IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/405117-2476756634-1003
unknown
http://185.215.113.206/6c4adf523b719729.php/
unknown
http://185.215.113.206/6c4adf523b719729.php_
unknown
http://185.215.113.206/~gq
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.206/$
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5370000
direct allocation
page read and write
malicious
150E000
heap
page read and write
malicious
C81000
unkown
page execute and read and write
malicious
DC9000
unkown
page execute and read and write
14A5000
stack
page read and write
4EF1000
heap
page read and write
4EF1000
heap
page read and write
3EAF000
stack
page read and write
4EF1000
heap
page read and write
C81000
unkown
page execute and write copy
4EF1000
heap
page read and write
14AF000
stack
page read and write
1664000
heap
page read and write
5330000
trusted library allocation
page read and write
1664000
heap
page read and write
120C000
unkown
page execute and read and write
183E000
stack
page read and write
1664000
heap
page read and write
54B0000
direct allocation
page execute and read and write
3FEF000
stack
page read and write
4EF1000
heap
page read and write
5350000
heap
page read and write
5500000
direct allocation
page execute and read and write
1664000
heap
page read and write
54D0000
direct allocation
page execute and read and write
1664000
heap
page read and write
4EF1000
heap
page read and write
1D6AF000
stack
page read and write
C20000
heap
page read and write
4EF1000
heap
page read and write
1664000
heap
page read and write
3C2F000
stack
page read and write
4EF1000
heap
page read and write
4F10000
heap
page read and write
1650000
direct allocation
page read and write
1578000
heap
page read and write
1554000
heap
page read and write
54E0000
direct allocation
page execute and read and write
4EF1000
heap
page read and write
4EF1000
heap
page read and write
4EF1000
heap
page read and write
321F000
stack
page read and write
1664000
heap
page read and write
C70000
heap
page read and write
14F0000
direct allocation
page read and write
33AF000
stack
page read and write
1664000
heap
page read and write
4EF0000
heap
page read and write
14F0000
direct allocation
page read and write
4EF1000
heap
page read and write
1D32E000
stack
page read and write
3DAE000
stack
page read and write
34AF000
stack
page read and write
1D83D000
stack
page read and write
4EF1000
heap
page read and write
1664000
heap
page read and write
416E000
stack
page read and write
39EE000
stack
page read and write
1500000
heap
page read and write
4EF1000
heap
page read and write
4EF1000
heap
page read and write
4EF1000
heap
page read and write
4EF1000
heap
page read and write
4EF1000
heap
page read and write
462F000
stack
page read and write
163D000
stack
page read and write
4EF1000
heap
page read and write
CAC000
unkown
page execute and read and write
4EF1000
heap
page read and write
1664000
heap
page read and write
35EF000
stack
page read and write
4EF1000
heap
page read and write
47AE000
stack
page read and write
43EE000
stack
page read and write
120D000
unkown
page execute and write copy
4EF1000
heap
page read and write
1664000
heap
page read and write
4EF1000
heap
page read and write
3AEF000
stack
page read and write
4A2E000
stack
page read and write
4CAE000
stack
page read and write
1D9DE000
stack
page read and write
4EF1000
heap
page read and write
1664000
heap
page read and write
4EF1000
heap
page read and write
1D2EF000
stack
page read and write
386F000
stack
page read and write
4EF1000
heap
page read and write
4EF6000
heap
page read and write
4EF1000
heap
page read and write
4EEF000
stack
page read and write
4EF1000
heap
page read and write
376E000
stack
page read and write
4EF1000
heap
page read and write
32A7000
heap
page read and write
1595000
heap
page read and write
1664000
heap
page read and write
14F0000
direct allocation
page read and write
1664000
heap
page read and write
10F7000
unkown
page execute and read and write
DEE000
unkown
page execute and read and write
4EF1000
heap
page read and write
42AE000
stack
page read and write
34EE000
stack
page read and write
1664000
heap
page read and write
4EF1000
heap
page read and write
4EF1000
heap
page read and write
54C0000
direct allocation
page execute and read and write
426F000
stack
page read and write
412F000
stack
page read and write
1DADF000
stack
page read and write
1664000
heap
page read and write
4EF1000
heap
page read and write
1D42F000
stack
page read and write
4EF1000
heap
page read and write
4F00000
heap
page read and write
3C6E000
stack
page read and write
362E000
stack
page read and write
1574000
heap
page read and write
1664000
heap
page read and write
120C000
unkown
page execute and write copy
38AE000
stack
page read and write
C10000
heap
page read and write
14F0000
direct allocation
page read and write
539B000
direct allocation
page read and write
1D5AE000
stack
page read and write
1D56F000
stack
page read and write
48AF000
stack
page read and write
1650000
direct allocation
page read and write
1664000
heap
page read and write
1664000
heap
page read and write
C80000
unkown
page read and write
13AA000
unkown
page execute and write copy
1664000
heap
page read and write
14F0000
direct allocation
page read and write
1DAE0000
heap
page read and write
452E000
stack
page read and write
4EF1000
heap
page read and write
4EF1000
heap
page read and write
1664000
heap
page read and write
1D7FD000
stack
page read and write
44EF000
stack
page read and write
F56000
unkown
page execute and read and write
54E0000
direct allocation
page execute and read and write
402E000
stack
page read and write
1664000
heap
page read and write
4EF1000
heap
page read and write
1664000
heap
page read and write
193E000
stack
page read and write
4EF1000
heap
page read and write
4DAF000
stack
page read and write
14EE000
stack
page read and write
4EF1000
heap
page read and write
1664000
heap
page read and write
14F0000
direct allocation
page read and write
1664000
heap
page read and write
4EF1000
heap
page read and write
3B2E000
stack
page read and write
1664000
heap
page read and write
48EE000
stack
page read and write
54E0000
direct allocation
page execute and read and write
1664000
heap
page read and write
4EF1000
heap
page read and write
4C6F000
stack
page read and write
14F0000
direct allocation
page read and write
3EEE000
stack
page read and write
372F000
stack
page read and write
C80000
unkown
page readonly
476F000
stack
page read and write
311E000
stack
page read and write
4EF1000
heap
page read and write
1664000
heap
page read and write
4EF1000
heap
page read and write
1664000
heap
page read and write
1D93C000
stack
page read and write
4EF1000
heap
page read and write
4DEE000
stack
page read and write
14F0000
direct allocation
page read and write
4EF1000
heap
page read and write
4EF1000
heap
page read and write
1664000
heap
page read and write
4EF1000
heap
page read and write
1660000
heap
page read and write
4EF1000
heap
page read and write
11FE000
unkown
page execute and read and write
14F0000
direct allocation
page read and write
466E000
stack
page read and write
49EF000
stack
page read and write
F6A000
unkown
page execute and read and write
1569000
heap
page read and write
32AB000
heap
page read and write
5510000
direct allocation
page execute and read and write
4EF1000
heap
page read and write
4EF1000
heap
page read and write
1664000
heap
page read and write
1664000
heap
page read and write
14F0000
direct allocation
page read and write
11D3000
unkown
page execute and read and write
1D6FD000
stack
page read and write
325C000
stack
page read and write
13A9000
unkown
page execute and read and write
39AF000
stack
page read and write
54AF000
stack
page read and write
1664000
heap
page read and write
9BC000
stack
page read and write
1582000
heap
page read and write
14F0000
direct allocation
page read and write
32A0000
heap
page read and write
4EF1000
heap
page read and write
329E000
stack
page read and write
1D1EE000
stack
page read and write
4EF1000
heap
page read and write
1664000
heap
page read and write
4EF1000
heap
page read and write
1664000
heap
page read and write
4EF1000
heap
page read and write
1664000
heap
page read and write
53AE000
stack
page read and write
4EF1000
heap
page read and write
4B6E000
stack
page read and write
4B2F000
stack
page read and write
54F0000
direct allocation
page execute and read and write
4EF1000
heap
page read and write
14F0000
direct allocation
page read and write
11F6000
unkown
page execute and read and write
DBD000
unkown
page execute and read and write
1D46E000
stack
page read and write
43AF000
stack
page read and write
150A000
heap
page read and write
4EF1000
heap
page read and write
3D6F000
stack
page read and write
14F0000
direct allocation
page read and write
4EF1000
heap
page read and write
4EF1000
heap
page read and write
1664000
heap
page read and write
14F0000
direct allocation
page read and write
There are 226 hidden memdumps, click here to show them.