and write
4CEF000
stack
page read and write
1DADE000
stack
page read and write
1D48F000
stack
page read and write
16F0000
direct allocation
page read and write
50B1000
heap
page read and write
3A2F000
stack
page read and write
1D38E000
stack
page read and write
E50000
direct allocation
page read and write
1814000
heap
page read and write
E50000
direct allocation
page read and write
50B1000
heap
page read and write
446E000
stack
page read and write
114A000
unkown
page execute and read and write
50AF000
stack
page read and write
19EF000
stack
page read and write
496E000
stack
page read and write
1814000
heap
page read and write
1814000
heap
page read and write
E50000
direct allocation
page read and write
51B0000
trusted library allocation
page read and write
E50000
direct allocation
page read and write
50B1000
heap
page read and write
50B1000
heap
page read and write
1DC7F000
stack
page read and write
442F000
stack
page read and write
1695000
stack
page read and write
3F6E000
stack
page read and write
E60000
unkown
page readonly
1814000
heap
page read and write
1814000
heap
page read and write
3E2E000
stack
page read and write
50B1000
heap
page read and write
1710000
heap
page read and write
FA9000
unkown
page execute and read and write
50B1000
heap
page read and write
E50000
direct allocation
page read and write
1814000
heap
page read and write
47EE000
stack
page read and write
50B1000
heap
page read and write
40AE000
stack
page read and write
1D5CF000
stack
page read and write
50B1000
heap
page read and write
352F000
stack
page read and write
1814000
heap
page read and write
50B1000
heap
page read and write
32CE000
stack
page read and write
E50000
direct allocation
page read and write
1D99D000
stack
page read and write
BA0000
heap
page read and write
50B1000
heap
page read and write
5680000
direct allocation
page execute and read and write
37AF000
stack
page read and write
3F2F000
stack
page read and write
50B1000
heap
page read and write
E60000
unkown
page read and write
1814000
heap
page read and write
50B1000
heap
page read and write
50B1000
heap
page read and write
175E000
heap
page read and write
50B1000
heap
page read and write
492F000
stack
page read and write
E50000
direct allocation
page read and write
50B1000
heap
page read and write
50B1000
heap
page read and write
482E000
stack
page read and write
3BAE000
stack
page read and write
5680000
direct allocation
page execute and read and write
50B1000
heap
page read and write
1814000
heap
page read and write
1814000
heap
page read and write
50B1000
heap
page read and write
50B0000
heap
page read and write
50B1000
heap
page read and write
50B1000
heap
page read and write
1593000
unkown
page execute and write copy
50B1000
heap
page read and write
4E2F000
stack
page read and write
5680000
direct allocation
page execute and read and write
50B1000
heap
page read and write
1D84F000
stack
page read and write
1814000
heap
page read and write
16DE000
stack
page read and write
1D9DE000
stack
page read and write
3CAF000
stack
page read and write
4BEE000
stack
page read and write
50B1000
heap
page read and write
50B1000
heap
page read and write
1700000
direct allocation
page execute and read and write
1814000
heap
page read and write
50C0000
heap
page read and write
50B1000
heap
page read and write
50B1000
heap
page read and write
4D2E000
stack
page read and write
1814000
heap
page read and write
50B1000
heap
page read and write
1DC80000
heap
page read and write
50B1000
heap
page read and write
50B1000
heap
page read and write
4E6E000
stack
page read and write
1592000
unkown
page execute and read and write
BB0000
heap
page read and write
4F6F000
stack
page read and write
E50000
direct allocation
page read and write
E50000
direct allocation
page read and write
50B1000
heap
page read and write
50B1000
heap
page read and write
1814000
heap
page read and write
E50000
direct allocation
page read and write
F9D000
unkown
page execute and read and write
330C000
stack
page read and write
1DB7E000
stack
page read and write
1814000
heap
page read and write
1814000
heap
page read and write
3A6E000
stack
page read and write
50B1000
heap
page read and write
342F000
stack
page read and write
3DEF000
stack
page read and write
366F000
stack
page read and write
3320000
heap
page read and write
1814000
heap
page read and write
5670000
direct allocation
page execute and read and write
E50000
direct allocation
page read and write
406F000
stack
page read and write
3327000
heap
page read and write
1D74E000
stack
page read and write
50B1000
heap
page read and write
E40000
heap
page read and write
50B1000
heap
page read and write
41AF000
stack
page read and write
1D70E000
stack
page read and write
46EE000
stack
page read and write
50B1000
heap
page read and write
1D4CE000
stack
page read and write
50B1000
heap
page read and write
1814000
heap
page read and write
4FAE000
stack
page read and write
50B1000
heap
page read and write
45AE000
stack
page read and write
54F0000
heap
page read and write
50B1000
heap
page read and write
566F000
stack
page read and write
555B000
direct allocation
page read and write
50B1000
heap
page read and write
E50000
direct allocation
page read and write
50B1000
heap
page read and write
50B1000
heap
page read and write
50B1000
heap
page read and write
50B1000
heap
page read and write
50B1000
heap
page read and write
46AF000
stack
page read and write
1814000
heap
page read and write
1792000
heap
page read and write
1D60E000
stack
page read and write
1814000
heap
page read and write
1814000
heap
page read and write
456F000
stack
page read and write
50B1000
heap
page read and write
3B6F000
stack
page read and write
13B3000
unkown
page execute and read and write
1780000
heap
page read and write
36AE000
stack
page read and write
50B1000
heap
page read and write
41EE000
stack
page read and write
1D89D000
stack
page read and write
432E000
stack
page read and write
1814000
heap
page read and write
1810000
heap
page read and write
50B1000
heap
page read and write
E3E000
stack
page read and write
50B1000
heap
page read and write
356E000
stack
page read and write
1136000
unkown
page execute and read and write
50B1000
heap
page read and write
171A000
heap
page read and write
50B1000
heap
page read and write
1814000
heap
page read and write
56B0000
direct allocation
page execute and read and write
1814000
heap
page read and write
5690000
direct allocation
page execute and read and write
16F0000
direct allocation
page read and write
13D9000
unkown
page execute and read and write
1814000
heap
page read and write
392E000
stack
page read and write
13EF000
unkown
page execute and write copy
37EE000
stack
page read and write
56A0000
direct allocation
page execute and read and write
332B000
heap
page read and write
4BAF000
stack
page read and write
1814000
heap
page read and write
E50000
direct allocation
page read and write
1814000
heap
page read and write
1814000
heap
page read and write
50B1000
heap
page read and write
1814000
heap
page read and write
50B1000
heap
page read and write
1779000
heap
page read and write
E50000
direct allocation
page read and write
42EF000
stack
page read and write
169E000
stack
page read and write
1762000
heap
page read and write
50B1000
heap
page read and write
3CEE000
stack
page read and write
1814000
heap
page read and write
50B1000
heap
page read and write
1814000
heap
page read and write
B4C000
stack
page read and write
556E000
stack
page read and write
4AAE000
stack
page read and write
1814000
heap
page read and write
E61000
unkown
page execute and write copy
12D0000
unkown
page execute and read and write
50B1000
heap
page read and write
50D0000
heap
page read and write
13F0000
unkown
page execute and write copy
50B1000
heap
page read and write
38EF000
stack
page read and write
13EF000
unkown
page execute and read and write
50B1000
heap
page read and write
1814000
heap
page read and write
50B1000
heap
page read and write
E8C000
unkown
page execute and read and write
FCE000
unkown
page execute and read and write
There are 225 hidden memdumps, click here to show them.