IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.php2
unknown
http://185.215.113.206/6c4adf523b719729.php=
unknown
http://185.215.113.206/hb5
unknown
http://185.215.113.206/6c4adf523b719729.php%.e
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.206/6c4adf523b719729.phpa~
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
EA1000
unkown
page execute and read and write
malicious
5850000
direct allocation
page read and write
malicious
1BDE000
heap
page read and write
malicious
53E0000
heap
page read and write
53D1000
heap
page read and write
13F5000
unkown
page execute and read and write
1AC4000
heap
page read and write
474F000
stack
page read and write
514F000
stack
page read and write
4F0E000
stack
page read and write
53D1000
heap
page read and write
1C46000
heap
page read and write
15D5000
unkown
page execute and write copy
53D1000
heap
page read and write
1C18000
heap
page read and write
59F0000
direct allocation
page execute and read and write
59D0000
direct allocation
page execute and read and write
414E000
stack
page read and write
53D1000
heap
page read and write
1AC4000
heap
page read and write
53D1000
heap
page read and write
1ABD000
stack
page read and write
1DCEC000
stack
page read and write
1AC0000
heap
page read and write
587B000
direct allocation
page read and write
53D1000
heap
page read and write
53D1000
heap
page read and write
1DBED000
stack
page read and write
1176000
unkown
page execute and read and write
460F000
stack
page read and write
5850000
direct allocation
page read and write
53D1000
heap
page read and write
53D1000
heap
page read and write
1AC4000
heap
page read and write
35E0000
direct allocation
page read and write
1AC4000
heap
page read and write
504E000
stack
page read and write
1AC4000
heap
page read and write
3ECE000
stack
page read and write
53D1000
heap
page read and write
59D0000
direct allocation
page execute and read and write
53D1000
heap
page read and write
1AC4000
heap
page read and write
53D0000
heap
page read and write
1D7DF000
stack
page read and write
53D1000
heap
page read and write
44CF000
stack
page read and write
EA0000
unkown
page read and write
141C000
unkown
page execute and read and write
53F0000
heap
page read and write
35CE000
stack
page read and write
410F000
stack
page read and write
E9C000
stack
page read and write
1AC4000
heap
page read and write
53D1000
heap
page read and write
4D8F000
stack
page read and write
18F4000
stack
page read and write
450E000
stack
page read and write
5830000
heap
page read and write
53D1000
heap
page read and write
3D8E000
stack
page read and write
53D1000
heap
page read and write
1AC4000
heap
page read and write
1C61000
heap
page read and write
1C68000
heap
page read and write
428E000
stack
page read and write
1DA9E000
stack
page read and write
53D1000
heap
page read and write
FE9000
unkown
page execute and read and write
ECC000
unkown
page execute and read and write
1424000
unkown
page execute and read and write
1DD2D000
stack
page read and write
1AC4000
heap
page read and write
4B0E000
stack
page read and write
3600000
heap
page read and write
53D1000
heap
page read and write
388E000
stack
page read and write
1AC4000
heap
page read and write
53D1000
heap
page read and write
43CE000
stack
page read and write
3C4E000
stack
page read and write
4ECF000
stack
page read and write
1AC4000
heap
page read and write
53D1000
heap
page read and write
35D0000
heap
page read and write
53D1000
heap
page read and write
1AC4000
heap
page read and write
1D6DE000
stack
page read and write
438F000
stack
page read and write
1AC4000
heap
page read and write
1AC4000
heap
page read and write
EA0000
unkown
page readonly
35E0000
direct allocation
page read and write
1AC4000
heap
page read and write
398F000
stack
page read and write
500F000
stack
page read and write
53D1000
heap
page read and write
35E0000
direct allocation
page read and write
53D1000
heap
page read and write
53D1000
heap
page read and write
53D1000
heap
page read and write
53D1000
heap
page read and write
424F000
stack
page read and write
3C0F000
stack
page read and write
35E0000
direct allocation
page read and write
53D1000
heap
page read and write
53D1000
heap
page read and write
35E0000
direct allocation
page read and write
59E0000
direct allocation
page execute and read and write
53D1000
heap
page read and write
5850000
direct allocation
page read and write
1D95E000
stack
page read and write
598F000
stack
page read and write
1313000
unkown
page execute and read and write
39CE000
stack
page read and write
53D1000
heap
page read and write
1C35000
heap
page read and write
53D1000
heap
page read and write
59D0000
direct allocation
page execute and read and write
53D1000
heap
page read and write
370F000
stack
page read and write
53D1000
heap
page read and write
118A000
unkown
page execute and read and write
1A7E000
stack
page read and write
1432000
unkown
page execute and write copy
53D1000
heap
page read and write
1DCE000
stack
page read and write
1AC4000
heap
page read and write
374C000
stack
page read and write
53D1000
heap
page read and write
3ACF000
stack
page read and write
1AC4000
heap
page read and write
59B0000
direct allocation
page execute and read and write
3FCF000
stack
page read and write
5A00000
direct allocation
page execute and read and write
1AC4000
heap
page read and write
400E000
stack
page read and write
1AC4000
heap
page read and write
1AC4000
heap
page read and write
49CF000
stack
page read and write
53D1000
heap
page read and write
1AC4000
heap
page read and write
1D91F000
stack
page read and write
35E0000
direct allocation
page read and write
53D1000
heap
page read and write
1AC4000
heap
page read and write
53D1000
heap
page read and write
EA1000
unkown
page execute and write copy
1AC4000
heap
page read and write
53D1000
heap
page read and write
53D1000
heap
page read and write
464E000
stack
page read and write
53D1000
heap
page read and write
3607000
heap
page read and write
59C0000
direct allocation
page execute and read and write
53D1000
heap
page read and write
53D1000
heap
page read and write
4C4E000
stack
page read and write
1AC4000
heap
page read and write
53D1000
heap
page read and write
53D1000
heap
page read and write
1C2B000
heap
page read and write
35E0000
direct allocation
page read and write
53D1000
heap
page read and write
53D1000
heap
page read and write
1AC4000
heap
page read and write
1AC4000
heap
page read and write
35E0000
direct allocation
page read and write
FDD000
unkown
page execute and read and write
1BD0000
heap
page read and write
1930000
heap
page read and write
53D1000
heap
page read and write
1AC4000
heap
page read and write
1AC4000
heap
page read and write
3D4F000
stack
page read and write
100E000
unkown
page execute and read and write
4B4E000
stack
page read and write
518E000
stack
page read and write
1BD8000
heap
page read and write
488F000
stack
page read and write
53D1000
heap
page read and write
4DCE000
stack
page read and write
35E0000
direct allocation
page read and write
35E0000
direct allocation
page read and write
48CE000
stack
page read and write
53CF000
stack
page read and write
1AC4000
heap
page read and write
1AC4000
heap
page read and write
53D1000
heap
page read and write
59A0000
direct allocation
page execute and read and write
53D1000
heap
page read and write
588E000
stack
page read and write
1C24000
heap
page read and write
53D1000
heap
page read and write
384F000
stack
page read and write
35E0000
direct allocation
page read and write
1D81E000
stack
page read and write
1432000
unkown
page execute and read and write
53D1000
heap
page read and write
1C54000
heap
page read and write
1AC4000
heap
page read and write
52CE000
stack
page read and write
35E0000
direct allocation
page read and write
4A0D000
stack
page read and write
53E5000
heap
page read and write
1AC4000
heap
page read and write
478E000
stack
page read and write
53D1000
heap
page read and write
1AC4000
heap
page read and write
1BCF000
stack
page read and write
1C5F000
heap
page read and write
1AC4000
heap
page read and write
528F000
stack
page read and write
1DB9F000
stack
page read and write
1A10000
heap
page read and write
53D1000
heap
page read and write
53D1000
heap
page read and write
1DE2E000
stack
page read and write
53D1000
heap
page read and write
53D1000
heap
page read and write
15D4000
unkown
page execute and read and write
3E8F000
stack
page read and write
1AC4000
heap
page read and write
1DA5E000
stack
page read and write
5810000
trusted library allocation
page read and write
53D1000
heap
page read and write
53D1000
heap
page read and write
18FE000
stack
page read and write
1AC4000
heap
page read and write
3B0E000
stack
page read and write
4C8E000
stack
page read and write
1433000
unkown
page execute and write copy
35E0000
direct allocation
page read and write
1AC4000
heap
page read and write
35E0000
direct allocation
page read and write
360B000
heap
page read and write
There are 226 hidden memdumps, click here to show them.