IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.php/r
unknown
http://185.215.113.206/P
unknown
http://185.215.113.206/6c4adf523b719729.php-
unknown
http://185.215.113.206/6c4adf523b719729.phpe/
unknown
http://185.215.113.206/6c4adf523b719729.phpu.
unknown
http://185.215.113.206/6c4adf523b719729.php%.&
unknown
http://185.215.113.206/6c4adf523b719729.phpW
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
111000
unkown
page execute and read and write
malicious
E1E000
heap
page read and write
malicious
4B60000
direct allocation
page read and write
malicious
CA4000
heap
page read and write
4B40000
heap
page read and write
2F4E000
stack
page read and write
CA4000
heap
page read and write
46D1000
heap
page read and write
CA4000
heap
page read and write
46D1000
heap
page read and write
430F000
stack
page read and write
31CE000
stack
page read and write
4CC0000
direct allocation
page execute and read and write
CA4000
heap
page read and write
40CE000
stack
page read and write
37CF000
stack
page read and write
24D000
unkown
page execute and read and write
4CF0000
direct allocation
page execute and read and write
2A70000
direct allocation
page read and write
CA4000
heap
page read and write
1D03D000
stack
page read and write
2A2C000
stack
page read and write
32CF000
stack
page read and write
CA4000
heap
page read and write
1CAEF000
stack
page read and write
46D1000
heap
page read and write
3E4E000
stack
page read and write
46D1000
heap
page read and write
3F4F000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
2A70000
direct allocation
page read and write
46D1000
heap
page read and write
1CB2E000
stack
page read and write
100E000
stack
page read and write
340F000
stack
page read and write
CA4000
heap
page read and write
2A70000
direct allocation
page read and write
1CEBF000
stack
page read and write
46CF000
stack
page read and write
E78000
heap
page read and write
46D1000
heap
page read and write
CA4000
heap
page read and write
DBE000
stack
page read and write
46D1000
heap
page read and write
C50000
heap
page read and write
CA4000
heap
page read and write
46D1000
heap
page read and write
2A70000
direct allocation
page read and write
2A70000
direct allocation
page read and write
8EC000
stack
page read and write
CA4000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
1CFFD000
stack
page read and write
CA4000
heap
page read and write
394E000
stack
page read and write
CA4000
heap
page read and write
358E000
stack
page read and write
46D1000
heap
page read and write
4B60000
direct allocation
page read and write
4B9E000
stack
page read and write
859000
unkown
page execute and read and write
CA4000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
46D1000
heap
page read and write
304F000
stack
page read and write
4C9F000
stack
page read and write
CA4000
heap
page read and write
46E6000
heap
page read and write
CA4000
heap
page read and write
9EE000
stack
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
390F000
stack
page read and write
DFE000
stack
page read and write
4B10000
trusted library allocation
page read and write
1CDBE000
stack
page read and write
CA4000
heap
page read and write
E96000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
CA4000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
110000
unkown
page read and write
2A70000
direct allocation
page read and write
368F000
stack
page read and write
CA4000
heap
page read and write
2A70000
direct allocation
page read and write
3CCF000
stack
page read and write
448E000
stack
page read and write
CA4000
heap
page read and write
3A8E000
stack
page read and write
E1A000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
46D1000
heap
page read and write
9E5000
stack
page read and write
41CF000
stack
page read and write
699000
unkown
page execute and read and write
46D1000
heap
page read and write
3BCE000
stack
page read and write
46D1000
heap
page read and write
2A70000
direct allocation
page read and write
6AF000
unkown
page execute and read and write
1CD6F000
stack
page read and write
46D1000
heap
page read and write
CA4000
heap
page read and write
2A70000
direct allocation
page read and write
CA4000
heap
page read and write
4B8B000
direct allocation
page read and write
46D1000
heap
page read and write
672000
unkown
page execute and read and write
46D1000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
1D294000
heap
page read and write
1D290000
heap
page read and write
3A4F000
stack
page read and write
434E000
stack
page read and write
3E0F000
stack
page read and write
259000
unkown
page execute and read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46D0000
heap
page read and write
46D1000
heap
page read and write
CA4000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
3D0E000
stack
page read and write
3E6000
unkown
page execute and read and write
CA4000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
CA4000
heap
page read and write
CA4000
heap
page read and write
46F0000
heap
page read and write
29EF000
stack
page read and write
46D1000
heap
page read and write
2CCE000
stack
page read and write
E00000
heap
page read and write
408F000
stack
page read and write
2A70000
direct allocation
page read and write
308E000
stack
page read and write
46D1000
heap
page read and write
4B60000
direct allocation
page read and write
110E000
stack
page read and write
CA4000
heap
page read and write
CA0000
heap
page read and write
444F000
stack
page read and write
3FA000
unkown
page execute and read and write
85A000
unkown
page execute and write copy
380E000
stack
page read and write
CA4000
heap
page read and write
6AF000
unkown
page execute and write copy
46D1000
heap
page read and write
4D10000
direct allocation
page execute and read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
330E000
stack
page read and write
46D1000
heap
page read and write
4D00000
direct allocation
page execute and read and write
110000
unkown
page readonly
CA4000
heap
page read and write
344E000
stack
page read and write
2A70000
direct allocation
page read and write
45CE000
stack
page read and write
46E0000
heap
page read and write
2F0F000
stack
page read and write
46D1000
heap
page read and write
111000
unkown
page execute and write copy
27E000
unkown
page execute and read and write
1CC6E000
stack
page read and write
CA4000
heap
page read and write
46D1000
heap
page read and write
2A87000
heap
page read and write
1D27E000
stack
page read and write
CA4000
heap
page read and write
3B8F000
stack
page read and write
318F000
stack
page read and write
1CC2F000
stack
page read and write
2DCF000
stack
page read and write
46D1000
heap
page read and write
2A70000
direct allocation
page read and write
46D1000
heap
page read and write
590000
unkown
page execute and read and write
46D1000
heap
page read and write
2C8F000
stack
page read and write
1C9EE000
stack
page read and write
2B8F000
stack
page read and write
2A70000
direct allocation
page read and write
2E0E000
stack
page read and write
46D1000
heap
page read and write
CA4000
heap
page read and write
2A80000
heap
page read and write
46D1000
heap
page read and write
CA4000
heap
page read and write
1CEFD000
stack
page read and write
3F8E000
stack
page read and write
E10000
heap
page read and write
6A0000
unkown
page execute and read and write
458F000
stack
page read and write
46D1000
heap
page read and write
354F000
stack
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
1D17E000
stack
page read and write
2A6E000
stack
page read and write
420E000
stack
page read and write
46D1000
heap
page read and write
36CE000
stack
page read and write
C40000
heap
page read and write
2A70000
direct allocation
page read and write
CA4000
heap
page read and write
46D1000
heap
page read and write
CA4000
heap
page read and write
E63000
heap
page read and write
CA4000
heap
page read and write
28EE000
stack
page read and write
6B0000
unkown
page execute and write copy
1D13E000
stack
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
46D1000
heap
page read and write
13C000
unkown
page execute and read and write
There are 226 hidden memdumps, click here to show them.