IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/6c4adf523b719729.php1
unknown
http://185.215.113.206/6c4adf523b719729.phpQ
unknown
http://185.215.113.206/B
unknown
http://185.215.113.206/6c4adf523b719729.php/
unknown
http://185.215.113.206/6c4adf523b719729.php)
unknown
http://185.215.113.206/6c4adf523b719729.phpI
unknown
http://185.215.113.206/6c4adf523b719729.phpu
unknown
http://185.215.113.206/G
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4E1000
unkown
page execute and read and write
malicious
5120000
direct allocation
page read and write
malicious
143E000
heap
page read and write
malicious
1344000
heap
page read and write
1410000
direct allocation
page read and write
1344000
heap
page read and write
EAC000
stack
page read and write
1410000
direct allocation
page read and write
3010000
heap
page read and write
1344000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
1344000
heap
page read and write
1496000
heap
page read and write
52C0000
direct allocation
page execute and read and write
4E0000
unkown
page readonly
1410000
direct allocation
page read and write
515E000
stack
page read and write
13CE000
stack
page read and write
300C000
stack
page read and write
3A1E000
stack
page read and write
1344000
heap
page read and write
BF8000
unkown
page execute and read and write
469E000
stack
page read and write
4CA1000
heap
page read and write
1344000
heap
page read and write
61D000
unkown
page execute and read and write
401F000
stack
page read and write
1344000
heap
page read and write
1344000
heap
page read and write
3B5E000
stack
page read and write
5280000
direct allocation
page execute and read and write
1D6FE000
stack
page read and write
52A0000
direct allocation
page execute and read and write
325F000
stack
page read and write
415F000
stack
page read and write
4B5F000
stack
page read and write
48DF000
stack
page read and write
64E000
unkown
page execute and read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
39DF000
stack
page read and write
1344000
heap
page read and write
419E000
stack
page read and write
4A5E000
stack
page read and write
5100000
heap
page read and write
5290000
direct allocation
page execute and read and write
375F000
stack
page read and write
945000
unkown
page execute and read and write
3EDF000
stack
page read and write
3B1F000
stack
page read and write
4CA1000
heap
page read and write
1330000
heap
page read and write
1D5FE000
stack
page read and write
4CA1000
heap
page read and write
429F000
stack
page read and write
33DE000
stack
page read and write
351E000
stack
page read and write
1344000
heap
page read and write
1438000
heap
page read and write
A44000
unkown
page execute and read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
1D0EE000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
1344000
heap
page read and write
38DE000
stack
page read and write
4CA0000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
455E000
stack
page read and write
42DE000
stack
page read and write
4CA1000
heap
page read and write
3C5F000
stack
page read and write
52A0000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
1344000
heap
page read and write
4CA1000
heap
page read and write
140E000
stack
page read and write
1344000
heap
page read and write
1410000
direct allocation
page read and write
1344000
heap
page read and write
1483000
heap
page read and write
465F000
stack
page read and write
1410000
direct allocation
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
1D4BD000
stack
page read and write
43DF000
stack
page read and write
14BA000
heap
page read and write
3C9E000
stack
page read and write
1344000
heap
page read and write
1344000
heap
page read and write
1344000
heap
page read and write
3F1E000
stack
page read and write
1344000
heap
page read and write
451F000
stack
page read and write
301B000
heap
page read and write
1D32E000
stack
page read and write
1410000
direct allocation
page read and write
12E0000
heap
page read and write
1D46F000
stack
page read and write
1344000
heap
page read and write
1344000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
A5F000
unkown
page execute and read and write
A1F000
unkown
page execute and read and write
1410000
direct allocation
page read and write
4CA1000
heap
page read and write
1D5BD000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
34DF000
stack
page read and write
7B6000
unkown
page execute and read and write
1410000
direct allocation
page read and write
514B000
direct allocation
page read and write
4CA1000
heap
page read and write
4CC0000
heap
page read and write
329E000
stack
page read and write
491E000
stack
page read and write
1344000
heap
page read and write
1344000
heap
page read and write
5120000
direct allocation
page read and write
1344000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
1344000
heap
page read and write
1344000
heap
page read and write
4CA1000
heap
page read and write
A51000
unkown
page execute and read and write
162F000
stack
page read and write
4CA1000
heap
page read and write
1D22E000
stack
page read and write
1410000
direct allocation
page read and write
1344000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
1410000
direct allocation
page read and write
1430000
heap
page read and write
4CA1000
heap
page read and write
389F000
stack
page read and write
1D1EF000
stack
page read and write
5270000
direct allocation
page execute and read and write
1200000
heap
page read and write
FA4000
stack
page read and write
1344000
heap
page read and write
4CA1000
heap
page read and write
1344000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
1344000
heap
page read and write
4CA1000
heap
page read and write
4B9E000
stack
page read and write
52B0000
direct allocation
page execute and read and write
138E000
stack
page read and write
1410000
direct allocation
page read and write
4CA1000
heap
page read and write
4CB0000
heap
page read and write
339F000
stack
page read and write
3DDE000
stack
page read and write
FAE000
stack
page read and write
1344000
heap
page read and write
379E000
stack
page read and write
629000
unkown
page execute and read and write
7CA000
unkown
page execute and read and write
1410000
direct allocation
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
1344000
heap
page read and write
3D9F000
stack
page read and write
405E000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4E1000
unkown
page execute and write copy
315E000
stack
page read and write
4CA1000
heap
page read and write
52A0000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
3017000
heap
page read and write
479F000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
361F000
stack
page read and write
2FCF000
stack
page read and write
4CA1000
heap
page read and write
1340000
heap
page read and write
50C000
unkown
page execute and read and write
2ECF000
stack
page read and write
1344000
heap
page read and write
1410000
direct allocation
page read and write
4E0000
unkown
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
1410000
direct allocation
page read and write
4CA1000
heap
page read and write
1CFAE000
stack
page read and write
1344000
heap
page read and write
A5F000
unkown
page execute and write copy
4A1F000
stack
page read and write
1344000
heap
page read and write
1344000
heap
page read and write
47DE000
stack
page read and write
4CA1000
heap
page read and write
525F000
stack
page read and write
365E000
stack
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
1344000
heap
page read and write
4CA1000
heap
page read and write
A60000
unkown
page execute and write copy
52D0000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
441E000
stack
page read and write
1D0AF000
stack
page read and write
1D36E000
stack
page read and write
14B1000
heap
page read and write
4CA1000
heap
page read and write
BF9000
unkown
page execute and write copy
4C9F000
stack
page read and write
4DA0000
trusted library allocation
page read and write
1344000
heap
page read and write
4CA1000
heap
page read and write
311F000
stack
page read and write
4CA1000
heap
page read and write
5120000
direct allocation
page read and write
There are 221 hidden memdumps, click here to show them.