IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\jsii-runtime.1844169201\bin\jsii-runtime.js
C++ source, ASCII text, with very long lines (324), with escape sequences
dropped
C:\Users\user\AppData\Local\Temp\jsii-runtime.1844169201\bin\jsii-runtime.js.map
JSON data
dropped
C:\Users\user\AppData\Local\Temp\jsii-runtime.1844169201\lib\program.js
ASCII text, with very long lines (489)
dropped
C:\Users\user\AppData\Local\Temp\jsii-runtime.1844169201\lib\program.js.map
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
malicious

URLs

Name
IP
Malicious
contemteny.site
malicious
opposezmny.site
malicious
servicedny.site
malicious
goalyfeastz.site
malicious
authorisev.site
malicious
faulteyotk.site
malicious
seallysl.site
malicious
https://seallysl.site/api
172.67.180.76
malicious
dilemmadu.site
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://github.com/aws/jsii
unknown
http://json-schema.org/schema
unknown
https://seallysl.site/DQ
unknown
https://seallysl.site/b
unknown
https://github.com/jprichardson/node-fs-extra/issues/269
unknown
https://seallysl.site/U
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://seallysl.site/
unknown
https://raw.githubusercontent.com/ajv-validator/ajv/master/lib/refs/data.json#
unknown
http://json-schema.org/draft-07/schema
unknown
https://seallysl.site/gfj
unknown
http://www.opengis.net/gml
unknown
http://www.collada.org/2005/11/COLLADASchema
unknown
http://www.topografix.com/GPX/1/1
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.opengis.net/gml/3.2
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://www.mozilla.or
unknown
https://seallysl.site/p
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://json-schema.org/draft-07/schema#
unknown
https://aws.amazon.com
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://seallysl.site:443/api=usere
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://seallysl.site/G
unknown
https://github.com/aws/jsii.git
unknown
https://seallysl.site:443/apiM)
unknown
https://seallysl.site/apid
unknown
http://crl.micro
unknown
https://seallysl.site/apigsp
unknown
https://seallysl.site:443/api
unknown
http://earth.google.com/kml/2.2
unknown
http://earth.google.com/kml/2.0
unknown
http://earth.google.com/kml/2.1
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://github.com/aws/jsii/issues
unknown
http://www.garmin.com/xmlschemas/TrainingCenterDatabase/v2
unknown
https://seallysl.site/apiture
unknown
http://www.opengis.net/kml/2.2
unknown
http://www.opengis.net/gml/3.3/exr
unknown
https://seallysl.site/8
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 53 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
seallysl.site
172.67.180.76
malicious
servicedny.site
unknown
malicious

IPs

IP
Domain
Country
Malicious
172.67.180.76
seallysl.site
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
253E000
direct allocation
page read and write
malicious
24B8000
direct allocation
page read and write
52DF000
trusted library allocation
page read and write
2257D000
stack
page read and write
244C000
direct allocation
page read and write
52DF000
trusted library allocation
page read and write
26A4000
direct allocation
page read and write
303A000
heap
page read and write
303A000
heap
page read and write
5490000
trusted library allocation
page read and write
241A000
direct allocation
page read and write
5308000
trusted library allocation
page read and write
1C75000
heap
page read and write
301F000
heap
page read and write
250E000
direct allocation
page read and write
290C000
direct allocation
page read and write
52C4000
trusted library allocation
page read and write
2538000
direct allocation
page read and write
300E000
heap
page read and write
5311000
trusted library allocation
page read and write
52F6000
trusted library allocation
page read and write
2B30000
heap
page read and write
14A8000
unkown
page readonly
2500000
direct allocation
page read and write
301C000
heap
page read and write
52FB000
trusted library allocation
page read and write
26C0000
direct allocation
page read and write
3023000
heap
page read and write
5311000
trusted library allocation
page read and write
52D3000
trusted library allocation
page read and write
2576000
direct allocation
page read and write
2570000
direct allocation
page read and write
52EC000
trusted library allocation
page read and write
26AE000
direct allocation
page read and write
3054000
heap
page read and write
301B000
heap
page read and write
3031000
heap
page read and write
3054000
heap
page read and write
24CA000
direct allocation
page read and write
530D000
trusted library allocation
page read and write
26EA000
direct allocation
page read and write
1E9E000
stack
page read and write
26AA000
direct allocation
page read and write
28FE000
direct allocation
page read and write
5317000
trusted library allocation
page read and write
22CD000
stack
page read and write
26EE000
direct allocation
page read and write
2243D000
stack
page read and write
2544000
direct allocation
page read and write
26C2000
direct allocation
page read and write
52E0000
trusted library allocation
page read and write
245A000
direct allocation
page read and write
52FE000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
26E4000
direct allocation
page read and write
3040000
heap
page read and write
52E0000
trusted library allocation
page read and write
2460000
direct allocation
page read and write
301B000
heap
page read and write
2506000
direct allocation
page read and write
2F20000
remote allocation
page read and write
2412000
direct allocation
page read and write
3040000
heap
page read and write
2F87000
heap
page read and write
3040000
heap
page read and write
257D000
direct allocation
page read and write
52CC000
trusted library allocation
page read and write
2445000
direct allocation
page read and write
22B00000
direct allocation
page read and write
52B9000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
52E7000
trusted library allocation
page read and write
3028000
heap
page read and write
5488000
trusted library allocation
page read and write
179D000
unkown
page write copy
249A000
direct allocation
page read and write
17D0000
unkown
page read and write
17A4000
unkown
page read and write
2880000
direct allocation
page read and write
52B0000
trusted library allocation
page read and write
301B000
heap
page read and write
52FD000
trusted library allocation
page read and write
52FD000
trusted library allocation
page read and write
303B000
heap
page read and write
2484000
direct allocation
page read and write
52B9000
trusted library allocation
page read and write
52C9000
trusted library allocation
page read and write
CC0000
unkown
page readonly
24DC000
direct allocation
page read and write
52C4000
trusted library allocation
page read and write
530D000
trusted library allocation
page read and write
2B35000
heap
page read and write
2414000
direct allocation
page read and write
52BA000
trusted library allocation
page read and write
2498000
direct allocation
page read and write
52FB000
trusted library allocation
page read and write
5322000
trusted library allocation
page read and write
248E000
direct allocation
page read and write
10CD000
unkown
page readonly
24E6000
direct allocation
page read and write
52D1000
trusted library allocation
page read and write
51FF000
stack
page read and write
2458000
direct allocation
page read and write
242B000
direct allocation
page read and write
5309000
trusted library allocation
page read and write
2FB6000
heap
page read and write
52D1000
trusted library allocation
page read and write
301E000
heap
page read and write
2416000
direct allocation
page read and write
459000
remote allocation
page execute and read and write
22CDF000
stack
page read and write
52C2000
trusted library allocation
page read and write
530B000
trusted library allocation
page read and write
2B37000
heap
page read and write
24C6000
direct allocation
page read and write
1812000
unkown
page readonly
2BEE000
stack
page read and write
179D000
unkown
page write copy
5342000
trusted library allocation
page read and write
2F9D000
heap
page read and write
CC0000
unkown
page readonly
26A0000
direct allocation
page read and write
1811000
unkown
page write copy
52B9000
trusted library allocation
page read and write
2F0D000
stack
page read and write
50FD000
stack
page read and write
17BB000
unkown
page read and write
3020000
heap
page read and write
26CC000
direct allocation
page read and write
26B4000
direct allocation
page read and write
5368000
trusted library allocation
page read and write
532F000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
26D6000
direct allocation
page read and write
1D50000
heap
page read and write
53B1000
heap
page read and write
52EA000
trusted library allocation
page read and write
3020000
heap
page read and write
2FB2000
heap
page read and write
3040000
heap
page read and write
2F20000
remote allocation
page read and write
26AC000
direct allocation
page read and write
52D1000
trusted library allocation
page read and write
5304000
trusted library allocation
page read and write
531F000
trusted library allocation
page read and write
26E6000
direct allocation
page read and write
241E000
direct allocation
page read and write
3044000
heap
page read and write
243E000
direct allocation
page read and write
301B000
heap
page read and write
3020000
heap
page read and write
184C000
unkown
page readonly
301B000
heap
page read and write
248C000
direct allocation
page read and write
52DF000
trusted library allocation
page read and write
52B5000
trusted library allocation
page read and write
52E6000
trusted library allocation
page read and write
24F0000
direct allocation
page read and write
23F0000
direct allocation
page read and write
3044000
heap
page read and write
52D3000
trusted library allocation
page read and write
5322000
trusted library allocation
page read and write
52E5000
trusted library allocation
page read and write
24CE000
direct allocation
page read and write
52F6000
trusted library allocation
page read and write
2520000
direct allocation
page read and write
52C0000
trusted library allocation
page read and write
5308000
trusted library allocation
page read and write
2426000
direct allocation
page read and write
3034000
heap
page read and write
247A000
direct allocation
page read and write
52E8000
trusted library allocation
page read and write
52EE000
trusted library allocation
page read and write
52FA000
trusted library allocation
page read and write
304B000
heap
page read and write
241C000
direct allocation
page read and write
52DF000
trusted library allocation
page read and write
295E000
direct allocation
page read and write
52F5000
trusted library allocation
page read and write
5308000
trusted library allocation
page read and write
26CE000
direct allocation
page read and write
532F000
trusted library allocation
page read and write
303B000
heap
page read and write
179E000
unkown
page read and write
52E7000
trusted library allocation
page read and write
301B000
heap
page read and write
24FC000
direct allocation
page read and write
3025000
heap
page read and write
1812000
unkown
page readonly
316E000
stack
page read and write
3012000
heap
page read and write
52DE000
trusted library allocation
page read and write
52DF000
trusted library allocation
page read and write
24C4000
direct allocation
page read and write
287D000
direct allocation
page read and write
52CE000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
1D67000
heap
page read and write
3044000
heap
page read and write
5260000
heap
page read and write
52E4000
trusted library allocation
page read and write
52E3000
trusted library allocation
page read and write
52BE000
trusted library allocation
page read and write
2492000
direct allocation
page read and write
52FA000
trusted library allocation
page read and write
52F5000
trusted library allocation
page read and write
532D000
trusted library allocation
page read and write
2836000
direct allocation
page read and write
184C000
unkown
page readonly
22BDE000
stack
page read and write
52DF000
trusted library allocation
page read and write
2532000
direct allocation
page read and write
3028000
heap
page read and write
52CE000
trusted library allocation
page read and write
52DF000
trusted library allocation
page read and write
3031000
heap
page read and write
2FB2000
heap
page read and write
5328000
trusted library allocation
page read and write
52CE000
trusted library allocation
page read and write
52F5000
trusted library allocation
page read and write
247C000
direct allocation
page read and write
52DE000
trusted library allocation
page read and write
26BA000
direct allocation
page read and write
26B6000
direct allocation
page read and write
52C9000
trusted library allocation
page read and write
531B000
trusted library allocation
page read and write
245E000
direct allocation
page read and write
2400000
direct allocation
page read and write
302A000
heap
page read and write
2830000
direct allocation
page read and write
2420000
direct allocation
page read and write
2580000
direct allocation
page read and write
2548000
direct allocation
page read and write
52DE000
trusted library allocation
page read and write
26BE000
direct allocation
page read and write
2406000
direct allocation
page read and write
2514000
direct allocation
page read and write
22900000
direct allocation
page read and write
281C000
direct allocation
page read and write
2BAD000
stack
page read and write
532C000
trusted library allocation
page read and write
532F000
trusted library allocation
page read and write
2456000
direct allocation
page read and write
5350000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
24CC000
direct allocation
page read and write
52CE000
trusted library allocation
page read and write
52EA000
trusted library allocation
page read and write
26D2000
direct allocation
page read and write
52CE000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
52B9000
trusted library allocation
page read and write
226BD000
stack
page read and write
52BA000
trusted library allocation
page read and write
26B2000
direct allocation
page read and write
24A2000
direct allocation
page read and write
3044000
heap
page read and write
532C000
trusted library allocation
page read and write
2422000
direct allocation
page read and write
26E0000
direct allocation
page read and write
52E6000
trusted library allocation
page read and write
252C000
direct allocation
page read and write
49B0000
heap
page read and write
5327000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
2472000
direct allocation
page read and write
3019000
heap
page read and write
2466000
direct allocation
page read and write
2494000
direct allocation
page read and write
52FA000
trusted library allocation
page read and write
52CD000
trusted library allocation
page read and write
2574000
direct allocation
page read and write
269E000
direct allocation
page read and write
3044000
heap
page read and write
227BF000
stack
page read and write
52CD000
trusted library allocation
page read and write
9EB000
stack
page read and write
288C000
direct allocation
page read and write
52E8000
trusted library allocation
page read and write
52D1000
trusted library allocation
page read and write
3020000
heap
page read and write
24BC000
direct allocation
page read and write
52BE000
trusted library allocation
page read and write
52FA000
trusted library allocation
page read and write
3044000
heap
page read and write
52C2000
trusted library allocation
page read and write
10CD000
unkown
page readonly
530D000
trusted library allocation
page read and write
2560000
direct allocation
page read and write
52CD000
trusted library allocation
page read and write
2F9D000
heap
page read and write
3044000
heap
page read and write
532C000
trusted library allocation
page read and write
254A000
direct allocation
page read and write
52CE000
trusted library allocation
page read and write
252E000
direct allocation
page read and write
496E000
stack
page read and write
26EC000
direct allocation
page read and write
2AD0000
heap
page read and write
52CC000
trusted library allocation
page read and write
532F000
trusted library allocation
page read and write
26B0000
direct allocation
page read and write
5313000
trusted library allocation
page read and write
52FE000
trusted library allocation
page read and write
302A000
heap
page read and write
52DE000
trusted library allocation
page read and write
2B20000
heap
page read and write
52DE000
trusted library allocation
page read and write
52BF000
trusted library allocation
page read and write
530F000
trusted library allocation
page read and write
52DE000
trusted library allocation
page read and write
14A8000
unkown
page readonly
5520000
trusted library allocation
page read and write
4ABD000
stack
page read and write
52DE000
trusted library allocation
page read and write
17A2000
unkown
page read and write
17BC000
unkown
page write copy
2F8C000
heap
page read and write
52F8000
trusted library allocation
page read and write
2F6D000
stack
page read and write
52ED000
trusted library allocation
page read and write
3038000
heap
page read and write
2FB6000
heap
page read and write
305D000
heap
page read and write
282A000
direct allocation
page read and write
180C000
unkown
page read and write
2404000
direct allocation
page read and write
252A000
direct allocation
page read and write
3012000
heap
page read and write
303F000
heap
page read and write
251E000
direct allocation
page read and write
5319000
trusted library allocation
page read and write
3044000
heap
page read and write
532C000
trusted library allocation
page read and write
24FA000
direct allocation
page read and write
52FF000
trusted library allocation
page read and write
24B6000
direct allocation
page read and write
2424000
direct allocation
page read and write
1C60000
heap
page read and write
52BE000
trusted library allocation
page read and write
26A2000
direct allocation
page read and write
24E4000
direct allocation
page read and write
2F20000
remote allocation
page read and write
5309000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
5342000
trusted library allocation
page read and write
24D2000
direct allocation
page read and write
52BE000
trusted library allocation
page read and write
2476000
direct allocation
page read and write
CC1000
unkown
page execute read
52C4000
trusted library allocation
page read and write
3044000
heap
page read and write
530B000
trusted library allocation
page read and write
52BA000
trusted library allocation
page read and write
5EC8000
trusted library allocation
page read and write
52F3000
trusted library allocation
page read and write
532C000
trusted library allocation
page read and write
24B0000
direct allocation
page read and write
5317000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
25BA000
direct allocation
page read and write
2430000
direct allocation
page read and write
1D60000
heap
page read and write
52F5000
trusted library allocation
page read and write
3040000
heap
page read and write
17A5000
unkown
page write copy
2402000
direct allocation
page read and write
5548000
trusted library allocation
page read and write
52DF000
trusted library allocation
page read and write
53B0000
heap
page read and write
4BBF000
stack
page read and write
2B1E000
stack
page read and write
3017000
heap
page read and write
2970000
direct allocation
page read and write
26C4000
direct allocation
page read and write
531B000
trusted library allocation
page read and write
2510000
direct allocation
page read and write
26F0000
direct allocation
page read and write
3040000
heap
page read and write
52DE000
trusted library allocation
page read and write
280A000
direct allocation
page read and write
1C70000
heap
page read and write
24E8000
direct allocation
page read and write
5341000
trusted library allocation
page read and write
250A000
direct allocation
page read and write
2253F000
stack
page read and write
52D3000
trusted library allocation
page read and write
5315000
trusted library allocation
page read and write
CC1000
unkown
page execute read
24E2000
direct allocation
page read and write
18EC000
stack
page read and write
251C000
direct allocation
page read and write
301B000
heap
page read and write
52B1000
trusted library allocation
page read and write
3034000
heap
page read and write
5308000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
28EE000
direct allocation
page read and write
52E8000
trusted library allocation
page read and write
3054000
heap
page read and write
5304000
trusted library allocation
page read and write
227FD000
stack
page read and write
2480000
direct allocation
page read and write
3054000
heap
page read and write
17A1000
unkown
page write copy
24D8000
direct allocation
page read and write
52CE000
trusted library allocation
page read and write
52CD000
trusted library allocation
page read and write
2F78000
heap
page read and write
533F000
trusted library allocation
page read and write
24DA000
direct allocation
page read and write
1811000
unkown
page write copy
5340000
trusted library allocation
page read and write
19ED000
stack
page read and write
5317000
trusted library allocation
page read and write
228FF000
stack
page read and write
523E000
stack
page read and write
2A7A000
stack
page read and write
52F6000
trusted library allocation
page read and write
2524000
direct allocation
page read and write
5458000
trusted library allocation
page read and write
52F9000
trusted library allocation
page read and write
2B50000
heap
page read and write
3034000
heap
page read and write
3054000
heap
page read and write
24EE000
direct allocation
page read and write
283C000
direct allocation
page read and write
24A6000
direct allocation
page read and write
3044000
heap
page read and write
53B7000
trusted library allocation
page read and write
5324000
trusted library allocation
page read and write
1FB8000
direct allocation
page read and write
5327000
trusted library allocation
page read and write
2000000
direct allocation
page read and write
245C000
direct allocation
page read and write
253A000
direct allocation
page read and write
4CBE000
stack
page read and write
283A000
direct allocation
page read and write
52C4000
trusted library allocation
page read and write
54B6000
trusted library allocation
page read and write
52DF000
trusted library allocation
page read and write
52CE000
trusted library allocation
page read and write
28CE000
direct allocation
page read and write
1808000
unkown
page read and write
3031000
heap
page read and write
2980000
direct allocation
page read and write
530E000
trusted library allocation
page read and write
302D000
heap
page read and write
5337000
trusted library allocation
page read and write
2267F000
stack
page read and write
248A000
direct allocation
page read and write
26D8000
direct allocation
page read and write
52D1000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
52FB000
trusted library allocation
page read and write
52F5000
trusted library allocation
page read and write
52B8000
trusted library allocation
page read and write
1FB0000
direct allocation
page read and write
1F9E000
stack
page read and write
531A000
trusted library allocation
page read and write
5304000
trusted library allocation
page read and write
532F000
trusted library allocation
page read and write
52CE000
trusted library allocation
page read and write
52DF000
trusted library allocation
page read and write
22A80000
direct allocation
page read and write
3054000
heap
page read and write
26C6000
direct allocation
page read and write
26DA000
direct allocation
page read and write
52BA000
trusted library allocation
page read and write
2F8C000
heap
page read and write
52DE000
trusted library allocation
page read and write
52D3000
trusted library allocation
page read and write
24D0000
direct allocation
page read and write
1C50000
heap
page read and write
26F6000
direct allocation
page read and write
23CF000
stack
page read and write
531D000
trusted library allocation
page read and write
243C000
direct allocation
page read and write
52ED000
trusted library allocation
page read and write
251A000
direct allocation
page read and write
24B4000
direct allocation
page read and write
5319000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
52C1000
trusted library allocation
page read and write
53E8000
trusted library allocation
page read and write
2F70000
heap
page read and write
59B4000
trusted library allocation
page read and write
2960000
direct allocation
page read and write
2270000
direct allocation
page read and write
52AF000
stack
page read and write
23D0000
heap
page read and write
3034000
heap
page read and write
52F2000
trusted library allocation
page read and write
52E8000
trusted library allocation
page read and write
26D0000
direct allocation
page read and write
52C9000
trusted library allocation
page read and write
255E000
direct allocation
page read and write
400000
remote allocation
page execute and read and write
17BD000
unkown
page read and write
28DE000
direct allocation
page read and write
249E000
direct allocation
page read and write
52ED000
trusted library allocation
page read and write
17A3000
unkown
page write copy
52C4000
trusted library allocation
page read and write
52FE000
trusted library allocation
page read and write
52C1000
trusted library allocation
page read and write
There are 496 hidden memdumps, click here to show them.